[go: up one dir, main page]

AU2001249471A1 - Internet/network security method and system for checking security of a client from a remote facility - Google Patents

Internet/network security method and system for checking security of a client from a remote facility

Info

Publication number
AU2001249471A1
AU2001249471A1 AU2001249471A AU4947101A AU2001249471A1 AU 2001249471 A1 AU2001249471 A1 AU 2001249471A1 AU 2001249471 A AU2001249471 A AU 2001249471A AU 4947101 A AU4947101 A AU 4947101A AU 2001249471 A1 AU2001249471 A1 AU 2001249471A1
Authority
AU
Australia
Prior art keywords
client
internet
remote facility
security
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001249471A
Inventor
Stephen F. Gaul Jr.
Donna F. Gaul
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NETWORK SECURITY SYSTEMS Inc
Original Assignee
NETWORK SECURITY SYSTEMS Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NETWORK SECURITY SYSTEMS Inc filed Critical NETWORK SECURITY SYSTEMS Inc
Publication of AU2001249471A1 publication Critical patent/AU2001249471A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)
AU2001249471A 2000-03-27 2001-03-27 Internet/network security method and system for checking security of a client from a remote facility Abandoned AU2001249471A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US19236500P 2000-03-27 2000-03-27
US60192365 2000-03-27
PCT/US2001/009689 WO2001073553A1 (en) 2000-03-27 2001-03-27 Internet/network security method and system for checking security of a client from a remote facility

Publications (1)

Publication Number Publication Date
AU2001249471A1 true AU2001249471A1 (en) 2001-10-08

Family

ID=22709344

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001249471A Abandoned AU2001249471A1 (en) 2000-03-27 2001-03-27 Internet/network security method and system for checking security of a client from a remote facility

Country Status (7)

Country Link
US (1) US20010034847A1 (en)
EP (1) EP1259882A1 (en)
JP (1) JP2003529254A (en)
AU (1) AU2001249471A1 (en)
CA (1) CA2375206A1 (en)
IL (1) IL146762A0 (en)
WO (1) WO2001073553A1 (en)

