Methods and apparatus to identify an internet protocol address blacklist boundary
    3.
    发明授权
    Methods and apparatus to identify an internet protocol address blacklist boundary 有权
    识别互联网协议地址黑名单边界的方法和装置

    公开(公告)号:US09083730B2

    公开(公告)日:2015-07-14

    申请号:US14099600

    申请日:2013-12-06

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify an Internet protocol address blacklist boundary. An example method includes identifying a netblock associated with a malicious Internet protocol address, the netblock having a lower boundary and an upper boundary, collecting netflow data associated with a plurality of Internet protocol addresses in the netblock, establishing a first window associated with a lower portion of Internet protocol addresses numerically lower than a candidate Internet protocol address, establishing a second window associated with an upper portion of Internet protocol addresses numerically higher than a candidate Internet protocol address, calculating a breakpoint score based on a comparison between a behavioral profile of the first window and a behavioral profile of the second window, and identifying a first sub-netblock when the breakpoint score exceeds a threshold value.

    Abstract translation: 公开了方法,装置,系统和制品以识别因特网协议地址黑名单边界。 示例性方法包括识别与恶意因特网协议地址相关联的网络块,网络块具有下边界和上边界,收集与网络块中的多个因特网协议地址相关联的网络流数据,建立与下部相关联的第一窗口 互联网协议地址数字地低于候选互联网协议地址,建立与互联网协议地址的上部相关联的第二窗口,数字地高于候选互联网协议地址,计算断点得分,基于第一 窗口和第二窗口的行为简档,以及当断点得分超过阈值时识别第一子网块。

    METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY
    4.
    发明申请
    METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY 审中-公开
    构建虚拟私人移动网络安全的方法和设备

    公开(公告)号:US20160308837A1

    公开(公告)日:2016-10-20

    申请号:US15194037

    申请日:2016-06-27

    Abstract: Methods and apparatus to configure virtual private mobile networks are disclosed. Example methods include provisioning a virtual private mobile network within a wireless network, and, after provisioning the virtual private mobile network, determining whether a first communication from a user equipment matches a security event profile. When the first communication matches the profile, the example methods include transmitting, from the wireless network via a first base transceiver station, an instruction to cause the user equipment to be communicatively coupled to the virtual private mobile network. The example methods further include instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station and through the virtual private mobile network. In the example methods, the virtual private mobile network is isolated in a wireless spectrum from other portions of the network.

    Abstract translation: 公开了配置虚拟专用移动网络的方法和装置。 示例性方法包括在无线网络内配置虚拟专用移动网络,并且在配置虚拟专用移动网络之后,确定来自用户设备的第一通信是否匹配安全事件简档。 当第一通信与简档匹配时,示例性方法包括经由第一基站收发器从无线网络发送使得用户设备通信地耦合到虚拟专用移动网络的指令。 示例性方法还包括指示用户设备通过与第一基站收发器物理分离并通过虚拟专用移动网络的第二基站收发器发送第二通信。 在示例性方法中,虚拟专用移动网络在来自网络的其他部分的无线频谱中被隔离。

    Methods and apparatus to identify an internet protocol address blacklist boundary

    公开(公告)号:US10193900B2

    公开(公告)日:2019-01-29

    申请号:US14792938

    申请日:2015-07-07

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify candidate boundaries of Internet protocol addresses associated with a malicious Internet protocol address. An example method includes collecting, with a processor, netflow data associated with the Internet protocol addresses within a netblock having a lower boundary Internet protocol address and an upper boundary Internet protocol address, generating, with the processor, a first window of Internet protocol addresses numerically lower than the malicious Internet protocol address, generating, with the processor, a second window of Internet protocol addresses numerically higher than the malicious Internet protocol address, for respective Internet protocol addresses in the first and second windows, calculating, with the processor, occurrence counts associated with behavior features, and identifying candidate boundaries within the netblock based on divergence values caused by the behavior features.

    METHODS AND APPARATUS TO IDENTIFY AN INTERNET PROTOCOL ADDRESS BLACKLIST BOUNDARY
    9.
    发明申请
    METHODS AND APPARATUS TO IDENTIFY AN INTERNET PROTOCOL ADDRESS BLACKLIST BOUNDARY 有权
    识别互联网协议地址黑名单边界的方法和设备

    公开(公告)号:US20150163235A1

    公开(公告)日:2015-06-11

    申请号:US14099600

    申请日:2013-12-06

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify an Internet protocol address blacklist boundary. An example method includes identifying a netblock associated with a malicious Internet protocol address, the netblock having a lower boundary and an upper boundary, collecting netflow data associated with a plurality of Internet protocol addresses in the netblock, establishing a first window associated with a lower portion of Internet protocol addresses numerically lower than a candidate Internet protocol address, establishing a second window associated with an upper portion of Internet protocol addresses numerically higher than a candidate Internet protocol address, calculating a breakpoint score based on a comparison between a behavioral profile of the first window and a behavioral profile of the second window, and identifying a first sub-netblock when the breakpoint score exceeds a threshold value.

    Abstract translation: 公开了方法,装置,系统和制品以识别因特网协议地址黑名单边界。 示例性方法包括识别与恶意因特网协议地址相关联的网络块,网络块具有下边界和上边界,收集与网络块中的多个因特网协议地址相关联的网络流数据,建立与下部相关联的第一窗口 互联网协议地址数字地低于候选互联网协议地址,建立与互联网协议地址的上部相关联的第二窗口,数字地高于候选互联网协议地址,计算断点得分,基于第一 窗口和第二窗口的行为简档,以及当断点得分超过阈值时识别第一子网块。

Patent Agency Ranking