scispace - formally typeset
Patent

System for intrusion detection and vulnerability analysis in a telecommunications signaling network

Reads0
Chats0
TLDR
In this paper, attempted intrusions in a telecommunications signaling network (202) and assessing (212) the vulnerability of the network to the attempted intrusion are detected in real-time, using a known protocol for the network, in order to detect anomalies tending to indicate an attempted intrusion.
Abstract
Detecting (206) attempted intrusions in a telecommunications signaling network (202) and assessing (212) the vulnerability of the network to the attempted intrusions. Intrusion rules are applied to received messages in the network in real-time, using a known protocol for the network, in order to detect anomalies tending to indicate an attempted intrusion. In order to assess the vulnerability of the network, the vulnerability rules are applied to rankings of particular parameters relating to elements in the network. The rankings provide an indication of susceptibility of a network element to an attempted intrusion relative to other network elements.

read more

Citations
More filters
Patent

Systems and methods for message threat management

TL;DR: In this article, the authors present a system and methods for detecting unsolicited and threatening communications and communicating threat information related thereto, where the received threat information is reduced into a canonical form and features are extracted from the reduced threat information in conjunction with configuration data such as goals.
Patent

Method and System for Managing Computer Security Information

TL;DR: In this article, the authors present a fusion engine that can identify relationships between one or more real-time, raw computer events as they are received in realtime, and assess and rank the risk of realtime raw events as well as mature correlation events.
Patent

Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine

TL;DR: In this paper, an automated analysis system identifies the presence of malicious P-code or N-code programs in a manner that limits the possibility of the malicious code infecting a target computer.
Patent

Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail

TL;DR: In this article, a system (120) detects transmission of potentially unwanted e-mail messages by generating hash values based on one or more portions of the e-mails and then determining whether the generated hash values match hash values associated with prior e-email messages.
Patent

Analytical virtual machine

TL;DR: An analytical virtual machine (AVM) as discussed by the authors analyzes computer code using a software processor including a register that stores behavior flags indicative of behaviors identified by virtually executing the code within the virtual machine.
References
More filters
Patent

Apparatus and method for providing a secure gateway for communication and data exchanges between networks

Hung T. Vu
TL;DR: In this paper, an apparatus and a method for providing a secure firewall between a private network and a public network are disclosed, which is a gateway station having an operating system that is modified to disable communications packet forwarding, and further modified to process any communications packet having a network encapsulation address which matches the device address of the gateway station.
Patent

Automatic immune system for computers and computer networks

TL;DR: In this article, the authors propose a method to detect undesirable software entities, such as a computer virus, worm, or Trojan Horse, in a data processing system by detecting anomalous behavior that may indicate the presence of an undesirable software entity.
Patent

Facility for detecting intruders and suspect callers in a computer installation and a security system including such a facility

TL;DR: In this article, the authors present a system for detecting intrusions and suspect users in a computer installation, and a security system incorporating such a facility that makes use of surveillance data relating to the operation of the installation.
Patent

System for managing and operating a network by physically imaging the network

TL;DR: In this article, a system for operating and managing the network equipment is presented, which is so adapted as to operate and manage a network in which plural computers and network devices are connected to each other.
Patent

Network security device which performs MAC address translation without affecting the IP address

TL;DR: In this paper, a network security device is connected between a protected client and a network and negotiates a session key with any other protected client, then all communications between the two clients are encrypted.