Families Citing this family (178)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4501280B2 (en) 1998-12-09 2010-07-14 インターナショナル・ビジネス・マシーンズ・コーポレーション Method and apparatus for providing network and computer system security
US6773769B1 (en) * 1999-05-18 2004-08-10 3M Innovative Properties Company Macroporous ink receiving media
US7346929B1 (en) 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
US8006243B2 (en) 1999-12-07 2011-08-23 International Business Machines Corporation Method and apparatus for remote installation of network drivers and software
AU2001257400A1 (en) 2000-04-28 2001-11-12 Internet Security Systems, Inc. System and method for managing security events on a network
US7574740B1 (en) 2000-04-28 2009-08-11 International Business Machines Corporation Method and system for intrusion detection in a computer network
US7174454B2 (en) 2002-11-19 2007-02-06 America Online, Inc. System and method for establishing historical usage-based hardware trust
EP1285317A1 (en) 2000-05-19 2003-02-26 Netscape Communications Adaptive multi-tier authentication system
US20040034794A1 (en) * 2000-05-28 2004-02-19 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US9213836B2 (en) * 2000-05-28 2015-12-15 Barhon Mayer, Batya System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages
US7162649B1 (en) 2000-06-30 2007-01-09 Internet Security Systems, Inc. Method and apparatus for network assessment and authentication
US6901346B2 (en) 2000-08-09 2005-05-31 Telos Corporation System, method and medium for certifying and accrediting requirements compliance
US6993448B2 (en) 2000-08-09 2006-01-31 Telos Corporation System, method and medium for certifying and accrediting requirements compliance
US7380270B2 (en) * 2000-08-09 2008-05-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance
US7178166B1 (en) * 2000-09-19 2007-02-13 Internet Security Systems, Inc. Vulnerability assessment and authentication of a computer by a local scanner
US9027121B2 (en) 2000-10-10 2015-05-05 International Business Machines Corporation Method and system for creating a record for one or more computer security incidents
US7146305B2 (en) 2000-10-24 2006-12-05 Vcis, Inc. Analytical virtual machine
US6996845B1 (en) * 2000-11-28 2006-02-07 S.P.I. Dynamics Incorporated Internet security analysis system and process
US7130466B2 (en) 2000-12-21 2006-10-31 Cobion Ag System and method for compiling images from a database and comparing the compiled images with known images
US20020147803A1 (en) 2001-01-31 2002-10-10 Dodd Timothy David Method and system for calculating risk in association with a security audit of a computer network
US7590745B2 (en) * 2001-03-02 2009-09-15 International Business Machines Corporation System and method for analyzing a router in a shared network system
US7882555B2 (en) * 2001-03-16 2011-02-01 Kavado, Inc. Application layer security method and system
US7325252B2 (en) * 2001-05-18 2008-01-29 Achilles Guard Inc. Network security testing
US7237264B1 (en) 2001-06-04 2007-06-26 Internet Security Systems, Inc. System and method for preventing network misuse
US7657419B2 (en) 2001-06-19 2010-02-02 International Business Machines Corporation Analytical virtual machine
US20020199122A1 (en) * 2001-06-22 2002-12-26 Davis Lauren B. Computer security vulnerability analysis methodology
US7003561B1 (en) * 2001-06-29 2006-02-21 Mcafee, Inc. System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure
US7146642B1 (en) * 2001-06-29 2006-12-05 Mcafee, Inc. System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device
US7096503B1 (en) * 2001-06-29 2006-08-22 Mcafee, Inc. Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
US7100160B2 (en) * 2001-10-19 2006-08-29 Hewlett-Packard Development Company, L.P. Method and system for implementing host-dependent SCSI behavior in a heterogeneous host environment
US7673137B2 (en) 2002-01-04 2010-03-02 International Business Machines Corporation System and method for the managed security control of processes on a computer system
US7243148B2 (en) * 2002-01-15 2007-07-10 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7152105B2 (en) * 2002-01-15 2006-12-19 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7543056B2 (en) 2002-01-15 2009-06-02 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7257630B2 (en) * 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7664845B2 (en) * 2002-01-15 2010-02-16 Mcafee, Inc. System and method for network vulnerability detection and reporting
