Patent
System and method of securing web applications across an enterprise
Kevin Overcash,Kate Delikat,Rami Mizrahi,Galit Efron (Nitzan),Doron Kolton,Asaf Wexler,Netta Gavrieli,Yoram Zahavi +7 more
TLDR
In this article, a system and method for protection of Web based applications is described, which provides an enterprise wide approach to preventing attacks of Web-based applications by comparing the traffic to a profile of acceptable user traffic when interacting with the application.Abstract:
A system and method for protection of Web based applications are described. The techniques described provide an enterprise wide approach to preventing attacks of Web based applications. Individual computer networks within the enterprise monitor network traffic to identify anomalous traffic. The anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat.read more
Citations
More filters
Patent
Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
TL;DR: In this paper, a network router includes a plurality of interfaces configured to send and receive packets, and a routing component comprising: (i) a routing engine that includes a control unit that executes a routing protocol to maintain routing information specifying routes through a network, and (ii) a forwarding plane configured by the routing engine to select next hops for the packets in accordance with the routing information.
Patent
Systems and methods for providing a visualizer for rules of an application firewall
TL;DR: In this article, a learning engine of an application firewall may determine a plurality of learned rules based on a history of URL communications with a web server, and each of the learned rules mat be assigned a URL string.
Patent
Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance
Prakash Khemani,Vishal Bandekar +1 more
TL;DR: In this paper, a configuration interface is described for allowing users to specify object oriented policies, which allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic.
Patent
Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security
TL;DR: In this article, the authors present a real-time security, integrity, and reliability postures of operational (OT), information (IT), and security (ST) systems, as well as slower changing security and operational blueprint, policies, processes, and rules governing the enterprise security and business risk management process, dynamically evolve and adapt to domain, context, and situational awareness, and the controls implemented across the operational and information systems that are controlled.
Patent
Services using globally distributed infrastructure for secure content management
TL;DR: Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users as mentioned in this paper, which integrates the security functionalities such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like.
References
More filters
Patent
Method and system for dynamic network intrusion monitoring, detection and response
TL;DR: In this paper, a probe attached to a customer's network collects status data and other audit information from monitored components of the network, looking for footprints or evidence of unauthorized intrusions or attacks.
Patent
Network management system using virtual reality techniques to display and simulate navigation to network components
TL;DR: In this paper, a network management system allows a network administrator to intuitively manage all components of a heterogeneous networked computer system using views of any component or any set of components.
Patent
Flow-based detection of network intrusions
TL;DR: A flow-based intrusion detection system for detecting intrusions in computer communication networks is presented in this paper, where data packets representing communications between hosts in a computer-to-computer communication network are processed and assigned to various client/server flows.
Patent
Application-layer security method and system
TL;DR: In this paper, the authors present an application layer security method and system to secure trusted computer applications from executing out of their intended and authorized scope caused by illegal or harmful operation requests received from a distrusted environment.
Patent
Behavior-based host-based intrusion prevention system
TL;DR: A method of protecting a system from attack that includes monitoring processes running on a system, identifying behavior of processes and attributes of the processes, grouping the processes into process sets based on commonality of attributes, and generating behavior control descriptions for each process set is presented in this article.