-
公开(公告)号:US20190245858A1
公开(公告)日:2019-08-08
申请号:US16236520
申请日:2018-12-30
申请人: Shape Security, Inc.
发明人: Nwokedi Idika , Justin D. Call
CPC分类号: H04L63/10 , G06F8/60 , G06F21/31 , G06F21/36 , G06F21/55 , G06F2221/2103 , G06F2221/2127 , G06F2221/2133 , G06Q20/4016 , H04L63/083 , H04L63/1416 , H04L63/1441 , H04L2463/144
摘要: A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client computing device for serving of content from the content server system; serving, to the client computing device and for execution on the client computing device, reconnaissance code that is programmed to determine whether the client computing device is human-controlled or bot-controlled; receiving, from the reconnaissance code, data that indicates whether the client computing device is human-controlled or bot-controlled; and serving follow-up content to the client computing device, wherein the make-up of the follow-up content is selected based on a determination of whether the client computing device is human-controlled or bot-controlled.
-
公开(公告)号:US20190222590A1
公开(公告)日:2019-07-18
申请号:US16248121
申请日:2019-01-15
申请人: Carrier Corporation
IPC分类号: H04L29/06
CPC分类号: H04L63/1416 , G06F21/554 , H04L63/1441 , H04L67/12 , H04W4/70 , H04W12/1201
摘要: Methods, systems and computer program products for intrusion detection are provided. Aspects include receiving, by a processor, internet of things (IoT) device data from each of a plurality of IoT devices, wherein the IoT device data comprises operational data and non-operational data associated with each of the plurality of IoT devices. A security model is built for the plurality of IoT devices based at least in part on the IoT device data, wherein the security model comprises one or more IoT device data ranges. The plurality of IoT devices are monitored to identify a potential intrusion in any of the plurality of IoT devices based at least in part on the IoT device data exceeding any of the one or more IoT device data ranges.
-
公开(公告)号:US20190215253A1
公开(公告)日:2019-07-11
申请号:US16237187
申请日:2018-12-31
发明人: Navindra Yadav , Abhishek Ranjan Singh , Anubhav Gupta , Shashidhar Gandham , Jackson Ngoc Ki Pang , Shih-Chun Chang , Hai Trong Vu
IPC分类号: H04L12/26 , G06N20/00 , G06F16/29 , G06F16/2457 , G06F16/9535 , G06F16/28 , G06F16/248 , G06F21/56 , G06F21/55 , H04L29/06 , H04L12/813 , H04L9/32 , H04L9/08 , H04L12/721 , G06F21/53 , H04L12/24 , H04L12/851 , H04L12/725 , H04L12/823 , H04L29/12 , H04J3/14 , H04J3/06 , H04W72/08 , H04L1/24 , H04L29/08 , G06F3/0484 , H04L12/723 , H04L12/833 , H04L12/741 , H04L12/801 , H04W84/18 , H04L12/715 , H04L12/841 , G06T11/20 , G06F3/0482 , G06F16/11 , G06F16/17 , G06F16/13 , G06N99/00 , G06F16/16 , G06F16/23 , G06F16/174 , G06F9/455
CPC分类号: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/45558 , G06F16/122 , G06F16/137 , G06F16/162 , G06F16/17 , G06F16/173 , G06F16/174 , G06F16/1744 , G06F16/1748 , G06F16/2322 , G06F16/235 , G06F16/2365 , G06F16/24578 , G06F16/248 , G06F16/285 , G06F16/288 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/552 , G06F21/566 , G06F2009/4557 , G06F2009/45587 , G06F2009/45591 , G06F2009/45595 , G06F2221/033 , G06F2221/2101 , G06F2221/2105 , G06F2221/2111 , G06F2221/2115 , G06F2221/2145 , G06N20/00 , G06N99/00 , G06T11/206 , H04J3/0661 , H04J3/14 , H04L1/242 , H04L9/0866 , H04L9/3239 , H04L9/3242 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0841 , H04L43/0858 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/306 , H04L45/38 , H04L45/46 , H04L45/507 , H04L45/66 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/2007 , H04L63/0227 , H04L63/0263 , H04L63/06 , H04L63/0876 , H04L63/1408 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/1441 , H04L63/145 , H04L63/1458 , H04L63/1466 , H04L63/16 , H04L63/20 , H04L67/10 , H04L67/1002 , H04L67/12 , H04L67/16 , H04L67/22 , H04L67/36 , H04L67/42 , H04L69/16 , H04L69/22 , H04W72/08 , H04W84/18
摘要: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.
-
公开(公告)号:US20190207955A1
公开(公告)日:2019-07-04
申请号:US16065603
申请日:2016-12-22
发明人: Fadi EL-MOUSSA , George KALLOS
IPC分类号: H04L29/06
CPC分类号: H04L63/1416 , H04L63/1408 , H04L63/1425 , H04L63/1441
摘要: A method for identifying malicious network traffic communicated via a computer network, the method including: evaluating a measure of a correlation fractal dimension for a portion of network traffic over a monitored network connection; comparing the measure of correlation fractal dimension with a reference measure of correlation fractal dimension for a corresponding portion of network traffic of a malicious network connection so as to determine if malicious network traffic is communicated over the monitored network connection.
