http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2005026872-A2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_6e75f87803d6b98f8b078b218e44671a
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_9e34382609d48bcaa5fcfe972193e4c5
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1433
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F-
filingDate 2004-09-14-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b9f6f3934a92762b88f67751dd169ad6
publicationDate 2005-03-24-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2005026872-A2
titleOfInvention Internal lan perimeter security appliance composed of a pci card and complementary software
abstract A system for providing LAN security which operates on communication Layers 2 to 7 is disclosed. The system is comprised of a PCI card which performs the monitoring of the communication on the LAN, statistical analysis of data traffic and implements fuzzy logic and protocol flow inspection for identifying any abnormal and suspicious communication activity. It is composed of a hardware network interface, whose presence on the network is invisible to the network users, and of an additional interface issuing session interception signals. Using discriminate functions classing, the system can learn to recognize and differentiate anomalous traffic within standard network signals. The system is equipped for rapid recognition of known and unknown malicious activities within routine network traffic. Coupled with known protocol flow comparison, the system detects masquerading, eavesdropping, scanning, denial-of-service attacks and 'hacking' attempts. The system also performs network communication flow optimization and hardware performance enhancement.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111885068-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8417993-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-104468211-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7929689-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8086842-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9665458-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7814543-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7603716-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7716727-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7716726-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111885068-B
priorityDate 2003-09-16-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID15074
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID567192
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID129468261
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID12509
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID25407
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID397347
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID966

Total number of triples: 35.