-
公开(公告)号:US11956263B1
公开(公告)日:2024-04-09
申请号:US17339011
申请日:2021-06-04
发明人: Matthew John Block , Adam Sheesley , Jon Matthew Welborn , James Robert Borecky , Jennifer A. Holton , Douglas S. Rodgers
IPC分类号: H04L9/40 , H04W12/122 , H04W12/128
CPC分类号: H04L63/1425 , H04L63/1416 , H04L63/1433 , H04L63/20 , H04W12/122 , H04L63/145 , H04L2463/146 , H04W12/128
摘要: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.
-
公开(公告)号:US10230743B1
公开(公告)日:2019-03-12
申请号:US15153067
申请日:2016-05-12
发明人: Matthew John Block , Adam Sheesley , Jon Matthew Welborn , James Robert Borecky , Jennifer A. Holton , Douglas S. Rodgers
IPC分类号: H04L29/06
摘要: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.
-
公开(公告)号:US10666679B1
公开(公告)日:2020-05-26
申请号:US15495317
申请日:2017-04-24
发明人: Matthew J. Block , Jon M. Welborn , Adam Sheesley , David Huehulani Keene , Jennifer A. Holton , Douglas S. Rodgers
摘要: The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of reconfiguring network settings. The systems and methods monitor a network and detect a hacker on a network. The systems and methods can reconfigure network settings of the network upon detecting the hacker. The systems and methods can analyze the hack for severity; and determine a reconfiguration layer based on the severity of the hack. The reconfiguration layer determines a subset of the network settings to be reconfigured. The systems and methods can dismantle the network and generate a replacement network having the reconfigured set of network settings and replace the network with the replacement network.
-
公开(公告)号:US11310263B1
公开(公告)日:2022-04-19
申请号:US16855649
申请日:2020-04-22
发明人: Matthew J. Block , Jon M. Welborn , Adam Sheesley , David Huehulani Keene , Jennifer A. Holton , Douglas S. Rodgers
IPC分类号: H04L29/06 , H04L41/16 , H04L41/0816 , H04L41/0681
摘要: The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of reconfiguring network settings. The systems and methods monitor a network and detect a hacker on a network. The systems and methods can reconfigure network settings of the network upon detecting the hacker. The systems and methods can analyze the hack for severity; and determine a reconfiguration layer based on the severity of the hack. The reconfiguration layer determines a subset of the network settings to be reconfigured. The systems and methods can dismantle the network and generate a replacement network having the reconfigured set of network settings and replace the network with the replacement network.
-
公开(公告)号:US11032296B1
公开(公告)日:2021-06-08
申请号:US16298862
申请日:2019-03-11
发明人: Matthew John Block , Adam Sheesley , Jon Matthew Welborn , James Robert Borecky , Jennifer A. Holton , Douglas S. Rodgers
IPC分类号: H04L29/06
摘要: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.
-
-
-
-