2023
|
Invention
|
System and method for dns misuse detection.
A computer method and system for mitigating Domain N... |
|
Invention
|
Network monitoring with differentiated treatment of authenticated network traffic. A method inclu... |
|
Invention
|
Detecting ddos attacks by correlating inbound and outbound network traffic information. A compute... |
|
Invention
|
System and method for managing flowspec mitigations. A computer-implemented method and system for... |
2022
|
Invention
|
System and method for monitoring communication traffic associated with dynamic internet services ... |
|
Invention
|
Process level authentication for client device access to a server system.
An authenticating meth... |
|
Invention
|
Slowing requests from malicious network clients using a tarpitting technique.
A method of monito... |
|
Invention
|
Slowing requests from malicious network clients.
A method and network are provided for monitorin... |
|
Invention
|
Formulating responses for slowing requests from malicious domain name system (dns) clients.
A me... |
|
Invention
|
Detecting ddos attacks by correlating inbound and outbound network traffic information.
A comput... |
|
Invention
|
System and method for managing flowspec mitigations.
A computer-implemented method and system fo... |
|
Invention
|
Detecting patterns in network traffic responses for mitigating ddos attacks.
A computer system a... |
|
Invention
|
Method and system for scoring severity of cyber attacks.
A computer method and system for determ... |
|
Invention
|
Flowspec message processing apparatus and method.
A method and apparatus for processing flow spe... |
|
Invention
|
System and method for detecting patterns in structured fields of network traffic packets.
A comp... |
2021
|
Invention
|
Bridging between client and server devices using proxied network metrics.
A system and method fo... |
|
Invention
|
Algorithmically detecting malicious packets in ddos attacks.
A method for detecting patterns usi... |
|
Invention
|
System and method for dns misuse detection. A computer method and system for mitigating Domain Na... |
|
Invention
|
Decryption of perfect forward secrecy (pfs) and non-pfs sessions.
A computer-implemented method ... |
|
Invention
|
Mitigation of network attacks by prioritizing network traffic. A computer method and system for p... |
|
Invention
|
File extraction from network data to artifact store files and file reconstruction. A method is pr... |
|
P/S
|
Computer hardware and recorded and downloadable software systems for use in network security, mon... |
|
P/S
|
Computer hardware and recorded and downloadable software
systems for use in network security, mo... |
2020
|
Invention
|
Priority based deep packet inspection. A method of monitoring a network is provided. The method i... |
|
P/S
|
Computer software; computer hardware; computer hardware and software systems for use in network s... |
|
Invention
|
Automated selection of ddos countermeasures using statistical analysis. A method of automated fil... |
|
Invention
|
Detection and mitigation of cryptojacking. A method of monitoring network traffic for cryptojacki... |
|
Invention
|
Transparent inspection of traffic encrypted with perfect forward secrecy (pfs). A method is provi... |
|
Invention
|
Detecting and mitigating zero-day attacks.
A computer implemented method and system for determin... |
|
Invention
|
Automated classification of network devices to protection groups.
A method and system for aggreg... |
|
Invention
|
Automated classification of network devices to protection groups. A method and system for automat... |
|
Invention
|
Dynamic detection of http-based ddos attacks using estimated cardinality. A computer method and s... |
|
Invention
|
Measurement and analysis of traffic filtered by network infrastructure. A computer-implemented me... |
|
Invention
|
Detecting and mitigating application layer ddos attacks. A system and method for detecting a Deni... |
|
Invention
|
System and method for preventing session level attacks. A computer method and system for mitigati... |
|
Invention
|
Automatically configuring clustered network services. A computer method and system for determinin... |
|
Invention
|
Grouping network traffic prior to storage in a columnar database. A computer-implemented method o... |
|
Invention
|
Filter for suspicious network activity attempting to mimic a web browser. A method and system for... |
|
Invention
|
Detecting malicious packets in edge network devices. Detecting a Denial of Service (DoS) attack i... |
|
Invention
|
Detecting over-mitigation of network traffic by a network security element. A computer method and... |
|
Invention
|
Avoidance of over-mitigation during automated ddos filtering. A method of detecting patterns for ... |
|
Invention
|
Detecting phishing attacks on a network. A method, system, and computer-implemented method to man... |
|
Invention
|
Clustering network servers for denial of service attacks. A computer method and system to determi... |
2019
|
Invention
|
Scoring network traffic service requests using response time metrics. A method and system are pro... |
|
Invention
|
Automatic detection of network strain using response time metrics. The method and system are prov... |
|
Invention
|
Mitigation of network denial of service attacks using ip location services. A computer method and... |
|
Invention
|
Management of botnet attacks to a computer network. A system and computer-implemented method of m... |
|
Invention
|
Dynamic runtime optimization of logical expressions for processing information. A logical express... |
|
Invention
|
Method and system for providing ddos protection by detecting changes in a preferred set of hierar... |
|
Invention
|
Network monitoring with differentiated treatment of authenticated network traffic. A system and c... |
|
Invention
|
Statistical automatic detection of malicious packets in ddos attacks using an encoding scheme ass... |
|
Invention
|
Automatic detection of malicious packets in ddos attacks using an encoding scheme. A method of de... |
2018
|
Invention
|
Scalable unsupervised host clustering based on network metadata. A method for optimizing performa... |
|
P/S
|
Downloadable software for assessing and identifying vulnerabilities and cyber security threats an... |
2017
|
P/S
|
Downloadable electronic publications in the nature of research reports in the field of informatio... |
|
P/S
|
Computer services, namely, creating indexes of information, sites and other resources available o... |
|
P/S
|
Anti-spyware software; Computer anti-virus software; Computer hardware and software systems for u... |
2016
|
P/S
|
Computer hardware and software for monitoring computer systems and the internet for security purp... |
|
P/S
|
Cyber-security services comprising creating indexes of information, sites and other resources ava... |
2015
|
P/S
|
Cloud based computer application and network enterprise security services to detect and mitigate ... |
2010
|
P/S
|
Anti-spyware software; Computer anti-virus software; Computer hardware; Computer hardware and com... |
2001
|
P/S
|
Computer software and hardware for computer and network security, monitoring and optimization, na... |
|
P/S
|
Software for computer and network security, monitoring, and optimization; computer software and h... |
|
P/S
|
Computer software for use in network security, monitoring, and optimization [ Computer software c... |
|
P/S
|
Computer software for use in network security, monitoring, and optimization |