-
公开(公告)号:US11956263B1
公开(公告)日:2024-04-09
申请号:US17339011
申请日:2021-06-04
发明人: Matthew John Block , Adam Sheesley , Jon Matthew Welborn , James Robert Borecky , Jennifer A. Holton , Douglas S. Rodgers
IPC分类号: H04L9/40 , H04W12/122 , H04W12/128
CPC分类号: H04L63/1425 , H04L63/1416 , H04L63/1433 , H04L63/20 , H04W12/122 , H04L63/145 , H04L2463/146 , H04W12/128
摘要: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.
-
公开(公告)号:US11032296B1
公开(公告)日:2021-06-08
申请号:US16298862
申请日:2019-03-11
发明人: Matthew John Block , Adam Sheesley , Jon Matthew Welborn , James Robert Borecky , Jennifer A. Holton , Douglas S. Rodgers
IPC分类号: H04L29/06
摘要: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.
-
公开(公告)号:US10230743B1
公开(公告)日:2019-03-12
申请号:US15153067
申请日:2016-05-12
发明人: Matthew John Block , Adam Sheesley , Jon Matthew Welborn , James Robert Borecky , Jennifer A. Holton , Douglas S. Rodgers
IPC分类号: H04L29/06
摘要: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.
-
-