JP4190765B2 (en) * 2002-01-18 2008-12-03 株式会社コムスクエア Security level information providing method and system
DE10202249A1 (en) * 2002-01-23 2003-08-07 Xs Comp Hard Und Software Gmbh Security device and process for communication network diverts and evaluates potentially damaging data traffic using sensors and analyzer before restoring it
AU2003210900A1 (en) * 2002-02-07 2003-09-02 Empirix Inc. Automated security threat testing of web pages
US7058970B2 (en) * 2002-02-27 2006-06-06 Intel Corporation On connect security scan and delivery by a network security authority
US6973496B2 (en) * 2002-03-05 2005-12-06 Archduke Holdings, Inc. Concealing a network connected device
JP2003288282A (en) * 2002-03-28 2003-10-10 Fujitsu Ltd Unauthorized access prevention program
FR2838535B1 (en) * 2002-04-12 2004-07-23 Intranode Sa METHOD AND DEVICE FOR A SECURITY AUDIT IN A TELECOMMUNICATION NETWORK, CORRESPONDING PLATFORM AND SYSTEM
US20030212779A1 (en) * 2002-04-30 2003-11-13 Boyter Brian A. System and Method for Network Security Scanning
IL149583A0 (en) * 2002-05-09 2003-07-06 Kavado Israel Ltd Method for automatic setting and updating of a security policy
US7379857B2 (en) * 2002-05-10 2008-05-27 Lockheed Martin Corporation Method and system for simulating computer networks to facilitate testing of computer network security
US7370360B2 (en) 2002-05-13 2008-05-06 International Business Machines Corporation Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
US20040006715A1 (en) * 2002-07-05 2004-01-08 Skrepetos Nicholas C. System and method for providing security to a remote computer over a network browser interface
US7370092B2 (en) * 2002-09-12 2008-05-06 Computer Sciences Corporation System and method for enhanced software updating and revision
US8001271B1 (en) * 2002-10-21 2011-08-16 Arbor Networks, Inc. Method and apparatus for locating naming discrepancies
KR20040035572A (en) * 2002-10-22 2004-04-29 최운호 Integrated Emergency Response System in Information Infrastructure and Operating Method therefor
US20040093419A1 (en) * 2002-10-23 2004-05-13 Weihl William E. Method and system for secure content delivery
US8230497B2 (en) * 2002-11-04 2012-07-24 Hewlett-Packard Development Company, L.P. Method of identifying software vulnerabilities on a computer system
US7353539B2 (en) * 2002-11-04 2008-04-01 Hewlett-Packard Development Company, L.P. Signal level propagation mechanism for distribution of a payload to vulnerable systems
US6983221B2 (en) * 2002-11-27 2006-01-03 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
US6980927B2 (en) * 2002-11-27 2005-12-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
US20040103309A1 (en) * 2002-11-27 2004-05-27 Tracy Richard P. Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing threat vulnerability feed
US7913303B1 (en) 2003-01-21 2011-03-22 International Business Machines Corporation Method and system for dynamically protecting a computer system from attack
WO2004075006A2 (en) 2003-02-14 2004-09-02 Preventsys, Inc. Network audit policy assurance system
US20040187029A1 (en) * 2003-03-21 2004-09-23 Ting David M. T. System and method for data and request filtering
WO2004086180A2 (en) * 2003-03-21 2004-10-07 Computer Associates Think, Inc. Auditing system and method
US20040193918A1 (en) * 2003-03-28 2004-09-30 Kenneth Green Apparatus and method for network vulnerability detection and compliance assessment
US8201256B2 (en) 2003-03-28 2012-06-12 Trustwave Holdings, Inc. Methods and systems for assessing and advising on electronic compliance
US7328454B2 (en) * 2003-04-24 2008-02-05 At&T Delaware Intellectual Property, Inc. Systems and methods for assessing computer security
US8024795B2 (en) * 2003-05-09 2011-09-20 Q1 Labs, Inc. Network intelligence system
US7716742B1 (en) 2003-05-12 2010-05-11 Sourcefire, Inc. Systems and methods for determining characteristics of a network and analyzing vulnerabilities
US7926113B1 (en) 2003-06-09 2011-04-12 Tenable Network Security, Inc. System and method for managing network vulnerability analysis systems
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US8266699B2 (en) 2003-07-01 2012-09-11 SecurityProfiling Inc. Multiple-path remediation
US9118709B2 (en) * 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US20070113272A2 (en) 2003-07-01 2007-05-17 Securityprofiling, Inc. Real-time vulnerability monitoring
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US7657938B2 (en) 2003-10-28 2010-02-02 International Business Machines Corporation Method and system for protecting computer networks by altering unwanted network data traffic
