会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明专利
    • Systems and methods for context aware cybersecurity
    • AU2021269370A1
    • 2022-07-07
    • AU2021269370
    • 2021-11-17
    • BOEING CO
    • SULLIVAN SCOTT CHARLESSACKMAN RONALD WARDNOBAKHT RAMIN
    • G06F21/54G06F21/55H04L9/40H04W12/12
    • SYSTEMS AND METHODS FOR CONTEXT AWARE CYBERSECURITY A system that detects malicious traffic flows in a network includes a computer system including a processor in communication with at least one memory device. The processor is programmed to store a plurality of context information about the network including a plurality of devices. The processor is also programmed to determine a network configuration of the network at a specific point in time. The processor is further programmed to generate one or more security policies for one or more devices of the plurality of devices in the network based on the network configuration and the plurality of context information. In addition, the processor is programmed to deploy the one or more security policies to the one or more devices in the network, wherein the one or more devices are configured to execute an algorithm to monitor communications on the network in view of a corresponding security policy of the one or more security policies. STORE A PLURALITY OF CONTEXT INFORMATION ABOUT A NETWORK INCLUDING A PLURALITY OF DEVICES DETERMINE A NETWORK CONFIGURATION OF THE NETWORK AT A SPECIFIC POINT IN TIME GENERATE ONE OR MORE SECURITY POLICIES FOR ONE OR MORE OF THE PLURALITY OF DEVICES IN THE NETWORK BASED ON THE NETWORK CONFIGURATION AND THE PLURALITY OF CONTEXT INFORMATION DEPLOY THE ONE OR MORE SECURITY POLICIES TO THE ONE OR MORE DEVICES IN THE NETWORK RECEIVE AN INDICATION OF A POTENTIAL MALICIOUS TRAFFIC FLOW FROM AN ALGORITHM EXECUTING A SECURITY POLICY
    • 4. 发明专利
    • Systems and methods for real-time network traffic analysis
    • AU2021269362A1
    • 2022-07-07
    • AU2021269362
    • 2021-11-17
    • BOEING CO
    • NOBAKHT RAMINSACKMAN RONALD WARDSULLIVAN SCOTT CHARLES
    • H04L43/08H04W24/04H04W28/02
    • SYSTEMS AND METHODS FOR REAL-TIME NETWORK TRAFFIC A system for detecting malicious traffic flows in a network is provided. The system includes a processor. Based on packet information received for a plurality of data packets transmitted over the network the processor is programmed to calculate inter-arrival times and packet durations for the plurality of data packets. The processor is also programmed to filter the packet information to remove noise. The processor is further programmed to generate at least one histogram based on the packet information, the inter-arrival times (408), and the packet durations (420). In addition, the processor is programmed to generate a power spectral density estimate based on the packet information, the inter-arrival times (408), and the packet durations (420). Moreover, the processor is programmed to analyze the at least one histogram and the power spectral density estimate to detect one or more unexpected data flows. Furthermore, the processor is programmed to report the one or more unexpected data flows. 102 104 106 Network Storage Payload Processor Unit Processor Ethernet Switch 110 11Q 110 110 Bus Satellite Bus Controller Subsystems Packet Switch 114 (Programmable Data Plane with Security) ISL 1 ISL 2 ISL or DL 3 ISL or DL 4 116 116 116 116 118 118 118 118