亞洲知識產權資訊網為知識產權業界提供一個一站式網上交易平台,協助業界發掘知識產權貿易商機,並與環球知識產權業界建立聯繫。無論你是知識產權擁有者正在出售您的知識產權,或是製造商需要購買技術以提高操作效能,又或是知識產權配套服務供應商,你將會從本網站發掘到有用的知識產權貿易資訊。

Worm Security at the Network Perimeter

總結
Lead Inventors: Salvatore Stolfo, PhD.Problem or Unmet Need:Worldwide computer system security remains a high priority for corporations and institutions; worms are among the significant threats. These are usually disguised applications that operate autonomously to destroy, steal or access data and security profiles. When a computer system is under attack by a worm, the worm has somehow successfully penetrated the system's network and found someplace to execute, thus beginning its malicious activity. At present, stopping a worm attack is limited to methods that analyze the code signature of a file and match it to a catalog of known malicious code. However, not all malicious code signatures are known, and worms can only be identified and blocked after they initiate their execution, which leaves computer systems vulnerable to whatever damage might be done before the malicious code is identified.This technology is a novel method of stopping potentially malicious code at the network perimeter. It keeps worms from passing a network gateway, thus preventing them from ever executing at all. Furthermore, this method is not dependent on analyzing code and referencing a catalog of known malicious code signatures. Rather, this solution utilizes techniques of artificial intelligence to learn the unique pattern of 'safe' code segments in the specific network it is deployed into, and then afterwards identifies and quarantines any files with code anomalies.This novel software-based approach can be deployed at any of a network's gateway points. After the learning phase of operation, it can capture network traffic from ports on devices at the network perimeter, pass on safe code, and isolate bad code with minimal latency interruption. It can be deployed on an existing device at the gateway layer of the network, or it can be deployed as its own appliance.
技術優勢
Site specific worm detector Can be applied to any network system, service or port Integrates with standard firewall equipment License independent from use of existing catalogs of malicious code
技術應用
Computer system security breach detection Prevention of worm attack and infestation
詳細技術說明
This technology is a novel method of stopping potentially malicious code at the network perimeter. It keeps worms from passing a network gateway, thus preventing them from ever executing at all. Furthermore, this method is not dependent on an...
*Abstract
None
*Inquiry
Calvin Chu Columbia Technology Ventures Tel: (212) 854-8444 Email: TechTransfer@columbia.edu
*IR
M04-029
*Principal Investigation
*Web Links
Patent application: US20060015630Issued patent: US 7,639,714
國家/地區
美國

欲了解更多信息,請點擊 這裡
移動設備