A computer-implemented method for mitigating attacks of malicious traffic in a computer network includes receiving a set of attack sequences, including first traffic sequences suspected of containing the malicious traffic, analyzing the attack sequences so as to automatically extract a regular expression that matches at least a portion of the attack sequences in the set, and comparing second traffic sequences to the regular expression in order to identify the second traffic sequences that contain the malicious traffic.

 
Web www.patentalert.com

< Document analysis system and method

> Mammalian checkpoint proteins polypeptides and encoding sequences thereof

> Objective lens actuator

~ 00521