Associated with abnormal application-specific activity monitoring in a computing network

作者: Miroslav Halas

DOI:

关键词:

摘要: Embodiments herein disclosed provide for computer network security and, more specifically, monitoring application-based access to secure data and predetermined actions conducted on applications determine abnormal or actions. Specific embodiments of the invention improved database which implements time period-structured tables file directories. Such structuring provides automated purging, backing-up recovery. Additional tracking attributes related monitored data, such as quality origin data. In addition, validating source assure that is received from a valid application.

参考文章(9)
R. Heady, G. Luger, A. Maccabe, M. Servilla, The architecture of a network level intrusion detection system Other Information: PBD: 15 Aug 1990. ,(1990) , 10.2172/425295
Danilo Florissi, Yechiam Yemeni, Apostolos Dailianas, Unified monitoring and detection of intrusion attacks in an electronic system ,(2000)
Darko Kirovski, YuQun Chen, Yacov Yacobi, Gideon A. Yuval, Counterfeit and tamper resistant labels with randomly occurring features ,(2005)
Jason Michael DeStefano, Ralph D. Jenson, System and method for storing raw log data ,(2004)
Caleb L. Doise, Jesus Ruiz-Scougall, Loren M. Kohnfelder, Brian M. Grunkemeyer, Joseph Roxe, Anders Hejlsberg, Christopher W. Brumme, Daniel Takacs, Gopala Krishna R. Kakivaya, Alan Boshier, Yann E. Christensen, Stefan H. Pharies, Brian A. Lamacchia, Corina E. Feuerstein, Michael M. Magruder, Krzysztof J. Cwalina, David S. Mortenson, Raja Krishnaswamy, Adam W. Smith, Shajan Dasan, Sean E. Trowbridge, Erik B. Christensen, Lance E. Olson, Suzanne M. Cook, Travis J. Muhlestein, Manish S. Prabhu, Joe D. Long, Erik B. Olson, Shawn P. Burke, David O. Driver, Craig T. Sinclair, Jonathan C. Hawkins, Julie D. Bennett, James S. Miller, Christopher L. Anderson, Jeffrey M. Cooperstein, Fabio A. Yeon, Jayanth V. Rajan, Tarun Anand, John I. McConnell, Seth M. Demsey, Anthony J. Moore, David S. Ebbo, Ramasamy Krishnaswamy, James H. Hogg, Hany E. Ramadan, II Henry L. Sanders, George D. Fee, David Bau, Yung-Shin Lin, Radu Rares Palanca, Application program interface for network software platform ,(2001)
John Steven Langford, Gregory Jensen Boss, Gang Chen, Rick Allen Ii Hamilton, Protecting users from malicious pop-up advertisements ,(2007)
Timothy Belvin, Brendan O'Meara, Pavel Dournov, Anthony Yeates, Donna Whitlock, Kirk Blackwood, Derrick Bazlen, Systems and methods for enhancing security of communication over a public network ,(2003)