System and method for utilization of threat data for network security

    公开(公告)号:US12015644B2

    公开(公告)日:2024-06-18

    申请号:US16845799

    申请日:2020-04-10

    Abstract: Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.

    SYSTEMS AND METHODS FOR PROVIDING ENHANCED SECURITY IN EDGE COMPUTING ENVIRONMENTS

    公开(公告)号:US20220210124A1

    公开(公告)日:2022-06-30

    申请号:US17564927

    申请日:2021-12-29

    Abstract: Examples of the present disclosure describe systems and methods for providing enhanced security in edge computing environments. A first aspect describes a method for moving security features dynamically applied to an application at a first deployment location to an application at a second deployment location. A second aspect describes a method for locally expanding/contracting an instance of a deployed application. A third aspect describes a method for redirected network traffic associated with detected malicious conduct from a first application deployment environment to a secured second application deployment environment. A fourth aspect describes a method for performing multi-stage network traffic filtering.

    DYNAMIC FILTER GENERATION AND DISTRIBUTION WITHIN COMPUTER NETWORKS

    公开(公告)号:US20220191175A1

    公开(公告)日:2022-06-16

    申请号:US17687050

    申请日:2022-03-04

    Inventor: Michael Benjamin

    Abstract: Systems and methods for implementing filters within computer networks include obtaining blocklist data that includes blocklist entries for a network. Each of the blocklist entries includes one or more network traffic attributes for identifying traffic to be blocked. In response to receiving the blocklist data, a filter based on a common network traffic attribute shared between at least two of the plurality of blocklist entries is generated. The filter is then deployed to a network device within the network such that the filter may be implemented at the network device to block corresponding traffic.

    ILLICIT ROUTE VIEWING SYSTEM AND METHOD OF OPERATION
    4.
    发明申请
    ILLICIT ROUTE VIEWING SYSTEM AND METHOD OF OPERATION 审中-公开
    非法路线查看系统和操作方法

    公开(公告)号:US20160308739A1

    公开(公告)日:2016-10-20

    申请号:US15130418

    申请日:2016-04-15

    Abstract: A route viewing system includes a computing system that receives information associated with one or more routes through a network, and identifies the routes that are associated with at least one illicit user computer used by an illicit user. The computing system then obtains a source location of a source address of the routes and a destination location of a destination address of the routes, and displays the routes on a geographical display at the source location of the source address and the destination location of the destination address of each of the routes.

    Abstract translation: 路由查看系统包括计算系统,其接收通过网络与一个或多个路由相关联的信息,并且识别与非法用户使用的至少一个非法用户计算机相关联的路由。 然后,计算系统获得路由的源地址的源地址和路由的目的地地址的目的地位置,并且在源地址的​​源位置和目的地的目的地位置的地理显示器上显示路由 每条路线的地址。

    SYSTEMS AND METHODS FOR NETWORK DEVICE MANAGEMENT USING DEVICE CLUSTERING

    公开(公告)号:US20220014437A1

    公开(公告)日:2022-01-13

    申请号:US17485587

    申请日:2021-09-27

    Inventor: Michael Benjamin

    Abstract: Systems and methods for managing network devices include performing clustering operations for network devices based on attributes of the network devices. By comparing the results of subsequent clustering operations, changes in network device attributes can be readily identified and any network devices for which attributes have changed may be subject to further investigation or remedial action (e.g., blocking traffic to/from the network device). Clustering may also be used to conduct an inventory of network devices by identifying groups of network devices that have similar attributes.

    Systems and methods for providing enhanced security in edge computing environments

    公开(公告)号:US12034698B2

    公开(公告)日:2024-07-09

    申请号:US17564927

    申请日:2021-12-29

    CPC classification number: H04L63/0236 H04L63/1416 H04L63/1425 H04L63/1441

    Abstract: Examples of the present disclosure describe systems and methods for providing enhanced security in edge computing environments. A first aspect describes a method for moving security features dynamically applied to an application at a first deployment location to an application at a second deployment location. A second aspect describes a method for locally expanding/contracting an instance of a deployed application. A third aspect describes a method for redirected network traffic associated with detected malicious conduct from a first application deployment environment to a secured second application deployment environment. A fourth aspect describes a method for performing multi-stage network traffic filtering.

    Mitigation of route hijacking techniques in a network

    公开(公告)号:US11627158B2

    公开(公告)日:2023-04-11

    申请号:US17025769

    申请日:2020-09-18

    Inventor: Michael Benjamin

    Abstract: Aspects of the present disclosure involve systems and methods for utilizing verified autonomous system (AS) network interconnections received via a cryptographically certified Recognized Operating Agency (ROA) object to generate an interconnect network model which may be used as a reference model to mitigate hijacking of network communications in downstream route announcements. In particular, AS networks may announce or share a cryptographically certified ROA object that includes a list of other AS networks to which the announcing network is connected. A router, server, or other networking device may receive ROA objects from multiple AS networks and generate a model or graph of the interconnectedness of the AS networks. Further, because each ROA object may be cryptographically certified or signed, the networking device may trust the information provided in the received ROA objects. The networking device may further verify announced routing information against the generated network model.

Patent Agency Ranking