US20050138426A1 (en) * 2003-11-07 2005-06-23 Brian Styslinger Method, system, and apparatus for managing, monitoring, auditing, cataloging, scoring, and improving vulnerability assessment tests, as well as automating retesting efforts and elements of tests
US20050114658A1 (en) * 2003-11-20 2005-05-26 Dye Matthew J. Remote web site security system
US7370101B1 (en) * 2003-12-19 2008-05-06 Sun Microsystems, Inc. Automated testing of cluster data services
GB2410647A (en) * 2004-01-31 2005-08-03 Hewlett Packard Development Co Identifying and Patching Vulnerabilities in a Network
US8201257B1 (en) 2004-03-31 2012-06-12 Mcafee, Inc. System and method of managing network security risks
US7519954B1 (en) 2004-04-08 2009-04-14 Mcafee, Inc. System and method of operating system identification
US7761918B2 (en) * 2004-04-13 2010-07-20 Tenable Network Security, Inc. System and method for scanning a network
GB2414889A (en) * 2004-04-30 2005-12-07 Hewlett Packard Development Co Network administration
US7665119B2 (en) 2004-09-03 2010-02-16 Secure Elements, Inc. Policy-based selection of remediation
US7539681B2 (en) * 2004-07-26 2009-05-26 Sourcefire, Inc. Methods and systems for multi-pattern searching
US20060085852A1 (en) * 2004-10-20 2006-04-20 Caleb Sima Enterprise assessment management
US7793338B1 (en) 2004-10-21 2010-09-07 Mcafee, Inc. System and method of network endpoint security
KR100609708B1 (en) * 2004-11-20 2006-08-08 한국전자통신연구원 Malware protocol analysis and method and device for generating harmful traffic
US20060161816A1 (en) * 2004-12-22 2006-07-20 Gula Ronald J System and method for managing events
US7310669B2 (en) * 2005-01-19 2007-12-18 Lockdown Networks, Inc. Network appliance for vulnerability assessment auditing over multiple networks
US8266320B1 (en) * 2005-01-27 2012-09-11 Science Applications International Corporation Computer network defense
US9325728B1 (en) 2005-01-27 2016-04-26 Leidos, Inc. Systems and methods for implementing and scoring computer network defense exercises
US8095982B1 (en) 2005-03-15 2012-01-10 Mu Dynamics, Inc. Analyzing the security of communication protocols and channels for a pass-through device
US8095983B2 (en) * 2005-03-15 2012-01-10 Mu Dynamics, Inc. Platform for analyzing the security of communication protocols and channels
US7930363B2 (en) * 2005-10-12 2011-04-19 Powerreviews, Inc. Application service provider delivery system
US8046833B2 (en) 2005-11-14 2011-10-25 Sourcefire, Inc. Intrusion event correlation with network discovery information
US7733803B2 (en) 2005-11-14 2010-06-08 Sourcefire, Inc. Systems and methods for modifying network map attributes
JP4722730B2 (en) * 2006-03-10 2011-07-13 富士通株式会社 Security management program, security management device, and security management method
US7948988B2 (en) * 2006-07-27 2011-05-24 Sourcefire, Inc. Device, system and method for analysis of fragments in a fragment train
US7701945B2 (en) * 2006-08-10 2010-04-20 Sourcefire, Inc. Device, system and method for analysis of segments in a transmission control protocol (TCP) session
US8316447B2 (en) 2006-09-01 2012-11-20 Mu Dynamics, Inc. Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems
US9172611B2 (en) 2006-09-01 2015-10-27 Spirent Communications, Inc. System and method for discovering assets and functional relationships in a network
US7954161B1 (en) 2007-06-08 2011-05-31 Mu Dynamics, Inc. Mechanism for characterizing soft failures in systems under attack
US7958230B2 (en) 2008-09-19 2011-06-07 Mu Dynamics, Inc. Test driven deployment and monitoring of heterogeneous network systems
WO2008045302A2 (en) * 2006-10-06 2008-04-17 Sourcefire, Inc. Device, system and method for use of micro-policies in intrusion detection/prevention
GB2443459A (en) * 2006-10-31 2008-05-07 Hewlett Packard Development Co Data packet incuding computing platform indication
US20080181215A1 (en) * 2007-01-26 2008-07-31 Brooks Bollich System for remotely distinguishing an operating system
US8069352B2 (en) * 2007-02-28 2011-11-29 Sourcefire, Inc. Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
US8302196B2 (en) * 2007-03-20 2012-10-30 Microsoft Corporation Combining assessment models and client targeting to identify network security vulnerabilities
EP2145281B1 (en) * 2007-04-12 2013-11-20 Core Sdi, Incorporated System, method and computer readable medium for providing network penetration testing
EP2156290B1 (en) 2007-04-30 2020-03-25 Cisco Technology, Inc. Real-time awareness for a computer network
