CN103490992B - Instant messaging Worm detection method - Google Patents

Instant messaging Worm detection method Download PDF

Info

Publication number
CN103490992B
CN103490992B CN201310470865.XA CN201310470865A CN103490992B CN 103490992 B CN103490992 B CN 103490992B CN 201310470865 A CN201310470865 A CN 201310470865A CN 103490992 B CN103490992 B CN 103490992B
Authority
CN
China
Prior art keywords
anthelmintic
instant messaging
data
value
mahalanobis distance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310470865.XA
Other languages
Chinese (zh)
Other versions
CN103490992A (en
Inventor
郭薇
周翰逊
张国栋
贾大宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Taiyu Information Technology Co ltd
Shenzhen Pengbo Information Technology Co ltd
Original Assignee
Shenyang Aerospace University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang Aerospace University filed Critical Shenyang Aerospace University
Priority to CN201310470865.XA priority Critical patent/CN103490992B/en
Publication of CN103490992A publication Critical patent/CN103490992A/en
Application granted granted Critical
Publication of CN103490992B publication Critical patent/CN103490992B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to field of information security technology, be a kind of detection method for instant messaging anthelmintic specifically.The present invention is divided into two steps: first, in the study stage by characteristic function, behavior and the instant messaging anthelmintic behavior of domestic consumer is made a distinction.Then, at detection-phase, the similarity of current network flow and learning data is calculated by simple mahalanobis distance.So that testing mechanism is insensitive to site access pattern, by non-parametric CUSUM, similarity is calculated, generate when the distance of new network traffics has exceeded the permission distance of algorithm setting and report to the police.

