SG11201707611SA - Forensic analysis - Google Patents
Forensic analysisInfo
- Publication number
- SG11201707611SA SG11201707611SA SG11201707611SA SG11201707611SA SG11201707611SA SG 11201707611S A SG11201707611S A SG 11201707611SA SG 11201707611S A SG11201707611S A SG 11201707611SA SG 11201707611S A SG11201707611S A SG 11201707611SA SG 11201707611S A SG11201707611S A SG 11201707611SA
- Authority
- SG
- Singapore
- Prior art keywords
- forensic analysis
- forensic
- analysis
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/35—Clustering; Classification
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M7/00—Conversion of a code where information is represented by a given sequence or number of digits to a code where the same, similar or subset of information is represented by a different sequence or number of digits
- H03M7/30—Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/028—Capturing of monitoring data by filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1504612.1A GB201504612D0 (en) | 2015-03-18 | 2015-03-18 | Forensic analysis |
PCT/GB2016/050659 WO2016146973A1 (en) | 2015-03-18 | 2016-03-10 | Forensic analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201707611SA true SG11201707611SA (en) | 2017-10-30 |
Family
ID=53052027
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201707611SA SG11201707611SA (en) | 2015-03-18 | 2016-03-10 | Forensic analysis |
Country Status (6)
Country | Link |
---|---|
US (1) | US10652255B2 (en) |
EP (1) | EP3272097B1 (en) |
CN (1) | CN107409134B (en) |
GB (1) | GB201504612D0 (en) |
SG (1) | SG11201707611SA (en) |
WO (1) | WO2016146973A1 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB201504612D0 (en) | 2015-03-18 | 2015-05-06 | Inquisitive Systems Ltd | Forensic analysis |
WO2017177332A1 (en) * | 2016-04-13 | 2017-10-19 | Cosentino Nicholas Bruce Alexander | Systems and methods for collecting digital forensic evidence |
GB201708671D0 (en) | 2017-05-31 | 2017-07-12 | Inquisitive Systems Ltd | Forensic analysis |
US10628560B1 (en) * | 2017-09-11 | 2020-04-21 | Architecture Technology Corporation | Permission request system and method |
CN109558488A (en) * | 2018-11-30 | 2019-04-02 | 重庆市千将软件有限公司 | Based on data to the multi dimensional analysis method of criminal offence |
US11223639B2 (en) | 2019-03-07 | 2022-01-11 | Fortinet, Inc. | Endpoint network traffic analysis |
US11449623B2 (en) | 2019-03-22 | 2022-09-20 | Fortinet, Inc. | File access control based on analysis of user behavior patterns |
CN113672675B (en) * | 2021-08-09 | 2023-12-15 | 北京字跳网络技术有限公司 | Data detection method and device and electronic equipment |
Family Cites Families (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4103128C2 (en) | 1991-01-30 | 1994-09-01 | Krone Ag | Real time expert computer system |
DE69817176T2 (en) | 1998-09-09 | 2004-06-24 | International Business Machines Corp. | Method and device for intrusion detection in computers and computer networks |
US6742124B1 (en) | 2000-05-08 | 2004-05-25 | Networks Associates Technology, Inc. | Sequence-based anomaly detection using a distance matrix |
US6772160B2 (en) | 2000-06-08 | 2004-08-03 | Ingenuity Systems, Inc. | Techniques for facilitating information acquisition and storage |
US7134141B2 (en) | 2000-06-12 | 2006-11-07 | Hewlett-Packard Development Company, L.P. | System and method for host and network based intrusion detection and response |
US20020045437A1 (en) * | 2000-08-18 | 2002-04-18 | Alexander Kesler | Tracing a location of a mobile device |
US20020065695A1 (en) | 2000-10-10 | 2002-05-30 | Francoeur Jacques R. | Digital chain of trust method for electronic commerce |
CA2445990A1 (en) | 2001-04-18 | 2002-10-24 | Genset S.A. | Full-length human cdnas encoding potentially secreted proteins |
US7480441B2 (en) | 2001-12-20 | 2009-01-20 | Thomson Licensing | Method for seamless real-time splitting and concatenating of a data stream |