-
公开(公告)号:US20190190893A1
公开(公告)日:2019-06-20
申请号:US15846982
申请日:2017-12-19
发明人: Alberto Troia , Antonino Mondello
CPC分类号: H04L63/0428 , G05D1/0088 , G06N3/063 , H04L9/0643 , H04L63/123 , H04L63/1441 , H04W4/44
摘要: An example apparatus comprises a memory resource configured to store a private key associated with a vehicle and store a data matrix comprising data corresponding to operation of the vehicle. The apparatus may further include a processing resource configured to generate a first secure message comprising data corresponding to the vehicle, transmit the first secure message, receive a second secure message comprising an updated data matrix, and update the data matrix based, at least in part, on the updated data matrix.
-
公开(公告)号:US20190173861A1
公开(公告)日:2019-06-06
申请号:US16273353
申请日:2019-02-12
申请人: McAfee, LLC
CPC分类号: H04L63/061 , H04L9/0844 , H04L9/3234 , H04L9/3263 , H04L63/02 , H04L63/0428 , H04L63/10 , H04L63/1425 , H04L63/1441 , H04L63/20
摘要: There is disclosed in one example a sentinel device, including: a hardware platform including at least a processor and configured to provide a trusted execution environment (TEE); and a security engine operable to instruct the hardware platform to: determine that an internet of things (IoT) device in a first realm R1 requires a secure communication channel with a second device in a second realm R2; query a key server for a service appliance key for the secure communication channel; establish a secure communication channel with the endpoint device using the service appliance key and the TEE; and provide a security service function within R1 including brokering communication via the secure communication channel between the IoT device and the second device.
-
公开(公告)号:US20190158515A1
公开(公告)日:2019-05-23
申请号:US16256862
申请日:2019-01-24
发明人: Alexander Visbal
IPC分类号: H04L29/06
CPC分类号: H04L63/1416 , H04L63/0209 , H04L63/0236 , H04L63/0272 , H04L63/101 , H04L63/14 , H04L63/1408 , H04L63/1425 , H04L63/1433 , H04L63/1441 , H04L63/145
摘要: Systems and methods are presented for generating a threat score and a usage score of each of a plurality of IP addresses. The threat score may be determined based on quantity of occurrences and recency of each occurrence of an IP address in network alert datasets, in addition to a weighting factor for each data source indicating the accuracy of the data source.
-
公开(公告)号:US20190141522A1
公开(公告)日:2019-05-09
申请号:US16031435
申请日:2018-07-10
申请人: GN HEARING A/S
CPC分类号: H04W12/02 , H04L63/0435 , H04L63/0442 , H04L63/061 , H04L63/062 , H04L63/0853 , H04L63/0876 , H04L63/1441 , H04W12/003 , H04W12/04 , H04W12/06
摘要: The disclosure provides a client device for hearing device communication and related method. The client device comprises a processing unit, a memory unit, and an interface. The processing unit is configured to send a session request for a session to the hearing device via the interface. The processing unit is configured to receive a session response from the hearing device via the interface. The processing unit is configured to obtain a session key based on e.g. the session response. The processing unit is configured to determine hearing device data and/or to generate session data e.g. based on the session key and the hearing device data. The processing unit is configured to send the session data to the hearing device via the interface.
-
公开(公告)号:US20190124095A1
公开(公告)日:2019-04-25
申请号:US15982318
申请日:2018-05-17
申请人: Intel Corporation
发明人: Satyendra Yadav
IPC分类号: H04L29/06
CPC分类号: H04L63/1416 , H04L63/02 , H04L63/0218 , H04L63/0227 , H04L63/1408 , H04L63/1425 , H04L63/1441 , H04L63/145 , H04L63/20
摘要: Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network communications may be singled out for greater scrutiny, by performing intrusion analysis on packets blocked by a firewall. An integrated intrusion detection system uses an end-node firewall that is dynamically controlled using invoked-application information and a network policy. The system may use various alert levels to trigger heightened monitoring states, alerts sent to a security operation center, and/or logging of network activity for later forensic analysis. The system may monitor network traffic to block traffic that violates the network policy, monitor blocked traffic to detect an intrusion prelude, and monitor traffic from a potential intruder when an intrusion prelude is detected. The system also may track behavior of applications using the network policy to identify abnormal application behavior, and monitor traffic from an abnormally behaving application to identify an intrusion.
-
公开(公告)号:US20190108141A1
公开(公告)日:2019-04-11
申请号:US16204623
申请日:2018-11-29
发明人: Thomas Clay Shields
CPC分类号: G06F12/1408 , G06F12/1466 , G06F21/50 , G06F21/552 , G06F2212/1052 , G06F2212/402 , G06F2221/034 , H04L9/0894 , H04L9/14 , H04L9/30 , H04L9/32 , H04L63/1408 , H04L63/1441
摘要: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
-
-
-
-
-
-
-
-
-