Systems, Methods, and Apparatus to Debug a Network Application by Utilizing a Cloned Network and an Interactive Debugging Technique
    1.
    发明申请
    Systems, Methods, and Apparatus to Debug a Network Application by Utilizing a Cloned Network and an Interactive Debugging Technique 有权
    通过利用克隆网络和交互调试技术来调试网络应用的系统,方法和装置

    公开(公告)号:US20130073905A1

    公开(公告)日:2013-03-21

    申请号:US13665075

    申请日:2012-10-31

    CPC classification number: G06F11/3636 H04L41/0672 H04L41/069 H04L41/0863

    Abstract: A method includes instantiating a cloned network that includes a second set of virtual service nodes. The second set of virtual service nodes includes at least one cloned virtual service node that is a clone of a corresponding virtual service node in a first set of virtual service nodes. The at least one cloned virtual service node has access to a history of events that occurred at the corresponding virtual service node in the first set of virtual service nodes. The method includes initiating an interactive debugging session that includes processing of the events of the history of events.

    Abstract translation: 一种方法包括实例化包括第二组虚拟服务节点的克隆网络。 第二组虚拟服务节点包括至少一个克隆的虚拟服务节点,其是第一组虚拟服务节点中相应的虚拟服务节点的克隆。 所述至少一个克隆的虚拟服务节点具有访问发生在第一组虚拟服务节点中的相应虚拟服务节点处的事件的历史记录。 该方法包括启动交互式调试会话,其包括处理事件历史的事件。

    Method and apparatus for identifying phishing websites in network traffic using generated regular expressions
    2.
    发明授权
    Method and apparatus for identifying phishing websites in network traffic using generated regular expressions 有权
    用于使用生成的正则表达式来识别网络流量中的网络钓鱼网站的方法和装置

    公开(公告)号:US08776224B2

    公开(公告)日:2014-07-08

    申请号:US13644055

    申请日:2012-10-03

    Abstract: According to an aspect of this invention, a method to detect phishing URLs involves: creating a whitelist of URLs using a first regular expression; creating a blacklist of URLs using a second regular expression; comparing a URL to the whitelist; and if the URL is not on the whitelist, comparing the URL to the blacklist. False negatives and positives may be avoided by classifying Internet domain names for the target organization as “legitimate”. This classification leaves a filtered set of URLs with unknown domain names which may be more closely examined to detect a potential phishing URL. Valid domain names may be classified without end-user participation.

    Abstract translation: 根据本发明的一个方面,一种检测网络钓鱼URL的方法包括:使用第一正则表达式创建URL的白名单; 使用第二个正则表达式创建URL黑名单; 将网址与白名单进行比较; 如果该网址不在白名单中,请将该URL与黑名单进行比较。 通过将目标组织的互联网域名分类为“合法”,可以避免虚假的否定和积极性。 此类别会留下一组经过筛选的未知域名的URL,可以更仔细地检查以检测潜在的网络钓鱼URL。 有效的域名可能没有最终用户的参与分类。

    Systems, methods, and apparatus to debug a network application by utilizing a cloned network and an interactive debugging technique
    3.
    发明授权
    Systems, methods, and apparatus to debug a network application by utilizing a cloned network and an interactive debugging technique 有权
    通过利用克隆网络和交互式调试技术来调试网络应用的系统,方法和装置

    公开(公告)号:US08621283B2

    公开(公告)日:2013-12-31

    申请号:US13665075

    申请日:2012-10-31

    CPC classification number: G06F11/3636 H04L41/0672 H04L41/069 H04L41/0863

    Abstract: A method includes instantiating a cloned network that includes a second set of virtual service nodes. The second set of virtual service nodes includes at least one cloned virtual service node that is a clone of a corresponding virtual service node in a first set of virtual service nodes. The at least one cloned virtual service node has access to a history of events that occurred at the corresponding virtual service node in the first set of virtual service nodes. The method includes initiating an interactive debugging session that includes processing of the events of the history of events.

    Abstract translation: 一种方法包括实例化包括第二组虚拟服务节点的克隆网络。 第二组虚拟服务节点包括至少一个克隆的虚拟服务节点,其是第一组虚拟服务节点中相应的虚拟服务节点的克隆。 所述至少一个克隆的虚拟服务节点具有访问发生在第一组虚拟服务节点中的相应虚拟服务节点处的事件的历史记录。 该方法包括启动交互式调试会话,其包括处理事件历史的事件。

    Method and Apparatus for Identifying Phishing Websites in Network Traffic Using Generated Regular Expressions
    6.
    发明申请
    Method and Apparatus for Identifying Phishing Websites in Network Traffic Using Generated Regular Expressions 有权
    使用生成的正则表达式识别网络流量中的网络钓鱼网站的方法和装置

    公开(公告)号:US20130031630A1

    公开(公告)日:2013-01-31

    申请号:US13644055

    申请日:2012-10-03

    Abstract: According to an aspect of this invention, a method to detect phishing URLs involves: creating a whitelist of URLs using a first regular expression; creating a blacklist of URLs using a second regular expression; comparing a URL to the whitelist; and if the URL is not on the whitelist, comparing the URL to the blacklist. False negatives and positives may be avoided by classifying Internet domain names for the target organization as “legitimate”. This classification leaves a filtered set of URLs with unknown domain names which may be more closely examined to detect a potential phishing URL. Valid domain names may be classified without end-user participation.

    Abstract translation: 根据本发明的一个方面,一种检测网络钓鱼URL的方法包括:使用第一正则表达式创建URL的白名单; 使用第二个正则表达式创建URL黑名单; 将网址与白名单进行比较; 如果该网址不在白名单中,请将该URL与黑名单进行比较。 通过将目标组织的互联网域名分类为合法,可以避免虚假的否定和积极性。 此类别会留下一组经过筛选的未知域名的URL,可以更仔细地检查以检测潜在的网络钓鱼URL。 有效的域名可能没有最终用户的参与分类。

Patent Agency Ranking