|
2024
|
Invention
|
Bridging between client and server devices using proxied network metrics. An upstream network bri... |
|
|
Invention
|
System and method for detecting patterns in structured fields of network traffic packets. A compu... |
|
2023
|
Invention
|
System and method for detecting dropped aggregated traffic metadata packets. A method includes re... |
|
|
Invention
|
Automatic detection of malicious packets in ddos attacks using an encoding scheme. A method of de... |
|
|
Invention
|
Dns misuse detection through attribute cardinality tracking. A system and computer-implemented me... |
|
|
Invention
|
System and method for dns misuse detection. A computer method and system for mitigating Domain Na... |
|
|
Invention
|
Network monitoring with differentiated treatment of authenticated network traffic. A method inclu... |
|
2022
|
Invention
|
System and method for obscuring status of a network service. A computer implemented method system... |
|
|
Invention
|
System and method for scheduling transmission of network packets. A computer method and system fo... |
|
|
Invention
|
System and method for determining flow specification efficacy. A computer implemented method and ... |
|
|
Invention
|
System and method for monitoring communication traffic associated with dynamic internet services ... |
|
|
Invention
|
Process level authentication for client device access to a server system. An authenticating metho... |
|
|
Invention
|
Slowing requests from malicious network clients using a tarpitting technique. A method of monitor... |
|
|
Invention
|
Slowing requests from malicious network clients. A method and network are provided for monitoring... |
|
|
Invention
|
Formulating responses for slowing requests from malicious domain name system (dns) clients. A met... |
|
|
Invention
|
Detecting ddos attacks by correlating inbound and outbound network traffic information. A compute... |
|
|
Invention
|
System and method for managing flowspec mitigations. A computer-implemented method and system for... |
|
|
Invention
|
Detecting patterns in network traffic responses for mitigating ddos attacks. A computer system an... |
|
|
Invention
|
Method and system for scoring severity of cyber attacks. A computer method and system for determi... |
|
|
Invention
|
Flowspec message processing apparatus and method. A method and apparatus for processing flow spec... |
|
2021
|
Invention
|
Bridging between client and server devices using proxied network metrics. A system and method for... |
|
|
Invention
|
Algorithmically detecting malicious packets in ddos attacks. A method for detecting patterns usin... |
|
|
Invention
|
Decryption of perfect forward secrecy (pfs) and non-pfs sessions. A computer-implemented method a... |
|
|
Invention
|
Mitigation of network attacks by prioritizing network traffic. A computer method and system for p... |
|
|
Invention
|
File extraction from network data to artifact store files and file reconstruction. A method is pr... |
|
2020
|
Invention
|
Priority based deep packet inspection. A method of monitoring a network is provided. The method i... |
|
|
Invention
|
Automated selection of ddos countermeasures using statistical analysis. A method of automated fil... |
|
|
Invention
|
Detection and mitigation of cryptojacking. A method of monitoring network traffic for cryptojacki... |
|
|
Invention
|
Transparent inspection of traffic encrypted with perfect forward secrecy (pfs). A method is provi... |
|
|
Invention
|
Detecting and mitigating zero-day attacks. Determining malicious activity in a monitored network ... |
|
|
Invention
|
Automated classification of network devices to protection groups. A method and system for aggrega... |
|
|
Invention
|
Automated classification of network devices to protection groups. A method and system for automat... |
|
|
Invention
|
Detecting and mitigating application layer ddos attacks. A system and method for detecting a Deni... |
|
|
Invention
|
System and method for preventing session level attacks. A computer method and system for mitigati... |
|
|
Invention
|
Automatically configuring clustered network services. A computer method and system for determinin... |
|
|
Invention
|
Grouping network traffic prior to storage in a columnar database. A computer-implemented method o... |
|
|
Invention
|
Filter for suspicious network activity attempting to mimic a web browser. A method and system for... |
|
|
Invention
|
Detecting over-mitigation of network traffic by a network security element. A computer method and... |
|
|
Invention
|
Avoidance of over-mitigation during automated ddos filtering. A method of detecting patterns for ... |
|
|
Invention
|
Detecting phishing attacks on a network. A method, system, and computer-implemented method to man... |
|
|
Invention
|
Clustering network servers for denial of service attacks. A computer method and system to determi... |
|
2019
|
Invention
|
Scoring network traffic service requests using response time metrics. A method and system are pro... |
|
|
Invention
|
Automatic detection of network strain using response time metrics. The method and system are prov... |
|
|
Invention
|
Mitigation of network denial of service attacks using ip location services. A computer method and... |
|
|
Invention
|
Management of botnet attacks to a computer network. A system and computer-implemented method of m... |
|
|
Invention
|
Dynamic runtime optimization of logical expressions for processing information. A logical express... |