Method and systems for controlling access to computing resources based on known security vulnerabilities

B Nicodemus, B Stephens - US Patent App. 11/451,950, 2007 - Google Patents
H04L 9/00(2006.01) H04L 9/32(2006.01) G06F II/00(2006.01) G06F 7/00(2006.01) G06K
9/00(2006.01) G06F 2/4(2006.01) H04LK L/00(2006.01) G06F 7/30(2006.01) G06F …

System and method for securing a network from zero-day vulnerability exploits

M Todd, SR Koster, PCM Wong - US Patent 9,264,441, 2016 - Google Patents
The present invention relates generally to the useful art of computer Software programming
and more specifically to Software relating to computer networks. Intrusion Prevention …

Methods and systems for controlling access to computing resources based on known security vulnerabilities

B Nicodemus, BE Stephens - US Patent 8,955,038, 2015 - Google Patents
Methods and systems are provided for fine tuning access control by remote, endpoint
systems to host systems. Mul tiple conditions/states of one or both of the endpoint and host …

Intrusion event filtering

DA Bruton III, P Jakubik, PM Livecchi… - US Patent …, 2007 - Google Patents
The present invention is related to the following com monly-assigned US patent
applications, all of which were filed on Dec. 5, 2001 and which are hereby incorporated …

Policy processing method and network device

H Liu, Y Shi - US Patent 9,461,888, 2016 - Google Patents
(57) ABSTRACT A policy processing method and network device. The method includes:
performing a mixed orchestration on all service rules corresponding to multiple services, so …

Signature extraction system and method

P Szor - US Patent 7,392,543, 2008 - Google Patents
Host computer systems automatically detect malicious code. The host computer systems
automatically generate and send malicious code packets of the malicious code to a local …

Method and system for dynamically protecting a computer system from attack

CJ Rouland, PM Becker, CW Klaus - US Patent 7,913,303, 2011 - Google Patents
US PATENT DOCUMENTS protection system can receive policy updates to allow it to
protect the system more efficiently and effectively. In other words, the dynamic protection …

System and method for assigning network blocks to sensors

J Polley, WA Vogel III - US Patent 9,110,905, 2015 - Google Patents
(56) References Cited 7,346,922 B2 3/2008 Miliefsky 7.350, 077 B2 3/2008 Meier et al. US
PATENT DOCUMENTS 7,363,656 B2 4/2008 Weber et al. 7,365,872 B2 4/2008 Lawrence et …

Method for evaluating a network

A Lotem, G Choen, M Meiseles - US Patent 8,272,061, 2012 - Google Patents
(57) ABSTRACT A method for evaluating access rules violations, the method includes:
receiving, a model of a computer network; and determining security metrics associated with …

Network intrusion detection system having application inspection and anomaly detection characteristics

R Gadde, D Bhagat, R Varanasi - US Patent App. 10/919,118, 2006 - Google Patents
An intrusion detection System and method for a computer network includes a processor and
one or more programs that run on the processor for application inspection of data packets …