Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic; Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
INTRUSION DETECTION BASED ON IMPLICIT ACTIVE LEARNING
#2ELECTRONIC APPARATUS FOR IMPLEMENTING HONEYPOT CONTROL SYSTEM AND CONTROL METHOD THEREOF
#3LAYERED CYBERSECURITY USING SPURIOUS DATA SAMPLES
#4SYSTEMS, METHODS, AND APPARATUSES FOR ACTIVATING A DECOY RESOURCE BASED ON DURESS TRIGGERS IN AN ELECTRONIC NETWORK
#5CYBER SECURITY SYSTEM AND METHOD USING INTELLIGENT AGENTS
#6INTERCEPTING WORTHLESS REQUESTS AT THE NETWORK EDGE USING MACHINE LEARNING
#7DETERMINING UNAUTHORISED REQUESTS FROM SENDERS OF AN ELECTRONIC COMMUNICATION
#8HONEYPOT ENTITY AND METHOD OF OPERATING THE SAME
#9Cyber Security Deception System
#10METHOD AND APPARATUS FOR DDoS ATTACK DETECTION AND MITIGATION IN IoT NETWORK SLICES OF 5G NETWORKS
#11APPLICATION FIREWALL
#12System and Method for Detecting and Preventing Model Inversion Attacks
#13DNS REQUEST OBFUSCATION
#14DETECTING ANOMALOUS COMMUNICATIONS
#15NETWORK-BASED SECURITY WITH DECOYS AND DECEPTIVE BALANCING
#16METHOD, APPARATUS, AND SYSTEM TO MAP NETWORK REACHABILITY
#17TECHNIQUES FOR INCENTIVIZED INTRUSION DETECTION SYSTEM
#18Calculation of Security Risk Score of Network Security Services
#19SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR EVALUATING MULTI-DIMENSIONAL SYNTHETIC DATA USING INTEGRATED VARIANTS ANALYSIS
#20ATTACK DETECTION SYSTEM
#21Risk Mitigation Effectiveness Score of Network Security Services
#22REVEALING BYZANTINE ATTACKERS THROUGH SMART RE-CLUSTERING IN FEDERATED LEARNING
#23MALWARE DETECTION BASED ON USER INTERACTIONS
#24EXPEDITED RECOVERY BASED ON DATA STORAGE MANAGEMENT INTEGRATION WITH CYBER THREAT DECEPTION
#25DATA STORAGE MANAGEMENT SYSTEM INTEGRATING CYBER THREAT DECEPTION
#26SYSTEMS AND METHODS TO IDENTIFY NEURAL NETWORK BRITTLENESS BASED ON SAMPLE DATA AND SEED GENERATION
#27Cybersecurity Risk Analysis and Modeling of Risk Data on an Interactive Display
#28MACHINE LEARNING DATASET GENERATION USING A NATURAL LANGUAGE PROCESSING TECHNIQUE
#29Honeypot Network Management Based on Probabilistic Detection of Malicious Port Activity
#30METHODS AND SYSTEMS FOR HONEYFILE CREATION, DEPLOYMENT AND MANAGEMENT
#31Deception-Based Responses to Security Attacks
#32RISK ANALYSIS DEVICE, ANALYSIS TARGET ELEMENT DETERMINATION DEVICE, AND METHOD
#33DECEPTION-BASED FIREWALL ENHANCEMENT
#34Deceiving Attackers Accessing Network Data
#35HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE
#36DECEIVING ATTACKERS ACCESSING ACTIVE DIRECTORY DATA
#37HONEYPOTS FOR INFRASTRUCTURE-AS-A-SERVICE SECURITY
#38SYSTEM AND METHOD FOR GENERATING CYBER THREAT INTELLIGENCE
#39SYSTEMS AND METHODS FOR SYNTHETIC DATA GENERATION FOR TIME-SERIES DATA USING DATA SEGMENTS
#40Breach prediction via machine learning
#41QUANTUM SECURE DIRECT COMMUNICATION WITH MUTUAL AUTHENTICATION VIA ROTATION OF AN ARBITRARY BASIS
#42Method for ransomware strike detection and defense, and ransomware security operations center (SOC)
#43METHOD TO PREVENT ROOT LEVEL ACCESS ATTACK AND MEASURABLE SLA SECURITY AND COMPLIANCE PLATFORM
#44EDGE-BASED DECENTRALIZED INTRUSION AND ANOMALY DETECTION
#45Enhancing network security
#46Enhancing network security
#47Enhancing network security
#48Enhancing network security
#49DATA MODEL GENERATION USING GENERATIVE ADVERSARIAL NETWORKS
#50Deceiving attackers accessing network data
#51DETERMINING INTENT OF PHISHERS THROUGH ACTIVE ENGAGEMENT
#52Systems and methods for motion correction in synthetic images
#53REAL-TIME SYNTHETICALLY GENERATED VIDEO FROM STILL FRAMES
#54Method to prevent root level access attack and measurable SLA security and compliance platform
#55SYSTEMS AND METHODS FOR REPORTING BASED SIMULATED PHISHING CAMPAIGN
#56SYSTEMS AND METHODS FOR AUTOMATED MALICIOUS CODE REPLACEMENT
#57HONEYPOT IDENTIFICATION METHOD, APPARATUS, DEVICE, AND MEDIUM BASED ON CYBERSPACE MAPPING
#58METHOD AND SYSTEM FOR GENERATING DECOY FILES USING A DEEP LEARNING ENGINE FOR PROTECTION AGAINST RANSOMWARE ATTACKS
#59SECURE SENTINEL NETWORK
