1
Gerald R Malan, Farnam Jahanian: Method and system for profiling network flows at a measurement point within a computer network. The Regents of the University of Michigan, Brooks Kushman P C, September 13, 2005: US06944673 (154 worldwide citation)

A method and system for profiling network flows at a measurement point within a computer network is provided. The method includes measuring network flows having invariant features at a measurement point located within routing infrastructure of the computer network to obtain flow statistics. The meth ...


2
Jon Oberheide, Evan Cooke, Farnam Jahanian: Network service for the detection, analysis and quarantine of malicious and unwanted files. The Regents of The University of Michigan, Harness Dickey & Pierce, December 31, 2013: US08621610 (7 worldwide citation)

A system is provided for detecting, analyzing and quarantining unwanted files in a network environment. A host agent residing on a computing device in the network environment detects a new file introduced to the computing device and sends the new file to a network service for analysis. The network s ...


3
Gerald R Malan, Farnam Jahanian: Method and system for protecting publicly accessible network computer services from undesirable network traffic in real-time. The Regents of The University of Michigan, David R Syrowik, Brooks & Kushman PC, March 21, 2002: US20020035698-A1 (1 worldwide citation)

A method and system are provided for protecting publicly accessible network computer services from undesirable network traffic in real-time. The method includes receiving network traffic destined for the services and analyzing the network traffic to identify an undesirable user of the services. Acce ...


4
Gerald R Malan, Farnam Jahanian: Method and system for profiling network flows at a measurement point within a computer network. The Regents of The University of Michigan, David R Syrowik, Brooks & Kushman PC, March 14, 2002: US20020032717-A1

A method and system for profiling network flows at a measurement point within a computer network is provided. The method includes measuring network flows having invariant features at a measurement point located within routing infrastructure of the computer network to obtain flow statistics. The meth ...


5
Gerald R Malan, Farnam Jahanian: Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic. The Regents of The University of Michigan, David R Syrowik, Brooks & Kushman PC, March 14, 2002: US20020032793-A1

A method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic is provided. The method includes collecting statistics at a plurality of measurement points located within forwarding infrastructure of the computer network. The ...


6
Gerald R Malan, Farnam Jahanian: Method and system for detecting, tracking and blocking denial of service attacks over a computer network. The Regents of The University of Michigan, David R Syrowik, Brooks & Kushman PC, March 14, 2002: US20020032871-A1

A system and method is provided for detecting, tracking and blocking denial of service (“DoS”) attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a collector adapted to rec ...


7
Jon Oberheide, Farnam Jahanian, Evan Cooke: Network service for the detection, analysis and quarantine of malicious and unwanted files. The Regents Of The University Of Michigan, Harness Dickey & Pierce, February 12, 2009: US20090044024-A1

A system is provided for detecting, analyzing and quarantining unwanted files in a network environment. A host agent residing on a computing device in the network environment detects a new file introduced to the computing device and sends the new file to a network service for analysis. The network s ...