Protecting network devices from suspicious communications
Abstract:
According to some aspects, disclosed methods and systems may comprise generating a profile that is based on monitoring a communication pattern associated with a device. Subsequent communications associated with the device may be monitored. Based on the profile and the subsequent communication, a security status may be associated with the device.
Public/Granted literature
Information query
Patent Agency Ranking
0/0