US6792545B2 (en) | 2002-06-20 | 2004-09-14 | Guidance Software, Inc. | Enterprise computer investigation system |
US7017186B2 (en) * | 2002-07-30 | 2006-03-21 | Steelcloud, Inc. | Intrusion detection system using self-organizing clusters |
US7660980B2 (en) * | 2002-11-18 | 2010-02-09 | Liquidware Labs, Inc. | Establishing secure TCP/IP communications using embedded IDs |
US20040162781A1 (en) | 2003-02-14 | 2004-08-19 | Kennsco, Inc. | Monitoring and alert systems and methods |
BRPI0416101A (en) | 2003-10-29 | 2007-01-02 | Ibm | information system, load control method, load control program and recording media |
EP1695167A1 (en) | 2003-12-17 | 2006-08-30 | Telecom Italia S.p.A. | Method and apparatus for monitoring operation of processing systems, related network and computer program product therefor |
WO2005093607A1 (en) | 2004-02-27 | 2005-10-06 | Ebay Inc. | Method and system to monitor a diverse heterogeneous application environment |
JP2006053788A (en) | 2004-08-12 | 2006-02-23 | Ntt Docomo Inc | Software operation monitoring device and software operation monitoring method |
US7979404B2 (en) | 2004-09-17 | 2011-07-12 | Quest Software, Inc. | Extracting data changes and storing data history to allow for instantaneous access to and reconstruction of any point-in-time data |
US20060069540A1 (en) | 2004-09-28 | 2006-03-30 | Krutz Ronald L | Methodology for assessing the maturity and capability of an organization's computer forensics processes |
WO2006056223A1 (en) | 2004-11-26 | 2006-06-01 | Telecom Italia S.P.A. | Instrusion detection method and system, related network and computer program product therefor |
DE102005039192A1 (en) | 2005-08-18 | 2007-03-01 | Siemens Ag | Method for fault analysis of a data stream, in particular a real-time data stream, in a data network, communication system and monitoring computer |
US20070139231A1 (en) | 2005-10-19 | 2007-06-21 | Advanced Digital Forensic Solutions, Inc. | Systems and methods for enterprise-wide data identification, sharing and management in a commercial context |
US7644138B2 (en) | 2005-12-06 | 2010-01-05 | David Sun | Forensics tool for examination and recovery and computer data |
CN100393046C (en) | 2005-12-06 | 2008-06-04 | 南京邮电大学 | Analogue biological immunological mechanism invasion detecting method |
US8732824B2 (en) | 2006-01-23 | 2014-05-20 | Microsoft Corporation | Method and system for monitoring integrity of running computer system |
US20080120720A1 (en) | 2006-11-17 | 2008-05-22 | Jinhong Guo | Intrusion detection via high dimensional vector matching |
KR101336458B1 (en) | 2007-01-03 | 2013-12-04 | 주식회사 케이티 | System for Anomaly Detection of DNS Sever with Real Time in Internet and Method thereof |
US8185953B2 (en) | 2007-03-08 | 2012-05-22 | Extrahop Networks, Inc. | Detecting anomalous network application behavior |
CN101350052B (en) * | 2007-10-15 | 2010-11-03 | 北京瑞星信息技术有限公司 | Method and apparatus for discovering malignancy of computer program |
US8886779B2 (en) | 2007-10-19 | 2014-11-11 | Oracle America, Inc. | Performance modeling for SOA security appliance |
CN101425936B (en) | 2007-10-30 | 2011-08-31 | 北京启明星辰信息技术股份有限公司 | Macro network security status assessment method based on exception measurement |
US20080065811A1 (en) | 2007-11-12 | 2008-03-13 | Ali Jahangiri | Tool and method for forensic examination of a computer |
US20110040812A1 (en) * | 2007-12-20 | 2011-02-17 | Virtual Computer, Inc. | Layered Virtual File System |
US7930260B2 (en) | 2008-02-14 | 2011-04-19 | Ebay Inc. | System and method for real time pattern identification |
US7903566B2 (en) * | 2008-08-20 | 2011-03-08 | The Boeing Company | Methods and systems for anomaly detection using internet protocol (IP) traffic conversation data |
GB0816556D0 (en) * | 2008-09-10 | 2008-10-15 | Univ Napier | Improvements in or relating to digital forensics |
US9208453B2 (en) | 2009-02-13 | 2015-12-08 | Paypal, Inc. | Targeted multi-dimension data extraction for real-time analysis |