#60DETECTING PHISHING ATTACKS
#61CONTEXT-AWARE SERVICE QUERY FILTERING
#62SYSTEMS AND METHODS FOR REMOVING IDENTIFIABLE INFORMATION
#63SYSTEMS AND METHODS FOR SYNTHETIC DATA GENERATION
#64System and method for detection of malicious interactions in a computer network
#65UNCHEATABLE FEDERATED LEARNING
#66TRACKING A POTENTIAL ATTACKER ON AN EXTERNAL COMPUTER SYSTEM
#67Multiple personality deception systems
#68Socket transferring for HPC networks using kernel tracing
#69Cloud-based deception technology with auto-decoy and breadcrumb creation
#70Cloud-based deception technology with granular scoring for breach detection
#71Cloud-based deception technology utilizing zero trust to identify threat intelligence, telemetry, and emerging adversary tactics and techniques
#72METHODS AND SYSTEM FOR PROVIDING SECURITY TO CRITICAL SYSTEMS CONNECTED TO A COMPUTER NETWORK
#73Network threat prevention
#74Systems and methods to improve data clustering using a meta-clustering model
#75Endpoint and remote server protection
#76SECURITY MANAGEMENT METHOD AND SYSTEM FOR BLENDED ENVIRONMENT
#77SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE DRIVEN AGENT TO AUTOMATE ASSESSMENT OF ORGANIZATIONAL VULNERABILITIES
#78Method, apparatus, and system to map network reachability
#79Method for automatic aggregating and enriching data from honeypots
#80Artificial virtual machine for preventing malware execution by applying virtual machine characteristics in real computing environments
#81Migration of traffic flows
#82SYSTEMS AND METHODS FOR SYNTHETIC DATABASE QUERY GENERATION
#83Application self-defense through deceptive message transmission
#84Implementing decoys in a network environment
#85Methods and systems for deep learning based API traffic security
#86HOW TO CONFUSE ADVERSARIAL ENVIRONMENT MAPPING TOOLS
#87Socket transferring for HPC networks using kernel tracing
#88HIGH SPEED TRUST EVALUATION FOR FILE ACTIVITY
#89Techniques for incentivized intrusion detection system
#90CLEANING RECOVERY METHOD AND DEVICE FOR HETEROGENEOUS EXECUTOR IN MIMICRY SWITCH, AND MIMICRY SWITCH
#91DYNAMIC ONLINE BANKING HONEYPOT ACCOUNT SYSTEM
#92Dynamic virtual honeypot utilizing honey tokens and data masking
#93Wireless network that discovers hotspots for cyberattacks based on social media data
#94LOOKALIKE DOMAIN IDENTIFICATION
#95Detecting threat pathways using sequence graphs
#96CLOUD-BASED SECURITY FOR IDENTITY IMPOSTER
#97INJECTING COMPUTING CODE FOR DETECTION OF MALICIOUS COMPUTING ATTACKS DURING SUSPICIOUS DEVICE BEHAVIOR
#98Coordinated privacy for targeted communications and reporting
#99Procedures for Improving Security in an Electronic Communications Network
#100TUNNELING FOR NETWORK DECEPTIONS
#101System, method, and computer-accessible medium for evaluating multi-dimensional synthetic data using integrated variants analysis
#102Methods for protecting pattern classification node from malicious requests and related networks and nodes
#103Method to prevent root level access attack and measurable SLA security and compliance platform
#104SYSTEMS AND METHODS FOR CENSORING TEXT INLINE
#105METHOD AND COMPUTER PROGRAM PRODUCT FOR HACKING DETECTION
#106Systems and methods for building a honeypot system
#107Preventing network discovery by untrusted devices
#108CONCRETE FOUNDATION FORM
#109METHODS AND SYSTEMS FOR HONEYFILE CREATION, DEPLOYMENT, AND MANAGEMENT
#110Intelligent Friction for Authentication Methods and Systems
#111Systems and methods for creation, management, and storage of honeyrecords
#112DECEPTION SYSTEM
#113SYSTEM AND METHOD FOR DETECTION AND DEFLECTION OF ATTACKS ON IN-VEHICLE CONTROLLERS AND NETWORKS
#114Method and system for generating stateful attacks
#115Intrusion detection system enrichment based on system lifecycle
#116Intrusion management with threat type clustering
#117CONTAINING COMPROMISED CREDENTIALS USING DECEPTION SYSTEMS
#118High-fidelity model-driven deception platform for cyber-physical systems
#119SYSTEMS AND METHODS OF EVALUATING PROBE ATTRIBUTES FOR SECURING A NETWORK
