System and Method for Detecting an Infective Element in a Network Environment
    5.
    发明申请
    System and Method for Detecting an Infective Element in a Network Environment 有权
    在网络环境中检测感染元素的系统和方法

    公开(公告)号:US20070106786A1

    公开(公告)日:2007-05-10

    申请号:US11469492

    申请日:2006-09-01

    申请人: Robert Gleichauf

    发明人: Robert Gleichauf

    IPC分类号: G06F15/173

    摘要: A method for detecting an infective element in a network environment is provided that includes detecting, by a first computer, an infective element within a second computer. A signal is generated and communicated that identifies the second computer as being associated with the infective element. The signal includes an address associated with the second computer. The signal is received and, in response to the signal, a communicating capability of the second computer is disabled.

    摘要翻译: 提供了一种用于在网络环境中检测感染元件的方法,其包括由第一计算机检测第二计算机内的感染元件。 生成并传送信号,将信号识别为与感染元件相关联的第二计算机。 信号包括与第二计算机相关联的地址。 接收信号,响应于该信号,第二计算机的通信能力被禁用。

    System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
    6.
    发明授权
    System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment 失效
    将数据实时插入多维数据库进行网络入侵检测和漏洞评估的系统和方法

    公开(公告)号:US06282546B1

    公开(公告)日:2001-08-28

    申请号:US09107790

    申请日:1998-06-30

    IPC分类号: G06F1730

    摘要: A system and method are disclosed for real-time insertion of data into a multi-dimensional database. The system includes a multi-dimensional database and a user interface operable to access and provide views into the multi-dimensional database. A data insertion engine is coupled to and operable to access the multi-dimensional database. The data insertion engine is further operable to receive and process a real-time data feed and to insert data into the multi-dimensional database responsive to processing of the real-time data feed. In one embodiment, the real-time data feed can represent exploited network vulnerabilities, and the system can be used for network intrusion detection and vulnerability assessment. The method includes receiving a real-time data feed representing detection of an event and processing the event against the multi-dimensional database. Cells associated with the event are identified in the multi-dimensional database and appropriate vectors to the identified cells are created. Data representing the event is then inserted at the identified cells. Visibility to the inserted data is provided through a user interface to the multi-dimensional database. In one embodiment, the event can be an exploited network vulnerability, and the method can be used for intrusion detection and vulnerability assessment.

    摘要翻译: 公开了用于将数据实时插入到多维数据库中的系统和方法。 该系统包括多维数据库和可操作以访问多维数据库中的视图并提供视图的用户界面。 数据插入引擎耦合到并可操作以访问多维数据库。 所述数据插入引擎还可操作以响应于所述实时数据馈送的处理而接收和处理实时数据馈送并将数据插入所述多维数据库。 在一个实施例中,实时数据馈送可以表示利用的网络漏洞,并且该系统可以用于网络入侵检测和漏洞评估。 该方法包括接收表示事件的检测并针对多维数据库处理该事件的实时数据馈送。 在多维数据库中识别与事件相关联的细胞,并且创建到所识别的细胞的适当载体。 然后将表示事件的数据插入到所识别的单元。 通过用户界面向多维数据库提供对插入数据的可见性。 在一个实施例中,事件可以是被利用的网络漏洞,并且该方法可以用于入侵检测和漏洞评估。

    System and method for rules-driven multi-phase network vulnerability assessment
    7.
    发明授权
    System and method for rules-driven multi-phase network vulnerability assessment 失效
    用于规则驱动的多阶段网络漏洞评估的系统和方法

    公开(公告)号:US06324656B1

    公开(公告)日:2001-11-27

    申请号:US09107964

    申请日:1998-06-30

    IPC分类号: G06F1100

    CPC分类号: H04L41/12 H04L63/1433

    摘要: In one aspect of the invention, a computer implemented method for rules-driven multi-phase network vulnerability assessment is disclosed. The method comprises pinging devices on a network to discover devices with a connection to the network. Port scans are performed on the discovered devices and banners are collected. Information from the collected banners are stored as entries in a first database. Analysis is performed on the entries by comparing the entries with a rule set to determine potential vulnerabilities. The results of the analysis are stored in a second database.