Description

Instant messaging Worm detection method
Technical field
The present invention relates to field of information security technology, specifically for a kind of detection for detecting instant messaging anthelmintic Method.
Background technology
Instant messaging (IM) services very popular, as a kind of instant exchange way have in whole the Internet number with The user of ten million meter.Many popular systems, as MSN Messenger (the Windows Messenger in Windows XP), Yahoo courier (YIM), AOL Instant Messenger (AIM), and Tencent QQ have changed we and friend, Shu Renhe The exchange way of business colleague.But, present in instant communication client, leak constitutes great security challenge.
Instant messaging anthelmintic is wide-scale distribution in instant communication network, by utilizing IM client and protocol bug, with And the safety problem that instant message service is caused.When instant messaging anthelmintic runs, it is usually located at instant messaging visitor Family end, and attempt oneself is sent to all of friend and infected user.Some anthelmintic utilizes common engine to send information, Inveigle addressee to receive anthelmintic and run copy.Some IM anthelmintic even can exchange receiver's note and analyze their return Multiple.There are many IM anthelmintic example such as Chock, SoFunny, JS Menger at present.
IM anthelmintic is different from periodic scanning virus and e-mail worm.Although research worker make great efforts the most very much understand and Containment scanning anthelmintic and the breeding of e-mail worm, but owing to these researchs of different infection mechanisms are not that to be well suited for IM compacted Worm.Instant messaging anthelmintic is applied suppression technology to slow down the propagation of anthelmintic by M.Williamson et al..But the method may Effective communication can be postponed and limit too many IM user and allow contact person/day that only one of which is new etc..
Summary of the invention
For above-mentioned weak point present in prior art, the technical problem to be solved in the present invention is to provide one i.e. Time communication Worm detection method.
The present invention adopts the following technical scheme that:
A kind of instant messaging Worm detection method, for communication server, comprises the following steps:
1) the study stage is by infecting the behavior characteristics of anthelmintic on the data analysis network of anthelmintic on network, by feature letter Number analyzes the behavioral data of normal users, is stored in data base;
2) detection-phase detection module accepts the new data by gateway and uses in simple mahalanobis distance and step 1) In data base, the similarity of characteristic function contrasts, and then judges that whether new data is by helminthic infection.
Further, simple mahalanobis distance computing formula is:
d ( x , y ‾ ) = Σ i = 0 m - 1 ( ( x i - y i ‾ ) + ) 2 σ i 2 - - - ( 6 )
Wherein,For simple mahalanobis distance, m is characterized the number of function, xiFor the ith feature value of new data, yiFor learning the ith feature value of phase data,For study stage i-th mean eigenvalue, x is new data characteristic vector, y For learning stage averaged feature vector,For the variance of ith feature value, calculate the simple mahalanobis distance of new dataWith { Xn, n=1,2,3 ... represent simple mahalanobis distance sequence, here n express time interval, simple mahalanobis distance is more Greatly, represent that the probability of helminthic infection is the biggest.
Further, non-parametric CUSUM is used to make detection algorithm insensitive to site access pattern: first not damaging Lose under any characteristic, { Xn, n=1,2,3 ... } it is transformed into another random sequence { Zn, n=1,2,3 ..., make all ZnIn negative value Will not accumulate in time, define ZnAs follows:
Zn=Xn-β (11)
Parameter beta is a constant, and for specific network condition, it helps to create a random sequence with negative value {Zn, n=1,2,3 ..., recursive condition is as follows:
yn=(yn-1+Zn)+
y0=0 (12)
Wherein as (yn-1+Zn) > 0 time, (yn-1+Zn)+Equal to (yn-1+Zn), it is otherwise 0, ynThe biggest, show to attack the strongest, its Middle ynIt is test statistics, ynRepresent XnAccumulation on the occasion of;
y n = S n - min 1 < &kappa; < n S k - - - ( 13 )
Wherein,Initial S0=0;
Then decision function is expressed as: d N ( y n ) = 0 , y n &le; N ; 1 , y n > N . (14)
Wherein, N represents worm detecting threshold value, dN(yn) represent the judgement at time n, inspection statistics ynMore than N, then dN(yn) It is 1, indicates that attack occurs, otherwise dN(yn) it is 0, represent properly functioning.