#120Using cloned accounts to track attacks on user accounts
#121Defense of targeted database attacks through dynamic honeypot database response generation
#122Application firewall
#123Systems and methods for polluting phishing campaign responses
#124CREDENTIAL RENEWAL CONTINUITY FOR APPLICATION DEVELOPMENT
#125AUTOMATICALLY SCALABLE SYSTEM FOR SERVERLESS HYPERPARAMETER TUNING
#126Large scale high-interactive honeypot farm
#127Smart proxy for a large scale high-interaction honeypot farm
#128Detecting and Preventing Transmission of Spam Messages Using Modified Source Numbers
#129Dynamic honeypots
#130MEMORY DECOYS
#131Network intrusion counter-intelligence
#132Monitoring system for securing networks from hacker drones
#133Automatic generation of deceptive API endpoints
#134Systems and methods for AIDA based grouping
#135Automated honeypot creation within a network
#136Dataset connector and crawler to identify data lineage and segment data
#137METHOD AND SYSTEM FOR DETECTING MALICIOUS INFRASTRUCTURE
#138SYSTEMS AND METHODS FOR REPLACING SENSITIVE DATA
#139Wireless network that discovers hotspots for cyberattacks based on social media data
#140Methods and systems for preventing malicious activity in a computer system
#141Live state transition using deception systems
#142Method and Apparatus for Evaluating Phishing Sites to Determine Their Level of Danger and Profile Phisher Behavior
#143User responses to cyber security threats
#144AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTION
#145DETECTION DEVICE, DETECTION METHOD, AND DETECTION PROGRAM
#146Methods and systems for API deception environment and API traffic control and security
#147BESPOKE HONEYPOT (CHIMAERA) FOR NETWORK SECURITY
#148Method for detecting intrusion in distributed field bus of a network and system thereof
#149Demand management of sender of network traffic flow
#150COMPUTER SECURITY BASED ON ARTIFICIAL INTELLIGENCE
#151Optimization of redundant usage patterns based on historical data and security constraints
#152Security system with 5G network traffic incubation
#153Detection of privilege escalation attempts within a computer network
#154Malware detection based on user interactions
#155LEVERAGING NETWORK SECURITY SCANNING TO OBTAIN ENHANCED INFORMATION REGARDING AN ATTACK CHAIN INVOLVING A DECOY FILE
#156METHODS AND SYTEMS FOR IMPLEMENTING A PHISHING ASSESSMENT
#157Reinforcement learning for application responses using deception technology
#158Trend-aware combo-squatting detection
#159SYSTEMS AND METHODS FOR QUICKLY SEARCHING DATASETS BY INDEXING SYNTHETIC DATA GENERATING MODELS
#160Protecting from directory enumeration using honeypot pages within a network directory
#161DECEPTION USING SCREEN CAPTURE
#162DETECTING MALICIOUS ACTIVITY IN A CLUSTER
#163Dynamic maze honeypot response system
#164Intrusion detection with honeypot keys
#165Cyber threat deception method and system, and forwarding device
#166Systems and methods for reporting based simulated phishing campaign
#167SYSTEM AND METHOD FOR ROGUE DEVICE DETECTION
#168HONEYPOT HOST
#169Methods and systems for honeyfile creation, deployment and management
#170Approaches for securing middleware data access
#171Monitoring and reporting connection attempts in a network
#172Authentication using client login metrics
#173Generating action recommendations for courses of action used for incident response
#174Cyber security system and method using intelligent agents
#175Tagging network data
#176Document Tracking Method, Gateway Device, and Server
#177Utilization of deceptive decoy elements to identify data leakage processes invoked by suspicious entities
#178Real-time synthetically generated video from still frames
#179LIFELONG LEARNING BASED INTELLIGENT, DIVERSE, AGILE, AND ROBUST SYSTEM FOR NETWORK ATTACK DETECTION
#180Systems and methods for aida based A/B testing
#181Maintaining interactive session continuity in honeypot deployments
#182Honeypot opaque credential recovery
#183Systems and methods for removing identifiable information
#184Behavior management of deception system fleets
