Abstract:
Techniques are provided for detecting computer fraud. The techniques include obtaining a text version of a candidate destination and a graphical rendering of the candidate destination, comparing the text version of the candidate destination and the graphical rendering of the candidate destination with a corresponding text version of a stored destination and a corresponding graphical rendering of the stored destination, and generating a fraud warning if the graphical rendering of the candidate destination is substantially similar to the graphical rendering of the stored destination while the text version of the candidate destination differs substantially from the corresponding text version of the stored destination.
Abstract:
A proactive problem resolution system, method of proactive problem resolution and program product therefor. User sensors extract data from user interaction with a computer terminal and pass extracted data to a sniffer agent. The sniffer agent checks for an indication of a user problem by comparing user behavior data against behavior data from previously encountered problems. When the sniffer finds a match, the computer terminal user may be asked if assistance is needed or the user may be automatically referred to the help desk. If a solution already exists for a problem that corresponds to the user behavior, that solution(s) is(are) presented at the computer terminal. Computer terminal users automatically receive problem support, even before it would otherwise be requested.
Abstract:
Techniques are provided for detecting computer fraud. The techniques include obtaining a text version of a candidate destination and a graphical rendering of the candidate destination, comparing the text version of the candidate destination and the graphical rendering of the candidate destination with a corresponding text version of a stored destination and a corresponding graphical rendering of the stored destination, and generating a fraud warning if the graphical rendering of the candidate destination is substantially similar to the graphical rendering of the stored destination while the text version of the candidate destination differs substantially from the corresponding text version of the stored destination.
Abstract:
Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network.
Abstract:
Techniques are provided for detecting computer fraud. The techniques include obtaining a text version of a candidate destination and a graphical rendering of the candidate destination, comparing the text version of the candidate destination and the graphical rendering of the candidate destination with a corresponding text version of a stored destination and a corresponding graphical rendering of the stored destination, and generating a fraud warning if the graphical rendering of the candidate destination is substantially similar to the graphical rendering of the stored destination while the text version of the candidate destination differs substantially from the corresponding text version of the stored destination.
Abstract:
Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network.
Abstract:
Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network.
Abstract:
This invention provides a new mechanism to load-balance traffic using only a SDN switch with high TCAM space efficiency, avoidance of frequent updates, robustness against accidental or malicious traffic overload, and balancing with respect to any load metric provided said metric is monotonically increasing with traffic rates. Layer for load-balancing logic is folded into the invention by the introduction of L4 matches and return flow-pinning.
Abstract:
A distributed network system includes a distributed server system and a plurality of client devices that are communicatively coupled to the distributed server system. The distributed server system includes multiple servers, each server including a set of client devices registered with the server. Through client re-registration, a client device can move its registration from one server to another server. Through server-side data replication, an object registration request submitted by a client device to a first server is forwarded to a second server without having the client device submitting the same request to the second server.
Abstract:
A voice-over-internet protocol (VoIP) caller verification method includes generating a challenge to be sent to a VoIP caller which needs a response from the VoIP caller prior to accepting a VoIP call, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller. A response or lack thereof is determined from the VoIP caller, and the response is analyzed relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with.