    摘要翻译: 在本发明的一个方面,公开了一种用于规则驱动的多阶段网络脆弱性评估的计算机实现方法。 该方法包括在网络上ping设备以发现具有与网络的连接的设备。 在发现的设备上执行端口扫描,并收集横幅。 来自收集的横幅的信息作为条目存储在第一个数据库中。 通过将条目与规则集进行比较来确定潜在的漏洞,对条目执行分析。 分析结果存储在第二个数据库中。

    Apparatus and Method for Centralized Power Management
    8.
    发明申请
    Apparatus and Method for Centralized Power Management 有权
    集中电源管理的装置和方法

    公开(公告)号:US20070204176A1

    公开(公告)日:2007-08-30

    申请号:US11555828

    申请日:2006-11-02

    IPC分类号: G06F1/00

    摘要: The invention describes a system and method for arranging to provide power to a power monitor device. The disclosure describes the system and method receiving a request for power for at least one device specified by a power monitor device. The disclosure describes receiving at least one proposal from an entity desiring to supply power according to the request for power. A best proposal of the at least one proposal is determined. And the system and method command the power monitor device to supply power in accordance with the best proposal.

    摘要翻译: 本发明描述了一种用于安排向功率监视器装置提供电力的系统和方法。 本公开描述了系统和方法,其接收由功率监视器设备指定的至少一个设备的电力请求。 本发明描述了从希望根据权力请求供电的实体接收至少一个提议。 确定至少一个提案的最佳方案。 系统和方法命令电源监控器按照最佳方案供电。

    Apparatus and Method for Centralized Power Management

    公开(公告)号:US20070058453A1

    公开(公告)日:2007-03-15

    申请号:US11555885

    申请日:2006-11-02

    IPC分类号: G11C7/10

    摘要: The invention describes a system and method for arranging to provide power to a power monitor device. The disclosure describes the system and method receiving a request for power for at least one device specified by a power monitor device. The disclosure describes receiving at least one proposal from an entity desiring to supply power according to the request for power. A best proposal of the at least one proposal is determined. And the system and method command the power monitor device to supply power in accordance with the best proposal.

    Arrangement for tracking IP address usage based on authenticated link identifier
    10.
    发明申请
    Arrangement for tracking IP address usage based on authenticated link identifier 有权
    基于认证链路标识符跟踪IP地址使用的安排

    公开(公告)号:US20060028996A1

    公开(公告)日:2006-02-09

    申请号:US10913363

    申请日:2004-08-09

    IPC分类号: H04L9/32 H04J1/16

    摘要: Link layer authentication information is supplied by a link layer authentication device to an access router for tracking IP address usage by a client device. The authentication information supplied to the access router includes an authenticated client identifier and a corresponding authenticated link identifier for the client device that attached to the network based on the authenticated link identifier. The access router, in response to receiving a message that specifies the authenticated link identifier and a source IP address, adds the source IP address to a cache entry that specifies the authenticated client identifier and the corresponding authenticated link identifier, and outputs to an audit resource a record that specifies the source IP address and the authenticated link identifier.

    摘要翻译: 链路层认证信息由链路层认证装置提供给接入路由器,用于跟踪客户端设备的IP地址使用情况。 提供给接入路由器的认证信息包括经认证的客户端标识符和用于基于经认证的链路标识符附接到网络的客户端设备的相应的认证链路标识符。 接入路由器响应于接收到指定认证链路标识符和源IP地址的消息,将源IP地址添加到指定认证客户端标识符和对应的认证链路标识符的高速缓存条目,并将其输出到审计资源 指定源IP地址和经过身份验证的链路标识符的记录。