US8850587B2 (en) * 2007-05-04 2014-09-30 Wipro Limited Network security scanner for enterprise protection
US7774637B1 (en) 2007-09-05 2010-08-10 Mu Dynamics, Inc. Meta-instrumentation for security analysis
US8871096B2 (en) * 2007-09-10 2014-10-28 Res Usa, Llc Magnetic separation combined with dynamic settling for fischer-tropsch processes
US8250658B2 (en) * 2007-09-20 2012-08-21 Mu Dynamics, Inc. Syntax-based security analysis using dynamically generated test cases
US8650651B2 (en) * 2008-02-08 2014-02-11 International Business Machines Corporation Method and apparatus for security assessment of a computing platform
US8474043B2 (en) 2008-04-17 2013-06-25 Sourcefire, Inc. Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
KR20090121579A (en) * 2008-05-22 2009-11-26 주식회사 이베이지마켓 System and method for checking vulnerability of server
WO2010045089A1 (en) 2008-10-08 2010-04-22 Sourcefire, Inc. Target-based smb and dce/rpc processing for an intrusion detection system or intrusion prevention system
WO2010045596A1 (en) * 2008-10-16 2010-04-22 Qualys, Inc. Systems and methods for assessing the compliance of a computer across a network
US8713687B2 (en) * 2008-12-17 2014-04-29 Symantec Corporation Methods and systems for enabling community-tested security features for legacy applications
CA2768193C (en) * 2009-08-05 2016-09-20 Core Sdi Incorporated System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy
US9836376B2 (en) 2009-09-24 2017-12-05 Contec, Llc Method and system for automated test of end-user devices
KR101259897B1 (en) * 2009-10-19 2013-05-02 한국전자통신연구원 Apparatus for the efficient remote security threat diagnosis and its method
US8438270B2 (en) * 2010-01-26 2013-05-07 Tenable Network Security, Inc. System and method for correlating network identities and addresses
US8302198B2 (en) 2010-01-28 2012-10-30 Tenable Network Security, Inc. System and method for enabling remote registry service security audits
US20110191854A1 (en) * 2010-01-29 2011-08-04 Anastasios Giakouminakis Methods and systems for testing and analyzing vulnerabilities of computing systems based on exploits of the vulnerabilities
KR101055267B1 (en) * 2010-03-05 2011-08-09 한국전자통신연구원 How to identify active site of ActiveX control, security vulnerability detection method and immunization method
US8707440B2 (en) * 2010-03-22 2014-04-22 Tenable Network Security, Inc. System and method for passively identifying encrypted and interactive network sessions
US8677486B2 (en) 2010-04-16 2014-03-18 Sourcefire, Inc. System and method for near-real time network attack detection, and system and method for unified detection via detection routing
US8463860B1 (en) 2010-05-05 2013-06-11 Spirent Communications, Inc. Scenario based scale testing
US8547974B1 (en) 2010-05-05 2013-10-01 Mu Dynamics Generating communication protocol test cases based on network traffic
US8549650B2 (en) 2010-05-06 2013-10-01 Tenable Network Security, Inc. System and method for three-dimensional visualization of vulnerability and asset data
US8433790B2 (en) 2010-06-11 2013-04-30 Sourcefire, Inc. System and method for assigning network blocks to sensors
US8671182B2 (en) 2010-06-22 2014-03-11 Sourcefire, Inc. System and method for resolving operating system or service identity conflicts
JP5725529B2 (en) * 2010-07-21 2015-05-27 日本電気株式会社 Web vulnerability repair system, web vulnerability repair method, and program
US20120102368A1 (en) * 2010-10-21 2012-04-26 Unisys Corp. Communicating errors between an operating system and interface layer
US9106514B1 (en) 2010-12-30 2015-08-11 Spirent Communications, Inc. Hybrid network software provision
US9076013B1 (en) * 2011-02-28 2015-07-07 Amazon Technologies, Inc. Managing requests for security services
US8601034B2 (en) 2011-03-11 2013-12-03 Sourcefire, Inc. System and method for real time data awareness
US8464219B1 (en) 2011-04-27 2013-06-11 Spirent Communications, Inc. Scalable control system for test execution and monitoring utilizing multiple processors
US9183397B2 (en) 2011-06-05 2015-11-10 Core Sdi Incorporated System and method for providing automated computer security compromise as a service
US8925091B2 (en) * 2011-09-01 2014-12-30 Dell Products, Lp System and method for evaluation in a collaborative security assurance system
US9811667B2 (en) * 2011-09-21 2017-11-07 Mcafee, Inc. System and method for grouping computer vulnerabilities
US8789190B2 (en) * 2011-12-23 2014-07-22 Mcafee, Inc. System and method for scanning for computer vulnerabilities in a network environment