Further, in order to calculate simple mahalanobis distance, use incremental learning to update statistical value and keep the correct of statistics Property, if EiFor an eigenvalue of i-th sample, set three variablees (E, ω, n), N is historical sample length, and when observing new sample, ternary is updated such as formula (7), (8) and (9):
E = E + e n + 1 - E n + 1 - - - ( 7 )
&omega; = &omega; + e n + 1 2 - - - ( 8 )
n=n+1 (9)
Sample variance is calculated as such as formula (10):
&sigma; 2 = &omega; - n * E 2 n - 1 - - - ( 10 ) .
Further, described characteristic function is: characteristic function URL ():
URL ( ) = Max &ForAll; URL &Element; U Count ( URL ) , U &NotEqual; 0 0 , U = &Phi; - - - ( 1 )
Here U is the URL that user sets transmission;
Characteristic function Filereq ():
Filereq ( ) = Max &ForAll; a &Element; A Count ( a ) , A &NotEqual; &Phi; 0 , A = &Phi; - - - ( 2 )
Here A is the file size that user sets transmission;
Characteristic function IPAder ():
IPAddr()=Number of distinct IP address (3)。
Present invention have the advantage that and beneficial effect:
First the present invention passes through characteristic function in the study stage, distinguishes behavior and the instant messaging anthelmintic row of domestic consumer For difference.Then, network worm is detected by simple mahalanobis distance.In order to make testing mechanism to site access pattern not Sensitivity, have employed non-parametric CUSUM, generates alert when the distance of new data has exceeded the permission distance of algorithm setting Report.The effectiveness of this inventive method is demonstrated from the data of university's instant communication server collection.
Assembly of the invention is used to install in a gateway, the machine based on 1GHz Pentium III.Every warp in data set Spend 10 seconds, the CPU time needed for record data process part.In the sample of 99%, energy in the CPU time less than 2 seconds Enough process the packet of 10 seconds.Additionally, maximum duration was less than four seconds CPU time needed for any ten seconds sample process.All samples This service rate has exceeded the arrival rate of flow.This shows that the real-time performance of the inventive method has exceeded 10 seconds companies of a catenet Send out flow.
Accompanying drawing explanation
Fig. 1 propagates by sending network address in text message for emulation IM anthelmintic, and (a) shows and change feelings at characteristic function The situation of change of test statistics after condition, (b) introducing IM anthelmintic;
Fig. 2 is for showing that emulation IM anthelmintic shows in characteristic function situation of change, (b) introducing by sending file propagation Test statistics y after IM anthelminticnSituation of change.
Detailed description of the invention
Below in conjunction with the accompanying drawings and the present invention is described in detail by embodiment:
A kind of instant messaging Worm detection method, for communication server, the detection device of the method place main body sets Put on the gateway of communication server, detect by the data of gateway, comprise the following steps:
The step 1) study stage passes through to infect anthelmintic behavior characteristics on the data analysis network of anthelmintic on network, it is stored in number According in storehouse;
Typical user uses instant communicating system to be to work or entertaining.He/her exchanges daily life with other people. It is special what it does not appears to, but its one important feature of announcement: possible of user and several personal comminications over a period to come. On the contrary, instant messaging anthelmintic is by extensive widespread as far as possible, generally by the trustship anthelmintic code sent or the URL of file website. Therefore, it can distinguish instant messaging anthelmintic behavior from normally performed activity.But after loading anthelmintic code, IM anthelmintic will send one Maliciously the message language of network address is to different users.So it is inferred that this network address transmission ratio will increase.Defined function Count (x) is that the user that quantity is different uses identical x value and a user communication.Such as, if a user sends Www.google.com is to four different friends in contact list, and at this moment Count (www.google.com) is equal to four. For portraying this feature, defined feature function URL () such as formula (1).
URL ( ) = Max &ForAll; URL &Element; U Count ( URL ) , U &NotEqual; 0 0 , U = &Phi; - - - ( 1 )
