1
Emilio Villa, Adrian Zidaritz, Michael David Varga, Gerhard Eschelbeck, Michael Kevin Jones, Mark James McArdle: Active firewall system and methodology. Network Associates, Patrick J S Inouye, Christopher J Hamaty, April 15, 2003: US06550012 (353 worldwide citation)

System and methodology providing automated or “proactive” network security (“active” firewall) are described. The system implements methodology for verifying or authenticating communications, especially between network security components thereby allowing those components to share information. In on ...


2
Mike Moran, Tauras Liubinskas, Jack Goral: Application performance monitoring expert. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, October 5, 2004: US06801940 (309 worldwide citation)

A system, method, and computer program product are provided for expert application performance analysis. An application is monitored. Performance data is gathered during the monitoring. A set of metrics is generated based on the performance data. A performance of the application is measured from at ...


3
Mike Moran, Tauras Liubinskas, Jack Goral: Prioritized data capture, classification and filtering in a network monitoring environment. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group, October 14, 2003: US06633835 (292 worldwide citation)

A system, method and computer program product are provided for adaptive priority data filtering. Data is collected from a network segment and classified into multiple flows. The flows are prioritized into high and low priority flows. High priority flows are stored in a high priority queue prior to p ...


4
Bryson P Gordon, Thor Ivar Ekle: Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, May 4, 2004: US06732157 (222 worldwide citation)

A system, method and computer program product are provided for filtering unwanted electronic mail messages. After receiving electronic mail messages, the electronic mail messages that are unwanted are filtered utilizing a combination of techniques including: compound filters, paragraph hashing, and ...


5
Handong Wu, Jerome Freedman, Christopher J Ivory: Network intrusion detection and analysis system and method. McAfee, Zilka Kotab PC, Christopher J Hamaty, February 17, 2009: US07493659 (214 worldwide citation)

An intrusion detection and analysis system and method are disclosed. The system includes a data monitoring device comprising a capture engine operable to capture data passing through the network and configured to monitor network traffic, decode protocols, and analyze received data. The system furthe ...


6
Cheuk W Ko, Jaisook Rho: Method and apparatus for providing a policy-driven intrusion detection system. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, September 7, 2004: US06789202 (192 worldwide citation)

One embodiment of the present invention provides a providing policy-driven intrusion detection system for a networked computer system. This system operates by receiving a global policy for intrusion detection for the networked computer system. This global policy specifies rules in the form of a glob ...


7
Michael C Pak, Victor Kouznetsov: Delayed-delivery quarantining of network communications having suspicious contents. McAfee, Zilka Kotab PC, Christopher J Hamaty, July 18, 2006: US07080408 (190 worldwide citation)

A system, method and computer program product are provided for network-based scanning for potentially malicious content. Incoming and/or outgoing network communications traveling over a network are monitored, preferably at a gateway. Potentially malicious content in the network communications is ide ...


8
Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Nicholas Paul Kelly: Detecting unwanted properties in received email messages. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, June 29, 2004: US06757830 (188 worldwide citation)

Received e-mail messages are subject to a minimum delay period determined in dependence upon characteristics of the e-mail message received. Prior to release of the e-mail message upon expiry of the minimum delay period a check is made that the most up-to-date anti-virus and anti-spamming tests have ...


9
Alexander James Hinchliffe, Fraser Peter Howard, Bobby Rai, Andrew Kemp: Updating data from a source computer to groups of destination computers. McAfee, Zilka Kotab PC, Christopher J Hamaty, January 2, 2007: US07159036 (187 worldwide citation)

A source computer 8 stores updated data that is to be distributed to a plurality of destination computers (12 to 30). The destination computers (12 to 30) are divided into groups sharing a common priority level (5, 4, 3, 2, 1). Each of these groups is then associated with a push update task to be ex ...


10
James S Magdych, Tarik Rahmanovic, John R McDonald, Brock E Tellier: System, method and computer program product for risk assessment scanning based on detected anomalous events. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group, April 8, 2003: US06546493 (185 worldwide citation)

A system, method and computer program product are provided for scanning a source of suspicious network communications. Initially, network communications are monitored for violations of policies. Then, it is determined whether the network communications violate at least one of the policies. Further, ...