US9367707B2 (en) 2012-02-23 2016-06-14 Tenable Network Security, Inc. System and method for using file hashes to track data leakage and document propagation in a network
EP2642395B1 (en) * 2012-03-21 2018-12-19 ServiceTrace e.K. Method and apparatus for executing work flow scripts
US8972543B1 (en) 2012-04-11 2015-03-03 Spirent Communications, Inc. Managing clients utilizing reverse transactions
US9043920B2 (en) 2012-06-27 2015-05-26 Tenable Network Security, Inc. System and method for identifying exploitable weak points in a network
US9088606B2 (en) 2012-07-05 2015-07-21 Tenable Network Security, Inc. System and method for strategic anti-malware monitoring
US20140101767A1 (en) * 2012-10-10 2014-04-10 Matthew Cohen Systems and methods for testing and managing defensive network devices
US9467464B2 (en) 2013-03-15 2016-10-11 Tenable Network Security, Inc. System and method for correlating log data to discover network vulnerabilities and assets
JP6157189B2 (en) * 2013-04-16 2017-07-05 Kddi株式会社 Identification device, identification method, and identification program
US9380019B2 (en) * 2013-08-26 2016-06-28 Verisign, Inc. Command performance monitoring
WO2016053261A1 (en) * 2014-09-29 2016-04-07 Hewlett Packard Enterprise Development Lp Detection of email-related vulnerabilities
US9479525B2 (en) 2014-10-23 2016-10-25 International Business Machines Corporation Interacting with a remote server over a network to determine whether to allow data exchange with a resource at the remote server
US11140168B2 (en) * 2015-07-22 2021-10-05 AVAST Software s.r.o. Content access validation system and method
US10628764B1 (en) * 2015-09-15 2020-04-21 Synack, Inc. Method of automatically generating tasks using control computer
US20170124152A1 (en) 2015-11-02 2017-05-04 LeapYear Technologies, Inc. Differentially private processing and database storage
US10567396B2 (en) 2015-12-15 2020-02-18 Webroot Inc. Real-time scanning of IP addresses
US10779056B2 (en) * 2016-04-14 2020-09-15 Contec, Llc Automated network-based test system for set top box devices
US10462456B2 (en) 2016-04-14 2019-10-29 Contec, Llc Automated network-based test system for set top box devices
US10284456B2 (en) 2016-11-10 2019-05-07 Contec, Llc Systems and methods for testing electronic devices using master-slave test architectures
US10608990B2 (en) * 2016-11-15 2020-03-31 Nicira, Inc. Accessing nodes deployed on an isolated network
EP3531650B8 (en) 2018-02-23 2022-06-22 Rohde & Schwarz GmbH & Co. KG System, method, and computer program for testing security of a device under test
US11055432B2 (en) 2018-04-14 2021-07-06 LeapYear Technologies, Inc. Budget tracking in a differentially private database system
US11252172B1 (en) * 2018-05-10 2022-02-15 State Farm Mutual Automobile Insurance Company Systems and methods for automated penetration testing
EP3637739B1 (en) * 2018-10-12 2023-12-06 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Method for validating ownership of a domain name, coordinating agent and validation agent
JP6989781B2 (en) * 2018-11-05 2022-01-12 日本電信電話株式会社 Inspection support equipment, inspection support methods, and inspection support programs
US10430605B1 (en) * 2018-11-29 2019-10-01 LeapYear Technologies, Inc. Differentially private database permissions system
US11755769B2 (en) 2019-02-01 2023-09-12 Snowflake Inc. Differentially private query budget refunding
US10642847B1 (en) 2019-05-09 2020-05-05 LeapYear Technologies, Inc. Differentially private budget tracking using Renyi divergence
CA3108956C (en) 2020-02-11 2023-09-05 LeapYear Technologies, Inc. Adaptive differentially private count
US11487904B2 (en) * 2020-10-21 2022-11-01 Charter Communications Operating, Llc Methods and systems for underlying operating system shell discovery
CN115189933A (en) * 2022-07-06 2022-10-14 上海交通大学 Automatic configuration security detection method and system for Docker
KR20250092717A (en) * 2023-12-15 2025-06-24 (주)노르마 Method and device for checking vulnerability in electronic device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US6185689B1 (en) * 1998-06-24 2001-02-06 Richard S. Carson & Assoc., Inc. Method for network self security assessment
US6574737B1 (en) * 1998-12-23 2003-06-03 Symantec Corporation System for penetrating computer or computer network
US6205552B1 (en) * 1998-12-31 2001-03-20 Mci Worldcom, Inc. Method and apparatus for checking security vulnerability of networked devices

