Behavior-based host-based intrusion prevention system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings.
1 TABLE OF CONTENTS 1.0 Introduction 2.0 Requirements for a successful behavioral-based firewall 3.0 The APPFIRE .TM. Solution 4.0 Architectural Overview 4.1 APPFIRE .TM. Agent 4.2 Management Infrastructure 4.3 APPFIRE .TM. Manager 4.4 The APPFIRE .TM. Enterprise Manager 4.5 The APPFIRE .TM. Authoring Environment 5.0 System Behavior Policies 5.1 Modular Policy Definition 5.2 Process Sets 5.3 Behavior Control Descriptions (BCDs) 5.4 The APPFIRE .TM. Profiler 6.0 J2EE Application Server 7.0 System resources access control 8.0 Example--CodeRed worm 9.0 APPFIRE .TM. Case Studies 9.1 Protecting against Malicious Employees 9.2 Protecting Custom Applications 9.3 Protecting Public IIS Servers 9.4 Managing Policy in Large Organizations 9.5 Reducing the Time-Criticality of Patches
[0037] 1.0 Introduction
[0038] APPFIRE.TM. is an example of an ap...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap