Rogue endpoint detection
    2.
    发明授权

    公开(公告)号:US10230743B1

    公开(公告)日:2019-03-12

    申请号:US15153067

    申请日:2016-05-12

    IPC分类号: H04L29/06

    摘要: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.

    Rogue foothold network defense
    3.
    发明授权

    公开(公告)号:US10666679B1

    公开(公告)日:2020-05-26

    申请号:US15495317

    申请日:2017-04-24

    IPC分类号: H04L29/06 H04L12/24

    摘要: The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of reconfiguring network settings. The systems and methods monitor a network and detect a hacker on a network. The systems and methods can reconfigure network settings of the network upon detecting the hacker. The systems and methods can analyze the hack for severity; and determine a reconfiguration layer based on the severity of the hack. The reconfiguration layer determines a subset of the network settings to be reconfigured. The systems and methods can dismantle the network and generate a replacement network having the reconfigured set of network settings and replace the network with the replacement network.

    Rogue foothold network defense
    4.
    发明授权

    公开(公告)号:US11310263B1

    公开(公告)日:2022-04-19

    申请号:US16855649

    申请日:2020-04-22

    摘要: The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of reconfiguring network settings. The systems and methods monitor a network and detect a hacker on a network. The systems and methods can reconfigure network settings of the network upon detecting the hacker. The systems and methods can analyze the hack for severity; and determine a reconfiguration layer based on the severity of the hack. The reconfiguration layer determines a subset of the network settings to be reconfigured. The systems and methods can dismantle the network and generate a replacement network having the reconfigured set of network settings and replace the network with the replacement network.

    Rogue endpoint detection
    5.
    发明授权

    公开(公告)号:US11032296B1

    公开(公告)日:2021-06-08

    申请号:US16298862

    申请日:2019-03-11

    IPC分类号: H04L29/06

    摘要: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.