US20110035804A1 (en) | 2009-04-07 | 2011-02-10 | Pratyush Moghe | Appliance-based parallelized analytics of data auditing events |
KR20100120823A (en) | 2009-05-07 | 2010-11-17 | 충남대학교산학협력단 | Voip anomaly traffic detection method with flow-level data |
US20110153748A1 (en) * | 2009-12-18 | 2011-06-23 | Electronics And Telecommunications Research Institute | Remote forensics system based on network |
WO2012154658A2 (en) | 2011-05-06 | 2012-11-15 | University Of North Carolina At Chapel Hill | Methods, systems, and computer readable media for efficient computer forensic analysis and data access control |
AU2012290426A1 (en) * | 2011-07-29 | 2014-02-20 | Hexagon Metrology, Inc. | Coordinate measuring system data reduction |
CN103765430A (en) | 2011-08-26 | 2014-04-30 | 惠普发展公司,有限责任合伙企业 | Data leak prevention system and method |
CN202172419U (en) | 2011-09-16 | 2012-03-21 | 四川创意信息技术股份有限公司 | Fault analysis processing system |
US8793790B2 (en) * | 2011-10-11 | 2014-07-29 | Honeywell International Inc. | System and method for insider threat detection |
CN102420723A (en) | 2011-12-14 | 2012-04-18 | 南京邮电大学 | Anomaly detection method for multi-class intrusion |
CN102539980A (en) | 2012-02-10 | 2012-07-04 | 南京弘毅电气自动化有限公司 | Protection fault panoramic data dumping method based on virtual sampling |
WO2013128428A2 (en) | 2012-03-02 | 2013-09-06 | Universidade De Aveiro | Method and system for the detection of anomalous sequences in a digital signal |
CN102664772B (en) | 2012-04-25 | 2015-03-04 | 东北大学 | Multi-scale detecting method of network flow anomaly in dynamic environment |
US9805078B2 (en) | 2012-12-31 | 2017-10-31 | Ebay, Inc. | Next generation near real-time indexing |
CN103617104B (en) | 2013-12-01 | 2017-01-04 | 中国船舶重工集团公司第七一六研究所 | A kind of redundancy computer system main passive detection method of node failure based on IPMI |
CN103744752B (en) | 2013-12-20 | 2015-09-30 | 北京交控科技有限公司 | A kind of online fault detection method of internal memory and device |
US9832217B2 (en) | 2014-03-13 | 2017-11-28 | International Business Machines Corporation | Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure |
GB201504612D0 (en) | 2015-03-18 | 2015-05-06 | Inquisitive Systems Ltd | Forensic analysis |
GB201708671D0 (en) | 2017-05-31 | 2017-07-12 | Inquisitive Systems Ltd | Forensic analysis |
-
2015
- 2015-03-18 GB GBGB1504612.1A patent/GB201504612D0/en not_active Ceased
-
2016
- 2016-03-10 CN CN201680015544.2A patent/CN107409134B/en active Active
- 2016-03-10 EP EP16715857.5A patent/EP3272097B1/en active Active
- 2016-03-10 US US15/558,340 patent/US10652255B2/en active Active
- 2016-03-10 SG SG11201707611SA patent/SG11201707611SA/en unknown
- 2016-03-10 WO PCT/GB2016/050659 patent/WO2016146973A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP3272097B1 (en) | 2019-07-03 |
CN107409134A (en) | 2017-11-28 |
WO2016146973A1 (en) | 2016-09-22 |
US20180069881A1 (en) | 2018-03-08 |
EP3272097A1 (en) | 2018-01-24 |
GB201504612D0 (en) | 2015-05-06 |
CN107409134B (en) | 2020-09-11 |
US10652255B2 (en) | 2020-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1258539A1 (en) | Micro-moment analysis | |
HK1251427A1 (en) | Image analysis | |
GB2554180B (en) | Spectrometric analysis | |
HK1252089A1 (en) | Solid forms | |
GB2602212B (en) | Spectrometric analysis | |
GB201708671D0 (en) | Forensic analysis | |
GB2538731B (en) | Methods | |
SG11201707611SA (en) | Forensic analysis | |
GB201518762D0 (en) | Methods | |
GB201508927D0 (en) | Methods | |
GB201517241D0 (en) | DNA modification | |
GB201515655D0 (en) | Methods | |
PT3391016T (en) | Sampler | |
GB201517585D0 (en) | Secure slide | |
GB201512609D0 (en) | Methods | |
GB2541635B (en) | Indenters | |
GB201521339D0 (en) | Methods | |
GB201520282D0 (en) | It | |
GB201519595D0 (en) | It | |
GB201519507D0 (en) | it | |
GB201519278D0 (en) | It | |
GB201518920D0 (en) | It | |
GB201518772D0 (en) | It | |
GB201518696D0 (en) | It | |
GB201518610D0 (en) | It |