GB2428315B - Network node security analysis method - Google Patents
Network node security analysis methodInfo
- Publication number
- GB2428315B GB2428315B GB0514211A GB0514211A GB2428315B GB 2428315 B GB2428315 B GB 2428315B GB 0514211 A GB0514211 A GB 0514211A GB 0514211 A GB0514211 A GB 0514211A GB 2428315 B GB2428315 B GB 2428315B
- Authority
- GB
- United Kingdom
- Prior art keywords
- network node
- analysis method
- security analysis
- node security
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H04L29/06884—
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
- G06F9/4856—Task life-cycle, e.g. stopping, restarting, resuming execution resumption being on a different machine, e.g. task migration, virtual machine migration
- G06F9/4862—Task life-cycle, e.g. stopping, restarting, resuming execution resumption being on a different machine, e.g. task migration, virtual machine migration the task being a mobile agent, i.e. specifically designed to migrate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0514211A GB2428315B (en) | 2005-07-11 | 2005-07-11 | Network node security analysis method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0514211A GB2428315B (en) | 2005-07-11 | 2005-07-11 | Network node security analysis method |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB0514211D0 GB0514211D0 (en) | 2005-08-17 |
| GB2428315A GB2428315A (en) | 2007-01-24 |
| GB2428315B true GB2428315B (en) | 2010-02-17 |
Family
ID=34897061
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0514211A Expired - Fee Related GB2428315B (en) | 2005-07-11 | 2005-07-11 | Network node security analysis method |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2428315B (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7938325B2 (en) | 2007-05-16 | 2011-05-10 | Lynch Marks Llc | Inbound receiving system |
| US7904394B2 (en) | 2007-05-16 | 2011-03-08 | Lynch Marks, LLC | Documenting mail work flow |
| US20240069544A1 (en) * | 2022-08-25 | 2024-02-29 | University Of South Florida | Control of multiagent networks with misbehaving vehicles over directed network topologies |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2415580A (en) * | 2004-06-24 | 2005-12-28 | Toshiba Res Europ Ltd | Network node security analysis using mobile agents |
-
2005
- 2005-07-11 GB GB0514211A patent/GB2428315B/en not_active Expired - Fee Related
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2415580A (en) * | 2004-06-24 | 2005-12-28 | Toshiba Res Europ Ltd | Network node security analysis using mobile agents |
Non-Patent Citations (2)
| Title |
|---|
| Borselius, N et al. "On mobile agent based transactions in moderately hostile environments", 29 April 2001 [Accessed on 15 September 2005]Available from http://www.isg.rhul.ac.uk/research/pub/year00-01.shtmlàyear01 * |
| Jansen W et al. "NIST Special Publication 800-19- Mobile Agent Security" October 1999, [Accessed 15 September 2005], Available from http://csrc.nist.gov/publications/nistpubs/800-19/sp800-19.pdf * |
Also Published As
| Publication number | Publication date |
|---|---|
| GB0514211D0 (en) | 2005-08-17 |
| GB2428315A (en) | 2007-01-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB2415580B (en) | Network node security analysis method | |
| EP1839405A4 (en) | Network security system | |
| GB2432992B (en) | Network planning | |
| GB0505633D0 (en) | Network optimisation | |
| IL184645A0 (en) | Communications network system and methods for using same | |
| GB2418326B (en) | Network vitrualization | |
| EP1856862A4 (en) | System and methods for network reachability detection | |
| GB2430581B (en) | Access router selection method | |
| GB0512647D0 (en) | Communication method | |
| EP2096586A4 (en) | Form making system, network system using same, and form making method | |
| GB2427490B (en) | Network usage management system and method | |
| ZA200601696B (en) | Data-driven action for network forms | |
| GB0418959D0 (en) | Mesh network evaluation methods | |
| GB2425680B (en) | Network analysis | |
| EP1849263A4 (en) | Ethernet-based systems and methods for improved network routing | |
| GB0509898D0 (en) | Analysis method | |
| GB0607074D0 (en) | System and method for partitioning network analysis | |
| GB0414233D0 (en) | Analysis method | |
| GB0609098D0 (en) | Dynamic network security | |
| GB2428315B (en) | Network node security analysis method | |
| GB2413738B (en) | Monitoring network access | |
| GB0413950D0 (en) | Sanitizing method | |
| GB0416484D0 (en) | Network | |
| EP1964038A4 (en) | Network alarm management | |
| GB0518935D0 (en) | A security analysis method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20130711 |