Method and system for cloaked observation and remediation of software attacks

作者: Mark J. Yourcheck , John M. Suit , Daniel L. Becker , Vipul Sharma

DOI:

关键词:

摘要: A method and system provide security for a communication network one or more nodes within the network. Software can be distributed throughout from centralized location administrative console. The software made resident in kernel of operating receiving node. an observation functionality, analysis reporting functionality remediation some subset those functionalities.

参考文章(64)
Kevin Overcash, Yoram Zahavi, Doron Kolton, Netta Gavrieli, Rami Mizrahi, Asaf Wexler, Galit Efron (Nitzan), Kate Delikat, System and method of securing networks against applications threats ,(2006)
Mark James Yourcheck, Tim Campbell, Stephen C. Carr, Daniel Lee Becker, Vipul Sharma, Andrew W. Brandt, Method and system for tracking a virtual machine ,(2008)
Rajan Palanivel, Ned Smith, Carl Klotz, Using a proxy for endpoint access control ,(2006)
Karl Ginter, Cary Riddock, Kenneth Robert Ruof, Agustin J. Tome, Paul J. Smalser, Trusted host platform ,(2007)
Bora Akyol, Puneet Agarwal, Intelligent network interface controller ,(2006)
Murthy Chintalapati, Arvind Srinivasan, Dynamic reconfiguration of applications on a server ,(2001)