Here U is the URL that user sets transmission.
It is the most identical with content that another kind of infection character more typically is that victim sends file size.It practice, these are civilian Part is exactly instant messaging anthelmintic.For describing this feature, definition file forwards the characteristic function of request, such as formula (2).
Filereq ( ) = Max &ForAll; a &Element; A Count ( a ) , A &NotEqual; &Phi; 0 , A = &Phi; - - - ( 2 )
Here A is the file size that user sets transmission
Multiple friends over a period to come with a user communication.When user uses MSN, they can be Contact list select that friend or those friends link up.But, anthelmintic can attempt to propagate the soonest, therefore it Substantial amounts of friend may contact with contact list, thus deviate from normal users usage behavior.In contact list One IP address can represent a friend, and defined feature function IPAder () describes this feature such as formula (3).
IPAddr()=Number of distinct IP address(3)
Step 2) detection module accepts by the new data of gateway and uses simple mahalanobis distance and the feature in step 1) The similarity of function contrasts, and then judges that whether new data is by helminthic infection.
Simple mahalanobis distance computing formula is:
d ( x , y &OverBar; ) = &Sigma; i = 0 m - 1 ( ( x i - y i &OverBar; ) + ) 2 &sigma; i 2 - - - ( 6 )
Wherein,For simple mahalanobis distance, m is characterized the number of the eigenvalue of function, xiI-th for new data Eigenvalue, yiFor the ith feature value of training stage data,For training stage i-th mean eigenvalue, x is that new data is special Levying vector, y is training stage averaged feature vector,For the variance of ith feature value, calculate the simple geneva of new data DistanceSimple mahalanobis distance is the biggest, represents that the probability of helminthic infection is the biggest.With { Xn, n=1,2,3 ... } represent simple Mahalanobis distance sequence, now n express time length,
Mahalanobis distance is the most frequently used polynary anomaly statistics.What formula described substantially is that new sample is the most abnormal in history The data of study.Here, calculate the data of New Observer and the study stage obtains the distance of data.Distance is the highest, and more having can It can be abnormal sign.
The definition of mahalanobis distance such as formula (4):
D ( x , y &OverBar; ) = ( x , y &OverBar; ) T C - 1 ( x , y &OverBar; ) - - - ( 4 )
Here x and y is two characteristic vectors, and each vector element is variable.X is new observational characteristic vector, and y is study The averaged feature vector calculated in stage.C-1It is inverse covariance matrix Cij=Cov(yi,yj), yi, yjIt it is study phase characteristic vector Middle ith and jth eigenvalue.
Assuming that feature is statistical iteration, mahalanobis distance provides a process useful, weighs current deviation from baseline.Cause This, it is each eigenvalue variance that covariance matrix C becomes element on diagonal matrix and diagonal.Therefore, simple geneva away from From such as formula (5):
d ( x , y &OverBar; ) = &Sigma; i = 0 m - 1 ( x i - y &OverBar; i ) 2 &sigma; i 2 - - - ( 5 )
Here m is set to 3 (because having three optional feature values).
When being contacted with friend by instant communicating system, owing to busy study or active user use the most always It.Therefore, characteristic function value is likely lower than associated averages, but, this is not meant to that it is abnormal.Therefore, this deviation Should not be set as mahalanobis distance.Therefore, formula (6) is used to calculate simple mahalanobis distance.
d ( x , y &OverBar; ) = &Sigma; i = 0 m - 1 ( ( x i - y i &OverBar; ) + ) 2 &sigma; i 2 - - - ( 6 )
Wherein as (yn-1+Zn) > 0 time, (yn-1+Zn)+Equal to (yn-1+Zn), it is otherwise 0.
In order to calculate simple mahalanobis distance, use incremental learning update statistical value keep statistics correctness, if Ei For an eigenvalue of i-th sample, set three variablees (E, ω, n),
N is historical sample length, and when observing new sample, ternary is by more Newly such as formula (7), (8) and (9):
E = E + e n + 1 - E n + 1 - - - ( 7 )
&omega; = &omega; + e n + 1 2 - - - ( 8 )
n=n+1 (9)
Wherein in (7), (8), (9), it is the value of new samples on the left of equal sign, is previous historical sample length on the right side of equal sign Value.
Sample variance is calculated as such as formula (10):
&sigma; 2 = &omega; - n * E 2 n - 1 - - - ( 10 ) .
In order to make the testing mechanism insensitivity to site access pattern, a kind of printenv accumulation summation CUSUM method.
