AcclaimIP-ad

Match Document Document Title
US20150082417 FIREWALL CONFIGURED WITH DYNAMIC COLLABORATION FROM NETWORK SERVICES IN A VIRTUAL NETWORK ENVIRONMENT  
Techniques for automatic firewall configuration in a virtual network environment are described. In one example embodiment, firewall rules are configured using virtual machine (VM) inventory...
US20150089582 Cloud Based Firewall System And Service  
A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats. In various embodiments, such a...
US20110119749 SYSTEM AND METHOD FOR FILTERING SIP-BASED SPAM  
A system for filtering SIP (Session Initiation Protocol)-based spam includes a spam detection unit for receiving a SIP message where labeling is performed from a sending user agent and detecting...
US20120096539 WIRELESS INTRUSION PREVENTION SYSTEM AND METHOD  
A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events...
US20120331542 PREVENTING NEIGHBOR-DISCOVERY BASED DENIAL OF SERVICE ATTACKS  
A method is provided for preventing denial-of-service attacks on hosts attached to a subnet, where the attacks are initiated by a remote node over an external network. The method is performed by a...
US20130055374 System and Method for Denial of Service Attack Mitigation Using Cloud Services  
A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network edge, is able to communicate...
US20150096009 NETWORK TRAFFIC MANGLING APPLICATION  
A network traffic system includes a network traffic mangling application for modifying a signature of packets that are transmitted in the network traffic system. The network traffic mangling...
US20100175124 METHODS AND APPARATUS FOR IMPLEMENTING A SEARCH TREE  
Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree...
US20110099621 Process for monitoring, filtering and caching internet connections  
A one-box system and process for controlling Internet usage by users on a network. The system controls usage by combining two or more of the following functions into a single operating unit: 1)...
US20140115687 INTRUSION AND MISUSE DETERRENCE SYSTEM EMPLOYING A VIRTUAL NETWORK  
A method and apparatus is disclosed for increasing the security of computer networks through the use of an Intrusion and Misuse Deterrence System (IMDS) operating on the network. The IMDS is a...
US20140215599 METHOD AND SYSTEM FOR DEFEATING DENIAL OF SERVICE ATTACKS  
Software, systems and methods for defeating DoS and DDoS attacks according to certain embodiments include detecting a DoS/DDoS attack, connecting to attacking node(s) by allowing a network...
US20130205384 Secure System for Interconnection Between Two Public Networks  
A secure interconnection system between two public networks comprises at least one first router, a first firewall, a second router, a second firewall and a blade server, and a first virtual local...
US20140380459 ADAPTIVE PROBABILISTIC PACKET FILTERING ROUTER AND METHOD THEREOF  
A router is provided. The router includes a packet marking unit that inserts marking information generated based on an address of the router into a packet received by the router, according to a...
US20150237014 METHOD AND APPARATUS FOR DISTRIBUTING FIREWALL RULES  
Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of...
US20140259145 Light Weight Profiling Apparatus Distinguishes Layer 7 (HTTP) Distributed Denial of Service Attackers From Genuine Clients  
An apparatus discerns clients by the requests made to a web application server through a web application firewall, which injects client side code into the responses with a randomized challenge...
US20150096008 METHOD FOR PROVIDING AUTHORITATIVE APPLICATION-BASED ROUTING AND AN IMPROVED APPLICATION FIREWALL  
A method for providing authoritative application-based routing and an improved application firewall, as well as a method for application classification, is described. The first embodiment, which...
US20150089628 System and Method for Provision of a Router / Firewall in a Network  
A firewall/router is configured in a best practices approach for security and performance and, as such, greatly enables non-technical consumers to install it as a gateway point in a small network...
US20150143504 SECURE AND LIGHTWEIGHT TRAFFIC FORWARDING SYSTEMS AND METHODS TO CLOUD BASED NETWORK SECURITY SYSTEMS  
A method implemented by an agent operating on a mobile device communicating to a cloud-based system includes opening up local listening sockets on the mobile device; redirecting outgoing traffic...
US20110119752 METHOD AND SYSTEM FOR INCLUDING SECURITY INFORMATION WITH A PACKET  
A method and system for including security information with a packet is disclosed. A packet is detected as it exits a first network and enters a second network. The first network is configured to...
US20120023572 Malicious Attack Response System and Associated Method  
A system and method for detecting and identifying intruders in a computer network environment by providing a network traffic evaluation and simulation module at the interface between a protected...
US20150237013 SPECIFYING POINT OF ENFORCEMENT IN A FIREWALL RULE  
Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of...
US20130055373 PROTOCOL RATE FILTERING AT EDGE DEVICE  
A method includes configuring a plurality of rate filters for a plurality of protocols. The plurality of rate filters are associated with a plurality of rate thresholds for the plurality of...
US20110004932 Firewall for tunneled IPv6 traffic  
A NAT device and method implemented on the device for filtering tunneled IPv6 traffic is disclosed. The method comprises: receiving an IP traffic stream at an ingress network interface to the NAT,...
US20150074792 LINE-RATE PACKET FILTERING TECHNIQUE FOR GENERAL PURPOSE OPERATING SYSTEMS  
A method for mitigating denial of service attacks may include filtering out invalid packets from the received packets using a first filtering module, allowing the valid packets to pass through the...
US20140337963 SYSTEMS AND METHODS FOR HANDLING PACKETS FROM A TRUSTED NETWORK  
Systems and methods for handling packets from a trusted network are provided. In some aspects, a system includes a communication module configured to receive a packet at a gateway from a server in...
