[go: up one dir, main page]

GB2428315B - Network node security analysis method - Google Patents

Network node security analysis method

Info

Publication number
GB2428315B
GB2428315B GB0514211A GB0514211A GB2428315B GB 2428315 B GB2428315 B GB 2428315B GB 0514211 A GB0514211 A GB 0514211A GB 0514211 A GB0514211 A GB 0514211A GB 2428315 B GB2428315 B GB 2428315B
Authority
GB
United Kingdom
Prior art keywords
network node
analysis method
security analysis
node security
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB0514211A
Other versions
GB0514211D0 (en
GB2428315A (en
Inventor
Georgios Kalogridis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Europe Ltd
Original Assignee
Toshiba Research Europe Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Research Europe Ltd filed Critical Toshiba Research Europe Ltd
Priority to GB0514211A priority Critical patent/GB2428315B/en
Publication of GB0514211D0 publication Critical patent/GB0514211D0/en
Publication of GB2428315A publication Critical patent/GB2428315A/en
Application granted granted Critical
Publication of GB2428315B publication Critical patent/GB2428315B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L29/06884
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • G06F9/4856Task life-cycle, e.g. stopping, restarting, resuming execution resumption being on a different machine, e.g. task migration, virtual machine migration
    • G06F9/4862Task life-cycle, e.g. stopping, restarting, resuming execution resumption being on a different machine, e.g. task migration, virtual machine migration the task being a mobile agent, i.e. specifically designed to migrate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
GB0514211A 2005-07-11 2005-07-11 Network node security analysis method Expired - Fee Related GB2428315B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0514211A GB2428315B (en) 2005-07-11 2005-07-11 Network node security analysis method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0514211A GB2428315B (en) 2005-07-11 2005-07-11 Network node security analysis method

Publications (3)

Publication Number Publication Date
GB0514211D0 GB0514211D0 (en) 2005-08-17
GB2428315A GB2428315A (en) 2007-01-24
GB2428315B true GB2428315B (en) 2010-02-17

Family

ID=34897061

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0514211A Expired - Fee Related GB2428315B (en) 2005-07-11 2005-07-11 Network node security analysis method

Country Status (1)

Country Link
GB (1) GB2428315B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7938325B2 (en) 2007-05-16 2011-05-10 Lynch Marks Llc Inbound receiving system
US7904394B2 (en) 2007-05-16 2011-03-08 Lynch Marks, LLC Documenting mail work flow
US20240069544A1 (en) * 2022-08-25 2024-02-29 University Of South Florida Control of multiagent networks with misbehaving vehicles over directed network topologies

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2415580A (en) * 2004-06-24 2005-12-28 Toshiba Res Europ Ltd Network node security analysis using mobile agents

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2415580A (en) * 2004-06-24 2005-12-28 Toshiba Res Europ Ltd Network node security analysis using mobile agents

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Borselius, N et al. "On mobile agent based transactions in moderately hostile environments", 29 April 2001 [Accessed on 15 September 2005]Available from http://www.isg.rhul.ac.uk/research/pub/year00-01.shtmlàyear01 *
Jansen W et al. "NIST Special Publication 800-19- Mobile Agent Security" October 1999, [Accessed 15 September 2005], Available from http://csrc.nist.gov/publications/nistpubs/800-19/sp800-19.pdf *

Also Published As

Publication number Publication date
GB0514211D0 (en) 2005-08-17
GB2428315A (en) 2007-01-24

Similar Documents

Publication Publication Date Title
GB2415580B (en) Network node security analysis method
EP1839405A4 (en) Network security system
GB2432992B (en) Network planning
GB0505633D0 (en) Network optimisation
IL184645A0 (en) Communications network system and methods for using same
GB2418326B (en) Network vitrualization
EP1856862A4 (en) System and methods for network reachability detection
GB2430581B (en) Access router selection method
GB0512647D0 (en) Communication method
EP2096586A4 (en) Form making system, network system using same, and form making method
GB2427490B (en) Network usage management system and method
ZA200601696B (en) Data-driven action for network forms
GB0418959D0 (en) Mesh network evaluation methods
GB2425680B (en) Network analysis
EP1849263A4 (en) Ethernet-based systems and methods for improved network routing
GB0509898D0 (en) Analysis method
GB0607074D0 (en) System and method for partitioning network analysis
GB0414233D0 (en) Analysis method
GB0609098D0 (en) Dynamic network security
GB2428315B (en) Network node security analysis method
GB2413738B (en) Monitoring network access
GB0413950D0 (en) Sanitizing method
GB0416484D0 (en) Network
EP1964038A4 (en) Network alarm management
GB0518935D0 (en) A security analysis method

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20130711