Non-parametric CUSUM is used to make insensitive to site access pattern of detection: first not losing any characteristic Under, { Xn, n=1,2,3 ... } it is transformed into another random sequence { Zn, n=1,2,3 ..., make all ZnIn negative value will not be in time Accumulation, defines ZnAs follows:
Zn=Xn-β (11)
Parameter beta is that for specific network condition, it helps to create a random sequence with negative value to a constant {Zn, n=1,2,3 ..., recursive condition is as follows:
yn=(yn-1+Zn)+
y0=0 (12)
Wherein (yn-1+Zn)+as (yn-1+Zn) > 0 equal to (yn-1+Zn), it is otherwise 0, ynThe biggest, show to attack the strongest, wherein ynIt is test statistics, ynRepresent XnAccumulation on the occasion of;
y n = S n - min 1 < &kappa; < n S k - - - ( 13 )
Wherein,Initial S0=0;
Decision function is expressed as:
d N ( y n ) = 0 , y n &le; N ; 1 , y n > N . - - - ( 14 )
Wherein, N represents worm detecting threshold value, dN(yn) represent the judgement at time n, inspection statistics ynMore than N, then dN(yn) It is 1, indicates that attack occurs, otherwise dN(yn) it is 0, represent properly functioning.
β is taken as 3 in the present invention.
Embodiment
The inventive method is demonstrated by simulated environment.Have collected 521 user data sets of certain university's communication server (i.e. Time Communications service be only applicable in campus) and divide the data into two parts as study and classification and Detection.Wherein, 80% data quilt As training data, remaining is 20% for carrying out mixing and for detecting IM anthelmintic with IM worm attack data, IM anthelmintic number According to being random mixing.Additionally, the file simulating instant messaging anthelmintic in text message in every 5 minutes or the website information of transmission Friend in online contact list.
For normal discharge:
Owing to being busy with work or arduous research, user will not contact with the friend in contact list, special It is not at midnight.Therefore, when corresponding characteristic function value is much larger than zero.Result is as shown in table 1:
Table 1
characteristic μ σ2
URL() 1.333312 0.420157
FileReq() 1.271003 0.236540
IPAddr() 2.600212 0.737141
When domestic consumer uses IM service, text message has the transmission request of several file and network address.At great majority In the case of, user is communicated with each other by text message.From result, it is also seen that URL () and FileReq () average are 1.333312 and 1.271003, corresponding variance is 0.420157 and 0.236540.Although it means that user is at text message Middle transmission network address or the requirement of file transmission, they generally send identical URL or file to one or two different friend. The meansigma methods of IPAddr () and variance are 2.600212 and 0.73714.
After increasing instant messaging anthelmintic flow, worm detecting:
As it is shown in figure 1, emulation IM anthelmintic is propagated by sending network address in text message.A () shows at characteristic function Situation of change.It is shown to the value of URL () when not having instant messaging anthelmintic flow and is not more than 1, the excursion of IPAddr () value From 0 to 3.But, as (b) display URL () and the unexpected of IPAddr () value after introducing IM anthelmintic change close to 10 to peak.And Do not change the value of FileReq ().Therefore, IM anthelmintic can detect in a unit interval after outburst.
Fig. 2 shows that emulation IM anthelmintic is by sending file propagation.A () shows that FileReq () value is not more than 1 He IPAddr () value excursion does not increase IM anthelmintic flow from 0 to 3.But, FileReq () value and IPAddr () value are different from Normal value is after introducing IM anthelmintic.They beyond 7 and reach their peak 15 at change.FileReq () value is always 0.Therefore, B () shows that this method, after introducing IM anthelmintic, detects in the unit interval after outburst.
Carry out same test 100 times repeatedly.Result is similar, negative value does not occur.
Assembly of the invention will be used to install in a gateway, the machine based on 1GHz Pentium III.In data set often CPU time through 10 seconds, needed for record data process part.In the sample of 99%, in the CPU time less than 2 seconds The packet of 10 seconds can be processed.Additionally, maximum duration was less than four seconds CPU time needed for any ten seconds sample process.All Sample service rate has exceeded the arrival rate of flow.This shows that the real-time performance of the inventive method has exceeded a catenet 10 seconds Running fire flow.

