Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_6e75f87803d6b98f8b078b218e44671a http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_9e34382609d48bcaa5fcfe972193e4c5 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1433 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F- |
filingDate |
2004-09-14-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b9f6f3934a92762b88f67751dd169ad6 |
publicationDate |
2005-03-24-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
WO-2005026872-A2 |
titleOfInvention |
Internal lan perimeter security appliance composed of a pci card and complementary software |
abstract |
A system for providing LAN security which operates on communication Layers 2 to 7 is disclosed. The system is comprised of a PCI card which performs the monitoring of the communication on the LAN, statistical analysis of data traffic and implements fuzzy logic and protocol flow inspection for identifying any abnormal and suspicious communication activity. It is composed of a hardware network interface, whose presence on the network is invisible to the network users, and of an additional interface issuing session interception signals. Using discriminate functions classing, the system can learn to recognize and differentiate anomalous traffic within standard network signals. The system is equipped for rapid recognition of known and unknown malicious activities within routine network traffic. Coupled with known protocol flow comparison, the system detects masquerading, eavesdropping, scanning, denial-of-service attacks and 'hacking' attempts. The system also performs network communication flow optimization and hardware performance enhancement. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111885068-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8417993-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-104468211-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7929689-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8086842-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9665458-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7814543-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7603716-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7716727-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7716726-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111885068-B |
priorityDate |
2003-09-16-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |