Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

203 results about "Intrusion prevention system" patented technology

Intrusion prevention systems, also known as intrusion detection and prevention systems, are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it. Intrusion prevention systems are considered extensions of intrusion detection systems because they both monitor network traffic and/or system activities for malicious activity. The main differences are, unlike intrusion detection systems, intrusion prevention systems are placed in-line and are able to actively prevent/block intrusions that are detected. More specifically, IPS can take such actions as sending an alarm, dropping the malicious packets, resetting the connection and/or blocking the traffic from the offending IP address. An IPS can also correct Cyclic Redundancy Check errors, unfragment packet streams, prevent TCP sequencing issues, and clean up unwanted transport and network layer options.

Behavior-based host-based intrusion prevention system

A method of protecting a system from attack that includes monitoring processes running on a system, identifying behavior of the processes and attributes of the processes, grouping the processes into process sets based on commonality of attributes, and generating behavior control descriptions for each process set.
Owner:SYMANTEC CORP

Score-based intrusion prevention system

A score-based method of preventing intrusion, and related apparatus and systems, including one or more of the following: receiving traffic including new packets; decoding a protocol for same; determining that no session exists to which the packets are associated; creating a session entry for a session corresponding to the packets; setting a total score for the session to zero; performing an anomaly analysis on the packets identifying an anomaly; adding an anomaly score for the anomaly to the total score for the session; determining that the total score for the session does not exceed a threshold; determining that the anomaly analysis is finished; determining that the signature of the received new packets matches a threat signatures; adding a score assigned to the threat signature to the total score for the session; determining that the total score for the session exceeds the threshold; and triggering a threat response action.
Owner:ALCATEL LUCENT SAS

Intelligent NIPS framework based on dynamic cloud/fire wall linkage

InactiveCN102111420AImprove safety and reliability performanceImprove overall dynamic linkage defense capabilitiesTransmissionLoss rateSmart technology
An NIPS (Network Intrusion Prevention System) adopts the structure that an NIPS framework in linkage with a cloud / fire wall is connected to a cloud security. The cloud security technology, the artificial intelligence technology and the network invasion prevention technology are combined together by adopting a novel design concept and manner. The novel technical characteristics of the cloud security are utilized to combine with the advantages of real-time extraction, interactive coordination and linkage and abnormal information identification of the dynamic cloud / fire wall technology, so that the detection and identification accuracies, the dynamic interactive coordination and linkage performance and the intelligent blocking decision-making performance are improved, false alarm and high alarm loss rate are avoided, and both the key technology and the core problems in integral dynamic defense and detection of the computer network security are well solved, accordingly, the safe reliability and integral dynamic linkage defense capability of the computer network are improved.
Owner:SHANGHAI DIANJI UNIV

Chinese variation text matching recognition method

The invention relates to a Chinese variation text matching recognition method. The method comprises the following steps of: performing special encoding conversion on a target text and a mode character string to improve the similarity of texts; adding proper wildcard characters into the converted mode character string according to the structural characteristics of Chinese characters in the mode character string; and matching by using a precise character string matching algorithm (namely a CV-BM algorithm). The method solves the problems of the replacement of characters with similar shapes in the variation text and the matching difficulty based on the replacement of wrongly written characters with similar shapes. The problems of the replacement of the characters with the similar shapes in the variation text and the matching difficulty based on the replacement of wrongly written characters with the similar shapes can be solved. Compared with an image partitioning recognition method, the method has smaller time and space complexities, is more suitable for the quick matching of Chinese character information in a high-speed network data transmission environment, and can be widely applied to systems needing to match the Chinese character information, such as an intrusion prevention system, an information retrieval system and the like.
Owner:重庆智载科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products