Patent
System for intrusion detection and vulnerability analysis in a telecommunications signaling network
David B. Gorman,Gregory J. Catherine,Richard Peragine,Beverly Conrad,G. Duane Gearhart,David Moy +5 more
Reads0
Chats0
TLDR
In this paper, attempted intrusions in a telecommunications signaling network (202) and assessing (212) the vulnerability of the network to the attempted intrusion are detected in real-time, using a known protocol for the network, in order to detect anomalies tending to indicate an attempted intrusion.Abstract:
Detecting (206) attempted intrusions in a telecommunications signaling network (202) and assessing (212) the vulnerability of the network to the attempted intrusions. Intrusion rules are applied to received messages in the network in real-time, using a known protocol for the network, in order to detect anomalies tending to indicate an attempted intrusion. In order to assess the vulnerability of the network, the vulnerability rules are applied to rankings of particular parameters relating to elements in the network. The rankings provide an indication of susceptibility of a network element to an attempted intrusion relative to other network elements.read more
Citations
More filters
Patent
Systems and methods for message threat management
TL;DR: In this article, the authors present a system and methods for detecting unsolicited and threatening communications and communicating threat information related thereto, where the received threat information is reduced into a canonical form and features are extracted from the reduced threat information in conjunction with configuration data such as goals.
Patent
Method and System for Managing Computer Security Information
Timothy P. Farley,John M. Hammer,Bryan Douglas Williams,Philip Charles Brass,George C. Young,Derek John Mezack +5 more
TL;DR: In this article, the authors present a fusion engine that can identify relationships between one or more real-time, raw computer events as they are received in realtime, and assess and rank the risk of realtime raw events as well as mature correlation events.
Patent
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
TL;DR: In this paper, an automated analysis system identifies the presence of malicious P-code or N-code programs in a manner that limits the possibility of the malicious code infecting a target computer.
Patent
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
TL;DR: In this article, a system (120) detects transmission of potentially unwanted e-mail messages by generating hash values based on one or more portions of the e-mails and then determining whether the generated hash values match hash values associated with prior e-email messages.
Patent
Analytical virtual machine
TL;DR: An analytical virtual machine (AVM) as discussed by the authors analyzes computer code using a software processor including a register that stores behavior flags indicative of behaviors identified by virtually executing the code within the virtual machine.
References
More filters
Patent
Apparatus and method for providing a secure gateway for communication and data exchanges between networks
TL;DR: In this paper, an apparatus and a method for providing a secure firewall between a private network and a public network are disclosed, which is a gateway station having an operating system that is modified to disable communications packet forwarding, and further modified to process any communications packet having a network encapsulation address which matches the device address of the gateway station.
Patent
Automatic immune system for computers and computer networks
TL;DR: In this article, the authors propose a method to detect undesirable software entities, such as a computer virus, worm, or Trojan Horse, in a data processing system by detecting anomalous behavior that may indicate the presence of an undesirable software entity.
Patent
Facility for detecting intruders and suspect callers in a computer installation and a security system including such a facility
TL;DR: In this article, the authors present a system for detecting intrusions and suspect users in a computer installation, and a security system incorporating such a facility that makes use of surveillance data relating to the operation of the installation.
Patent
System for managing and operating a network by physically imaging the network
TL;DR: In this article, a system for operating and managing the network equipment is presented, which is so adapted as to operate and manage a network in which plural computers and network devices are connected to each other.
Patent
Network security device which performs MAC address translation without affecting the IP address
Aharon Friedman,Ben Zion Levy +1 more
TL;DR: In this paper, a network security device is connected between a protected client and a network and negotiates a session key with any other protected client, then all communications between the two clients are encrypted.