会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING
    • 用于战略防恶意监测的系统和方法
    • US20150281259A1
    • 2015-10-01
    • US14738216
    • 2015-06-12
    • Tenable Network Security, Inc.
    • Marcus J. RanumRon Gula
    • H04L29/06H04L29/08G06F17/30H04L29/12
    • H04L63/145G06F17/30964G06F21/56H04L61/1511H04L63/1416H04L63/1433H04L67/02H04L67/10
    • The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network.
    • 本文描述的系统和方法可以利用主动网络扫描和被动网络监控来在网络中提供战略性反恶意软件监视。 特别地,本文描述的系统和方法可以远程连接到网络中的被管理的主机以计算与其上运行的进程相关联的哈希或其他签名以及托管在其上的可疑文件,其中散列可以传达到聚集所有已知病毒的云数据库, 各种防病毒供应商编目检测恶意软件感染的恶意软件签名,而不需要主机拥有本地或驻留的防病毒代理。 此外,可以在网络中监视运行进程和文件系统活动以进一步检测恶意软件感染。 此外,网络扫描和网络监控可用于检测可能参与主动僵尸网络或托管僵尸网络内容的主机,并且审核部署在网络中的防病毒策略。
    • 3. 发明授权
    • System and method for strategic anti-malware monitoring
    • 战略性反恶意软件监控系统和方法
    • US09088606B2
    • 2015-07-21
    • US13692200
    • 2012-12-03
    • Tenable Network Security, Inc.
    • Marcus J. RanumRon Gula
    • H04L29/06
    • H04L63/145G06F17/30964H04L61/1511H04L63/1416H04L63/1433H04L67/02H04L67/10
    • The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network.
    • 本文描述的系统和方法可以利用主动网络扫描和被动网络监控来在网络中提供战略性反恶意软件监视。 特别地,本文描述的系统和方法可以远程连接到网络中的被管理的主机以计算与其上运行的进程相关联的哈希或其他签名以及托管在其上的可疑文件,其中散列可以传达到聚集所有已知病毒的云数据库, 各种防病毒供应商编目检测恶意软件感染的恶意软件签名,而不需要主机拥有本地或驻留的防病毒代理。 此外,可以在网络中监视运行进程和文件系统活动以进一步检测恶意软件感染。 此外,网络扫描和网络监控可用于检测可能参与主动僵尸网络或托管僵尸网络内容的主机,并且审核部署在网络中的防病毒策略。
    • 4. 发明申请
    • SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING
    • 用于战略防恶意监测的系统和方法
    • US20140013434A1
    • 2014-01-09
    • US13692200
    • 2012-12-03
    • TENABLE NETWORK SECURITY, INC.
    • Marcus J. RanumRon Gula
    • H04L29/06
    • H04L63/145G06F17/30964H04L61/1511H04L63/1416H04L63/1433H04L67/02H04L67/10
    • The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network.
    • 本文描述的系统和方法可以利用主动网络扫描和被动网络监控来在网络中提供战略性反恶意软件监视。 特别地,本文描述的系统和方法可以远程连接到网络中的被管理的主机以计算与其上运行的进程相关联的哈希或其他签名以及托管在其上的可疑文件,其中散列可以传达到聚集所有已知病毒的云数据库, 各种防病毒供应商编目检测恶意软件感染的恶意软件签名,而不需要主机拥有本地或驻留的防病毒代理。 此外,可以在网络中监视运行进程和文件系统活动以进一步检测恶意软件感染。 此外,网络扫描和网络监控可用于检测可能参与主动僵尸网络或托管僵尸网络内容的主机,并且审核部署在网络中的防病毒策略。