#185Honeypot deployment based on lifecycle of protected hosts
#186Ratio-based management of honeypot fleets
#187Systems and methods for motion correction in synthetic images
#188Intelligent-interaction honeypot for IoT devices
#189Large scale high-interactive honeypot farm
#190Smart proxy for a large scale high-interaction honeypot farm
#191Honeypot asset cloning
#192Automated preemptive polymorphic deception
#193Parallel scheduling of encryption engines and decryption engines to prevent side channel attacks
#194Systems and methods to identify breaking application program interface changes
#195Machine learning dataset generation using a natural language processing technique
#196DETECTION AND REMEDIATION OF MALICIOUS NETWORK TRAFFIC USING TARPITTING
#197IDENTIFICATION OF SOFTWARE ROBOT ACTIVITY
#198Systems and methods for detecting a suspicious process in an operating system environment using a file honeypots
#199Management of botnet attacks to a computer network
#200Network application firewall
#201Systems and methods for artificial intelligence driven agent campaign controller
#202System and method for protecting a communication device against identification outside a computer network by routing traffic through a smart hub
#203Protecting network-based services using deception in a segmented network environment
#204COMMUNICATION CONTROL DEVICE
#205Systems and methods for AIDA based grouping
#206MONITORING APPARATUS, MONITORING METHOD, AND PROGRAM
#207Network security blacklist derived from honeypot statistics
#208Generating false data for suspicious users
#209Machine learning dataset generation using a natural language processing technique
#210Systems and methods for synthetic data generation for time-series data using data segments
#211Attacker detection via fingerprinting cookie mechanism
#212REAL-TIME NOTIFICATIONS ON DATA BREACH DETECTED IN A COMPUTERIZED ENVIRONMENT
#213Honeypots for infrastructure-as-a-service security
#214Smart exposure of data to known attacker sessions
#215Identifier-based application security
#216Methods, systems and media for evaluating layered computer security products
#217Disinformation ecosystem for cyber threat intelligence collection
#218System and method for preventing unwanted bundled software installation
#219SYSTEMS AND METHODS FOR PROTECTION FROM PHISHING ATTACKS
#220Software defined networking moving target defense honeypot
#221Automated honeypot creation within a network
#222Techniques for incentivized intrusion detection system
#223Augmented data collection from suspected attackers of a computer network
#224User responses to cyber security threats
#225Tunneling for network deceptions
#226Message platform for automated threat simulation, reporting, detection, and remediation
#227Systems and methods for AIDA based A/B testing
#228DYNAMIC ENDPOINT ISOLATION IN A CRYPTOGRAPHICALLY-SEGMENTED NETWORK
#229Systems and methods for intrusion detection and prevention using software patching and honeypots
#230Method and apparatus for defending against network attack
#231Method to prevent root level access attack and measurable SLA security and compliance platform
#232Method to prevent root level access attack and measurable SLA security and compliance platform
#233CandC domain name analysis-based botnet detection method, device, apparatus and medium
#234Smart bits
#235Methods and systems for reducing unwanted data traffic in a computer network
#236REPLAYABLE HACKTRAPS FOR INTRUDER CAPTURE WITH REDUCED IMPACT ON FALSE POSITIVES
#237Deceiving attackers in endpoint systems
#238REACTIVE AND PRE-EMPTIVE SECURITY SYSTEM FOR THE PROTECTION OF COMPUTER NETWORKS & SYSTEMS
#239Detecting and monitoring location of wireless-enabled devices in a physical space
#240Systems and methods for using DNS messages to selectively collect computer forensic data
#241Method and apparatus for trusted display on untrusted computing platforms to secure applications
#242CONFIGURING SECURITY POLICIES IN RESPONSE TO DETECTING A PIVOT OF AN INTRUSION
