1
Handong Wu, Jerome Freedman, Christopher J Ivory: Network intrusion detection and analysis system and method. McAfee, Zilka Kotab PC, Christopher J Hamaty, February 17, 2009: US07493659 (214 worldwide citation)

An intrusion detection and analysis system and method are disclosed. The system includes a data monitoring device comprising a capture engine operable to capture data passing through the network and configured to monitor network traffic, decode protocols, and analyze received data. The system furthe ...


2
Wei Yan, Handong Wu: Packet threshold-mix batching dispatcher to counter traffic analysis. Trend Micro, Beyer Law Group, May 15, 2012: US08180917 (150 worldwide citation)

An antivirus agent located on a user computer, local area network or standalone hardware device includes a statistical module, a control unit, a timeslot generator and a dispatcher. The statistical module calculates statistics for incoming request packets including the burstiness degree H. A number ...


3
Handong Wu, Stephen Schwab, Robert Lom Peckham: Signature based network intrusion detection system and method. McAfee, Zilka Kotab PC, Christopher J Hamaty, September 9, 2008: US07424744 (131 worldwide citation)

A signature based intrusion detection method and system are disclosed. A method for detecting intrusions on a network generally comprises storing signature profiles identifying patterns associated with network intrusions in a signature database and generating classification rules based on the signat ...


4
King L Won, Kazim O Yildiz, Handong Wu: System and method for detecting and locating access points in a wireless network. Networks Associates Technologies, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, June 22, 2004: US06754488 (128 worldwide citation)

A system, method and computer program product are provided for ascertaining the location of an access point in a wireless network. Initially, a strength of a radio frequency signal of an access point of a wireless network is monitored at a position utilizing a wireless network analyzer. Next, the wi ...


5
Handong Wu, Raimund Alexander Genes: Preventing malicious codes from performing malicious actions in a computer system. Trend Micro Incorporated, Okamoto & Benedicto, June 12, 2012: US08201246 (123 worldwide citation)

Malicious codes may be prevented from performing malicious actions in a computer that does not have a virtual machine by simulating presence of the virtual machine. When a computer program performs an action in the computer, the action may be intercepted to determine if the computer program is malic ...


6
Handong Wu: Method and system for playing associated audible advertisement simultaneously with the display of requested content on handheld devices and sending a visual warning when the audio channel is off. Networks Associates Technology, Zilka Kotab PC, Christopher J Hamaty, March 29, 2005: US06874018 (95 worldwide citation)

A method for providing advertising to a handheld computer operable to connect to a network. The handheld computer includes a screen for displaying visual content received from the network and configured for playing an audio message associated with the visual content. The method includes receiving a ...


7
Jeffrey Cook, Handong Wu, Lindy Foster: DNS server access control system and method. Networks Associates Technology, Zilka Kotab PC, Christopher J Hamaty, November 1, 2005: US06961783 (68 worldwide citation)

A method for controlling access to information from a DNS server having an access control list specifying clients approved to receive an IP address corresponding to a domain name of a target host is disclosed. The method includes receiving a request from a client for an IP address of a domain name a ...


8
Handong Wu, Jeff Cook: System and method for protecting internet protocol addresses. McAfee, Zilka Kotab PC, Christopher J Hamaty, May 2, 2006: US07039721 (43 worldwide citation)

A method for protecting a host located within a computer network. The method includes mapping a public host address for a public host to a secret host address for a secret host containing data accessible over the computer network. The public host address is available from a domain name system server ...


9
Handong Wu, Xiao Qiang Zhou: Correlation system and method for monitoring high-speed networks. McAfee, Zilka Kotab PC, Christopher J Hamaty, December 4, 2007: US07305005 (20 worldwide citation)

A system, method and computer program product are provided for adjusting results during network analysis. Initially, network communications are received. Such network communications are then processed utilizing first hardware to generate first results. Subsequently, the network communications are pr ...


10
Handong Wu, Zbigniew Sufleta: High performance packet processing using a general purpose processor. McAfee, Patent Capital Group, August 2, 2011: US07991917 (15 worldwide citation)

A packet processing device includes a control logic processor for filtering packets according to a set of stored rules and an arithmetic logic processor for executing packet processing instructions based on the content of the packet. The control logic processor spawns a new thread for each incoming ...