Also Published As

Publication number Publication date
JP2003529254A (en) 2003-09-30
US20010034847A1 (en) 2001-10-25
IL146762A0 (en) 2002-07-25
CA2375206A1 (en) 2001-10-04
WO2001073553A1 (en) 2001-10-04
EP1259882A1 (en) 2002-11-27

Similar Documents

Publication Publication Date Title
AU2001249471A1 (en) Internet/network security method and system for checking security of a client from a remote facility
AU2002312425A1 (en) System and method for maintaining state between a client and server
AU2001288679A1 (en) A biometric-based system and method for enabling authentication of electronic messages sent over a network
AU2002322109A1 (en) Method and apparatus for distributed network security
EP1391073B8 (en) Method and system for increasing security of a secure connection
AU4019601A (en) System and method for managing connections between a client and a server
AU2002344308A1 (en) Method and system for implementing security devices in a network
AU2001269794A1 (en) Method and apparatus for enhancing network security protection server performance
AU2001257400A1 (en) System and method for managing security events on a network
IL156525A0 (en) Method and system of fulfilling request for information from a network client
AU9269101A (en) A method and system for remote configuration of process data access servers
AU2003242968A1 (en) Automated network security system and method
AU2001245976A1 (en) System and method of providing an asynchronous interface between a client system and an enterprise javabeans-enabled server
AU4597196A (en) Method and apparatus for providing simple, secure management of remote servers
AU2001252938A1 (en) Networked system for interactive communication and remote monitoring of individuals
AU2002336264A1 (en) Method and system for remote diagnostics
AU2001283236A1 (en) System and method for remote roulette
AU2001285402A1 (en) Method and apparatus for secure identification for networked environments
AU2002220182A1 (en) System and method for managing trust between clients and servers
AU2621000A (en) A method and apparatus of providing secure transactions on network
AU2002361665A1 (en) System and method for modifying a video stream based on a client or network environment
AU2002368027A1 (en) System, method, and apparatus for satellite remote sensing
AU2002242556A1 (en) System and method for management of remote devices in a network
AU7689700A (en) System and method for performing remote security management of client computer systems
AU3844900A (en) Method and system for performing a transaction between a client and a server over a network