US20140115688 MULTI-METHOD GATEWAY-BASED NETWORK SECURITY SYSTEMS AND METHODS  
Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only...
US20130067560 MULTI-METHOD GATEWAY-BASED NETWORK SECURITY SYSTEMS AND METHODS  
Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only...
US20130326609 FORCING ALL MOBILE NETWORK TRAFFIC OVER A SECURE TUNNEL CONNECTION  
A process is disclosed in which all network traffic between a mobile device and an untrusted network arriving before the establishment of a VPN tunnel are dropped in response to rules imposed by...
US20130019302 SYSTEM AND METHOD FOR SUPPORTING SUBNET MANAGEMENT PACKET (SMP) FIREWALL RESTRICTIONS IN A MIDDLEWARE MACHINE ENVIRONMENT  
A system and method can provide subnet management packet (SMP) firewall restrictions in a middleware machine environment. A secure firmware implementation can be provided on a host channel adaptor...
US20110055916 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ADAPTIVE PACKET FILTERING  
The subject matter described herein includes methods, systems, and computer readable media for adaptive packet filtering. One method includes identifying at least one subset of rules and an...
US20140007216 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ADAPTIVE PACKET FILTERING  
Methods, systems, and computer readable media for adaptive packet filtering are disclosed. One method includes identifying at least one subset of rules and an ordered set of firewall packet...
US20150012999 SYSTEM AND METHOD FOR INTELLIGENT COORDINATION OF HOST AND GUEST INTRUSION PREVENTION IN VIRTUALIZED ENVIRONMENT  
A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of...
US20080168550 METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MODELING A SECURE PRODUCTION NETWORK  
Methods, systems, and computer program products for modeling a secure production network are provided. A method includes generating a test network for emulating production operations, capturing...
US20130312081 MALICIOUS CODE BLOCKING SYSTEM  
Disclosed is a malicious code blocking system including: a fake website detector that repeatedly accesses a website to be monitored to detect an attack, stores a detection log of the attacked...
US20150237015 PROVISIONING FIREWALL RULES ON A FIREWALL ENFORCING DEVICE  
Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of...
US20120185914 IMPLEMENTING NETWORK TRAFFIC MANAGEMENT FOR VIRTUAL AND PHYSICAL MACHINES  
A virtualization framework provides security between multiple virtual machines with respect to network communications between the virtual machines and between the virtual machines and a physical...
US20140331311 SECURITY PROCESSING IN ACTIVE SECURITY DEVICES  
Methods, systems, and apparatus, including computer program products, featuring receiving at a first security device a packet. The first security device determines that the packet is associated...
US20150188884 TIMING MANAGEMENT IN A LARGE FIREWALL CLUSTER  
A firewall cluster comprises three or more firewall processing nodes, which report primary node status based on the reporting node's membership in a preexisting cluster. A controller uses the...
US20140289840 SYSTEM AND METHOD FOR INTEGRATED HEADER, STATE, RATE AND CONTENT ANOMALY PREVENTION FOR SESSION INITIATION PROTOCOL  
Methods and systems for an integrated solution to the rate based denial of service attacks targeting the Session Initiation Protocol are provided. According to one embodiment, header, state, rate...
US20150128227 SYSTEMS AND METHODS FOR USING AN HTTP-AWARE CLIENT AGENT  
Systems and methods are described for using a client agent operating in a virtual private network environment to intercept HTTP communications. Methods include: intercepting at the network layer,...
US20110219444 DYNAMICALLY ADAPTIVE NETWORK FIREWALLS AND METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT IMPLEMENTING SAME  
A system, method, and computer program product for controlling data through a firewall which may be dynamically configurable. The method may comprise defining at least one node, wherein the at...
US20150249643 REGIONAL FIREWALL CLUSTERING IN A NETWORKED COMPUTING ENVIRONMENT  
An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each...
US20140366119 REGIONAL FIREWALL CLUSTERING IN A NETWORKED COMPUTING ENVIRONMENT  
An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each...
US20110162060 WIRELESS LOCAL AREA NETWORK INFRASTRUCTURE DEVICES HAVING IMPROVED FIREWALL FEATURES  
Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID...
US20130031621 METHOD FOR APPLYING A HOST SECURITY SERVICE TO A NETWORK  
A method for applying a host security service to a network is described herein. The network may include a host device and a network device. The network device may receive a request for...
US20110258695 PUBLIC NETWORK ACCESS SERVER HAVING A USER-CONFIGURABLE FIREWALL  
A user-configurable firewall and method in which a user-changeable security setting for a client computer is maintained by an access server through which a user accesses the public network. The...
US20140181952 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING DIAMETER SIGNALING ROUTER WITH FIREWALL FUNCTIONALITY  
According to one aspect, the subject matter described herein includes a system for Diameter routing and firewall filtering. The system includes a Diameter signaling router comprising a network...
US20110126277 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING DIAMETER SIGNALING ROUTER WITH FIREWALL FUNCTIONALITY  
According to one aspect, the subject matter described herein includes a system for Diameter routing and firewall filtering. The system includes a Diameter signaling router comprising a network...
US20110219440 APPLICATION-LEVEL DENIAL-OF-SERVICE ATTACK PROTECTION  
The gate guard filtering of incoming application-level requests on behalf of an application. Upon receiving an application request, a token found in the application request may be evaluated by the...
US20140298445 Method and Apparatus for Filtering URL  
A method and an apparatus for filtering a uniform resource locator (URL). According to the method, a first category corresponding to a URL connection request can be found in a pre-stored category...