Patent application number | Description | Published |
20130276121 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING A FILE USED TO AUTOMATICALLY LAUNCH CONTENT AS UNWANTED - A system, method, and computer program product are provided for identifying a file utilized to automatically launch content as unwanted. In one embodiment, a file is identified in response to a detection of unwanted code, the file utilized to automatically launch content. Additionally, it is determined whether an identifier associated with the unwanted code is included in the file. Further, the file is identified as unwanted based on the determination. | 10-17-2013 |
20140344928 | SYSTEMS AND METHODS FOR RISK RATING AND PRO-ACTIVELY DETECTING MALICIOUS ONLINE ADS - Methods and systems for risk rating and pro-actively detecting malicious online ads are described. In one example embodiment, a system for risk rating and pro-actively detecting malicious online ads includes an extraction module, an analysis engine, and a filter module. The extraction module is configured to extract a SWF file from a web page downloaded by the system. The analysis engine is communicatively coupled to the extraction module. The analysis engine is configured to determine a risk rating for the SWF file and send the risk rating to a web application for display. In an example, determining the risk rating includes locating an embedded redirection URL and determining a risk rating for the embedded redirection URL. The filter module is configured to determine, based on the risk rating, whether to block the SWF file and send a warning to the web application for display. | 11-20-2014 |
Patent application number | Description | Published |
20110219448 | SYSTEMS AND METHODS FOR RISK RATING AND PRO-ACTIVELY DETECTING MALICIOUS ONLINE ADS - Methods and systems for risk rating and pro-actively detecting malicious online ads are described. In one example embodiment, a system for risk rating and pro-actively detecting malicious online ads includes an extraction module, an analysis engine, and a filter module. The extraction module is configured to extract a SWF file from a web page downloaded by the system. The analysis engine is communicatively coupled to the extraction module. The analysis engine is configured to determine a risk rating for the SWF file and send the risk rating to a web application for display. In an example, determining the risk rating includes locating an embedded redirection URL and determining a risk rating for the embedded redirection URL. The filter module is configured to determine, based on the risk rating, whether to block the SWF file and send a warning to the web application for display. | 09-08-2011 |
20110321160 | SYSTEMS AND METHODS TO DETECT MALICIOUS MEDIA FILES - Systems and method to detect malicious media file are described. In one example, an apparatus including a network connection, a memory, and a programmable processor communicatively coupled to the memory is discussed. The memory can include instructions, which when executed by the programmable processor cause the apparatus to receive a data stream from the network connection and detect at least a portion of a media file within the data stream. The instructions can also cause the apparatus to determine a file type of the media file and extract the media file from the data stream. Further, the instructions cause the apparatus to parse the media file to location a suspicious tag, extract an embedded URL from the suspicious tag, determine with the embedded URL is malicious, and block the media file if the embedded URL is malicious. | 12-29-2011 |
Patent application number | Description | Published |
20100329147 | Inter-node link aggregation system and method - A method and apparatus for link aggregation in a data communications network. A dual-layer link aggregation is formed, including two peer nodes, each connected to at least a third node. The dual-layer link aggregation is formed of a peer link aggregation of ports for communicating with a peer node, distant link aggregation of ports for communicating with a third node, and an outer-layer link aggregation of the ports included in the peer link aggregation and the distant link aggregation. The third node may implement an inter-node link aggregation aggregating links to each of the peer nodes. Packets may be received and forwarded by the peer nodes in such a manner as to each link aggregation to be active simultaneously. | 12-30-2010 |
20110176544 | Link aggregation flood control - A network interfaced unit includes a first data processing device, a second data processing device coupled to the first data processing device, memory coupled to the first data processing device, and instructions accessible from the memory by the first data processing device. The instructions are configured for causing the first data processing device to carry out operations for causing a copy of a frame received by the second data processing device to be received by the first data processing device in response to a destination address of the frame failing to be found in an address lookup table accessibly by the second data processing device and for causing the first data processing device to query other network interface units after receiving the copy of the frame for determining if the destination address of the frame has been learned on any one of the other network interface units. | 07-21-2011 |
20120033665 | SYSTEM AND METHOD FOR MULTI-CHASSIS LINK AGGREGATION - Aggregation Switches connected to an edge node by a multi-chassis link aggregation group, wherein the Aggregation Switches are connected by a virtual fabric link that provides a connection for exchange of information between the Aggregation Switches regarding MAC addressing to synchronize MAC address tables. | 02-09-2012 |
20120033669 | SYSTEM AND METHOD FOR TRAFFIC DISTRIBUTION IN A MULTI-CHASSIS LINK AGGREGATION - A pair of aggregation switches is connected to an edge node by a multi-chassis link aggregation group, wherein the aggregation switches are connected by a virtual fabric link (VFL) for exchange of information between the Aggregation Switches. The VFL includes a plurality of subsets of VFL physical links, wherein each subset is connected to a different pair of network interface modules on the Aggregation Switches. Traffic distribution across the plurality of subsets of VFL physical links is based on destination hardware device information in a pre-pended header of packets and/or based on a load balancing identifier in the pre-pended header. | 02-09-2012 |
20120033678 | MULTI-CHASSIS INTER-PROCESS COMMUNICATION - Aggregation Switches connected via a virtual fabric link (VFL) are each active and able to communicate via an inter-process communication (IPC) using an IPC Virtual Local Area Network (IPC VLAN). A sub-set of Customer-facing ports (CFPs) of each Aggregation Switch are coupled to the VFL and assigned to the IPC VLAN to enable communication therebetween. | 02-09-2012 |
20140185622 | Method And Apparatus For Network Security - A method of securely routing data traffic between communication networks. In an integrated security device, a host router supports a virtual router that peers with VRF (virtual routing and forwarding) instances associated with participating networks on the host router. Each VRF instance preferably runs its own dynamic routing protocol and determines when received data traffic may be directly forwarded from one network to another and when it must be forwarded to an OE (offload engine) for enforcement of security policies or NAT (network address translation) processing. | 07-03-2014 |
20140286345 | Layered Third Party Application Software Redundancy in a Non-Homogenous Virtual Chassis - Layered third-party (enhanced) application software redundancy is provided in a non-homogeneous virtual chassis including two or more switches coupled via a virtual fabric link. A virtual chassis management module within at least one of the switches discovers the other switches within the virtual chassis, determines a base master switch from all of the switches in the virtual chassis, detects an enhanced application installed on at least one enhanced switch and determines an enhanced master switch from the enhanced switches. | 09-25-2014 |
20140372576 | SYSTEM, METHOD, AND APPARATUS FOR NETWORK FABRIC CONFIGURATION IN DATA COMMUNICATION NETWORKS - An auto fabric configuration (AFC) mode is provided to enable network elements, when added to a data communication network, to discover each other, using TLVs added to standard protocols. The AFC mode further allows for automatic configuration of the network fabric. For example, core features, such as link aggregation, Virtual Local Area Networks (VLANs) and Shortest Path Bridging (SPB) adjacencies, can be automatically configured. | 12-18-2014 |