Patent classifications
H04L63/0227
CLOUD MANAGEMENT OF CONNECTIVITY FOR EDGE NETWORKING DEVICES
Certain edge networking devices such as application gateways may report status to a cloud-based threat management platform using a persistent network connection between the gateway and the cloud platform. Where a cloud computing platform for an edge networking device or the treat management platform imposes periodic timeouts, the threat management platform may monitor connects and disconnects for edge devices and asynchronously evaluate connection status of edge devices independently of a heartbeat or other signal through the persistent connection in order to distinguish periodic timeouts imposed by the cloud computing platform from networking devices that are compromised or malfunctioning.
SYSTEMS AND METHODS OF MONITORING AND DETECTING SUSPICIOUS ACTIVITY IN A VIRTUAL ENVIRONMENT
Systems and methods of monitoring and detecting suspicious activity in a virtual environment are provided. In one exemplary embodiment, a method performed by a first network node of monitoring and detecting suspicious activity in a virtual environment comprises sending, to a second network node that operates a virtual environment, an indication that user activity performed in the virtual environment that is associated with a certain user profile of a plurality of user profiles of the virtual environment is suspicious activity. Further, the user activity performed in the virtual environment that is associated with the certain user profile is enabled by a third network node. In addition, the suspicious activity is determined based on a relationship between the user activity performed in the virtual environment that is associated with the certain user profile and other user profiles, or an attribute of the certain user profile or the third network node.
SYSTEM AND METHOD FOR SECURE WEB BROWSING
A system and method for secure web browsing, through a combination of remote execution and local rendering of web pages. The process begins when a local computational device, controlled by a user, requests a web page for display. In the art known process, the request of the local computational device would be sent directly to a web host server, which would then provide all of the components of the web page. These components would then be sent to the local computational device, for rendering and also for execution locally. In the inventive process, the request of the local computational device is sent to a server gateway, which then sends the request to the web host server. The components of the web page are received by the server gateway. The server gateway then executes any scripts as needed, during the session that the user interacts with the web page through local computational device. The server gateway sends components of the received web page, optionally after any scripts have executed to provide additional data, to the local computational device. This process prevents any scripts or other executables from executing on the local computational device. The local computational device then renders the received components to create the web page for display on a web browser at the local computational device.
MITIGATING THREATS ASSOCIATED WITH TAMPERING ATTEMPTS
An enterprise security system is improved by taking remedial actions responsive to detecting attempts at tampering with computing resources. When a tamper detection instrument detects an attempt at tampering, information about the attempt at tampering may be used to identify one or more candidate types of threats and/or candidate threats. One or more remedial actions associated with the threat or type of threat can be identified and applied in ten enterprise network environment.
Apparatus and method for distributed processing of identical packet in high-speed network security equipment
Disclosed is an apparatus for distributed processing of an identical packet in high-speed network security equipment, including: a plurality of analysis modules for each determining whether vulnerability analysis is required by analyzing a received packet; a circular queue for receiving the packet from an analysis module initially determining that the vulnerability analysis is required and storing the received packet as a bucket structure; and a plurality of analysis engines for each performing different vulnerability analyses for the packet acquired from the circular queue based on a packet address of the bucket structure, in which the bucket structure includes a packet data storage unit and packet use information storage units which are as many as the plurality of analysis engines, and the packet use information storage units store packet use information of the plurality of respective analysis engines, respectively.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PLATFORM FIREWALL MANAGEMENT BY NETWORK FUNCTION (NF) REPOSITORY FUNCTION (NRF) OR SERVICE COMMUNICATIONS PROXY (SCP)
A method for automatically managing a platform firewall using a network function (NF) repository function (NRF) or service communications proxy (SCP) includes receiving message relating to registering, updating or deregistering an NF profile in an NF profiles database separate from a platform firewall. The method further includes determining that the registering, updating, or deregistering of the NF profile requires a change to a firewall rules configuration of the platform firewall. The method further includes, in response to determining that the registering, updating, or deregistering of the NF profile requires a change to the firewall rules configuration of the platform firewall, automatically updating, by the NRF or SCP, the firewall rules configuration of the platform firewall.
SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.
Protecting networks from cyber attacks and overloading
Packets may be received by a packet security gateway. Responsive to a determination that an overload condition has occurred in one or more networks associated with the packet security gateway, a first group of packet filtering rules may be applied to at least some of the packets. Applying the first group of packet filtering rules may include allowing at least a first portion of the packets to continue toward their respective destinations. Responsive to a determination that the overload condition has been mitigated, a second group of packet filtering rules may be applied to at least some of the packets. Applying the second group of packet filtering rules may include allowing at least a second portion of the packets to continue toward their respective destinations.
METHOD FOR ENERGY DISTRIBUTION IN A SURGICAL MODULAR ENERGY SYSTEM
A method of operating a modular surgical system including a control module, a first surgical module, and a second surgical module is disclosed. The method includes detachably connecting the first surgical module to the control module by stacking the first surgical module with the control module in a stack configuration, detachably connecting the second surgical module to the first surgical module by stacking the second surgical module with the control module and the first surgical module in the stack configuration, powering up the modular surgical system, and monitoring distribution of power from a power supply of the control module to the first surgical module and the second surgical module.
SYSTEM AND METHOD FOR PROTECTING NETWORK RESOURCES
The present disclosure includes methods and systems for protecting network resources. A method may start, by a processor, copy-on-write snapshotting for modifications to a plurality of files stored on electronic storage. A method may monitor, by the processor, access to objects within a file system associated with the electronic storage for a set of operations. A method may intercept, by the processor, one or more operation of the set of operations for modifying a region of a file in the file system. A method may capture, by the processor, one or more of original contents, modified contents and written contents of the region. A method may end, by the processor, copy-on-write snapshotting. A method may perform malware and/or ransomware analysis on a process performing the modification to the region of the file in the file system.