#243Systems and methods for AIDA based grouping
#244Malicious data manipulation detection using markers and the data protection layer
#245Network traffic sending method and apparatus, and hybrid honeypot system
#246Device, system and method for defending a computer network
#247Domain specific language for threat-actor deception
#248Methods and systems for deep learning based API traffic security
#249Systems and methods to improve data clustering using a meta-clustering model
#250AUTOMATED GENERATION AND DEPLOYMENT OF HONEY TOKENS IN PROVISIONED RESOURCES ON A REMOTE COMPUTER RESOURCE PLATFORM
#251Deception-based responses to security attacks
#252Deception-Based Responses to Security Attacks
#253Controlling access to external networks by an air-gapped endpoint
#254OPERATING A SECURITY ZONE ON AN AIR-GAPPED ENDPOINT
#255Method for rendering virtual desktops on an air-gapped endpoint
#256Network attack tainting and tracking
#257Systems and methods for using artificial intelligence driven agent to automate assessment of organizational vulnerabilities
#258Deceiving attackers accessing network data
#259METHOD AND SYSTEM FOR SYNTHETIC GENERATION OF TIME SERIES DATA
#260Method, apparatus, and system to map network reachability
#261Transient Transaction Server
#262Multivariate network structure anomaly detector
#263System and method for determining use of non-human users in a distributed computer network environment
#264System, method, and computer-accessible medium for evaluating multi-dimensional synthetic data using integrated variants analysis
#265Systems and methods to identify breaking application program interface changes
#266MALWARE INSPECTION SUPPORT SYSTEM AND MALWARE INSPECTION SUPPORT METHOD
#267Security Network Interface Controller (SNIC) Preprocessor with Cyber Data Threat Detection and Response Capability that Provides Security Protection for a Network Device with Memory or Client Device with Memory or Telecommunication Device with Memory
#268Concrete foundation form
#269Methods and systems for honeyfile creation, deployment and management
#270Systems and methods for preventive ransomware detection using file honeypots
#271Systems and methods for AIDA based A/B testing
#272Adaptive malicious network traffic response
#273Virtual trap protection of data elements
#274Generation of honeypot data
#275Dynamic honeypots
#276Methods and systems for API deception environment and API traffic control and security
#277Identifying and circumventing security scanners
#278Generating false data for suspicious users
#279Method and system of mitigating network attacks
#280DECOY APPARATUS AND METHOD FOR EXPANDING FAKE ATTACK SURFACE USING DECEPTION NETWORK
#281Cognitive virtual detector
#282Processing system for providing console access to a cyber range virtual environment
#283System and method for detecting malicious payment transaction activity using aggregate views of payment transaction data in a distributed network environment
#284Network security attack detection and mitigation solution using honeypots
#285Approaches for securing middleware data access
#286PHYSICAL AND LOGICAL ATTACK RESILIENT POLYMORPHIC HARDWARE
#287System and method for vetting mobile phone software applications
#288TECHNIQUES FOR SECURING CREDENTIALS USED BY FUNCTIONS
#289Systems and methods to identify neural network brittleness based on sample data and seed generation
#290Intrusion detection with honeypot keys
#291Moving target defense with network level changes providing substantially continuous access to applications
#292Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network
#293Method and system for identifying a preferred set of hierarchically structured items in streaming data
#294MALWARE DETECTION SYSTEM
#295Honeypot asset cloning
#296Authentication apparatus
#297Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity
#298GENERATING HIGHLY REALISTIC DECOY EMAIL AND DOCUMENTS
#299High-fidelity model-driven deception platform for cyber-physical systems
#300Network security attack misdirection on a transport vehicle