scispace - formally typeset
Patent

System and method of securing web applications across an enterprise

TLDR
In this article, a system and method for protection of Web based applications is described, which provides an enterprise wide approach to preventing attacks of Web-based applications by comparing the traffic to a profile of acceptable user traffic when interacting with the application.
Abstract
A system and method for protection of Web based applications are described. The techniques described provide an enterprise wide approach to preventing attacks of Web based applications. Individual computer networks within the enterprise monitor network traffic to identify anomalous traffic. The anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat.

read more

Citations
More filters
Patent

Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane

TL;DR: In this paper, a network router includes a plurality of interfaces configured to send and receive packets, and a routing component comprising: (i) a routing engine that includes a control unit that executes a routing protocol to maintain routing information specifying routes through a network, and (ii) a forwarding plane configured by the routing engine to select next hops for the packets in accordance with the routing information.
Patent

Systems and methods for providing a visualizer for rules of an application firewall

TL;DR: In this article, a learning engine of an application firewall may determine a plurality of learned rules based on a history of URL communications with a web server, and each of the learned rules mat be assigned a URL string.
Patent

Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance

TL;DR: In this paper, a configuration interface is described for allowing users to specify object oriented policies, which allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic.
Patent

Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security

TL;DR: In this article, the authors present a real-time security, integrity, and reliability postures of operational (OT), information (IT), and security (ST) systems, as well as slower changing security and operational blueprint, policies, processes, and rules governing the enterprise security and business risk management process, dynamically evolve and adapt to domain, context, and situational awareness, and the controls implemented across the operational and information systems that are controlled.
Patent

Services using globally distributed infrastructure for secure content management

TL;DR: Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users as mentioned in this paper, which integrates the security functionalities such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like.
References
More filters
Patent

Method and system for dynamic network intrusion monitoring, detection and response

TL;DR: In this paper, a probe attached to a customer's network collects status data and other audit information from monitored components of the network, looking for footprints or evidence of unauthorized intrusions or attacks.
Patent

Network management system using virtual reality techniques to display and simulate navigation to network components

TL;DR: In this paper, a network management system allows a network administrator to intuitively manage all components of a heterogeneous networked computer system using views of any component or any set of components.
Patent

Flow-based detection of network intrusions

TL;DR: A flow-based intrusion detection system for detecting intrusions in computer communication networks is presented in this paper, where data packets representing communications between hosts in a computer-to-computer communication network are processed and assigned to various client/server flows.
Patent

Application-layer security method and system

TL;DR: In this paper, the authors present an application layer security method and system to secure trusted computer applications from executing out of their intended and authorized scope caused by illegal or harmful operation requests received from a distrusted environment.
Patent

Behavior-based host-based intrusion prevention system

TL;DR: A method of protecting a system from attack that includes monitoring processes running on a system, identifying behavior of processes and attributes of the processes, grouping the processes into process sets based on commonality of attributes, and generating behavior control descriptions for each process set is presented in this article.