Claims (3)

1. an instant messaging Worm detection method, for communication server, it is characterised in that comprise the following steps:
1) the study stage is by infecting the behavior characteristics of anthelmintic on the data analysis network of anthelmintic on network, is divided by characteristic function The behavioral data of analysis normal users, is stored in data base;
2) configuring detection module in a gateway, detection-phase detection module accepts the new data by gateway and uses simple geneva Distance and step 1) in the similarity of value of characteristic function of data base's learning contrast, and then judge that new data is No by helminthic infection;
Simple mahalanobis distance computing formula is:
d ( x , y &OverBar; ) = &Sigma; i = 0 m - 1 ( ( x i - y i &OverBar; ) + ) 2 &sigma; i 2 - - - ( 6 )
Wherein,For simple mahalanobis distance, m is characterized the number of function, xiFor the ith feature value of new data, yiFor The ith feature value of study phase data,For study stage i-th mean eigenvalue, x is new data characteristic vector,For Study stage averaged feature vector,For the variance of ith feature value, calculate the simple mahalanobis distance of new data With { Xu, u=1,2,3...} represent simple mahalanobis distance sequence, here u express time interval, and simple mahalanobis distance is the biggest, table Show that the probability of helminthic infection is the biggest;
Described characteristic function is: characteristic function URL ():
U R L ( ) = M a x &ForAll; U R L &Element; U { C o u n t ( U R L ) } , U &NotEqual; &Phi; 0 , U = &Phi; - - - ( 1 )
Here U is the URL that user sets transmission;
Characteristic function Filereq ():
F i l e r e q ( ) = M a x &ForAll; a &Element; A { C o u n t ( a ) } , A &NotEqual; &Phi; 0 , A = &Phi; - - - ( 2 )
Here A is the file size that user sets transmission, and function Count (x) defined in formula (1) and (2) is at communication process In, Content of communciation uses the number of users of identical x;
Characteristic function IPAder ():
IPAddr ()=Number of distinct IP address (3).
2. according to the instant messaging Worm detection method described in claim 1, it is characterised in that use non-parametric CUSUM Make detection algorithm insensitive to site access pattern: first under not losing any characteristic, { Xu, u=1,2,3...} are transformed into Another random sequence { Zu, u=1,2,3...}, make all ZuIn negative value will not accumulate in time, define ZuAs follows:
Zu=Xu-β (11)
Parameter beta is a constant, and for specific network condition, it helps to create a random sequence { Z with negative valueu, u =1,2,3...}, recursive condition is as follows:
y u = ( y u - 1 + Z u ) + y 0 = 0 - - - ( 12 )
Wherein, as (yu-1+Zu) > 0 time, (yu-1+Zu)+Equal to (yu-1+Zu), it is otherwise 0, yuThe biggest, show to attack the strongest, wherein yuIt is test statistics, yuRepresent XuAccumulation on the occasion of;
y u = S u - min 1 < &kappa; < u S k - - - ( 13 )
Wherein,Initial S0=0;
Then decision function is expressed as:
Wherein, N represents worm detecting threshold value, dN(yu) represent the judgement at time u, inspection statistics yuMore than N, then dN(yu) it is 1, Indicate that attack occurs, otherwise dN(yu) it is 0, represent properly functioning.
3. according to the instant messaging Worm detection method described in claim 1, it is characterised in that in order to calculate simple geneva away from From, use incremental learning to update statistical value and keep the correctness of statistics, if EiFor an eigenvalue of i-th sample, set Three variablees (E, ω, n),N is historical sample length, when observing new sample, and three Variable is updated such as formula (7), (8) and (9):
E = E + e n + 1 - E n + 1 - - - ( 7 )
&omega; = &omega; + e n + 1 2 - - - ( 8 )
N=n+1 (9)
Sample variance is calculated as such as formula (10):
&sigma; 2 = &omega; - n * E 2 n - 1 - - - ( 10 ) .
CN201310470865.XA 2013-10-10 2013-10-10 Instant messaging Worm detection method Active CN103490992B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310470865.XA CN103490992B (en) 2013-10-10 2013-10-10 Instant messaging Worm detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310470865.XA CN103490992B (en) 2013-10-10 2013-10-10 Instant messaging Worm detection method

Publications (2)

Publication Number Publication Date
CN103490992A CN103490992A (en) 2014-01-01
CN103490992B true CN103490992B (en) 2016-10-19

Family

ID=49830963

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310470865.XA Active CN103490992B (en) 2013-10-10 2013-10-10 Instant messaging Worm detection method

Country Status (1)

Country Link
CN (1) CN103490992B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219225B (en) * 2014-07-31 2020-04-03 珠海豹趣科技有限公司 Detection and defense method and system for worm virus

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101496025A (en) * 2005-12-13 2009-07-29 约吉安全系统公司 System and method for providing network security to mobile devices
CN102457525A (en) * 2011-12-19 2012-05-16 河海大学 Load-based anomaly intrusion detection method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101496025A (en) * 2005-12-13 2009-07-29 约吉安全系统公司 System and method for providing network security to mobile devices
CN102457525A (en) * 2011-12-19 2012-05-16 河海大学 Load-based anomaly intrusion detection method and system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Anomalous Payload-based Netowrk Intrusion Detection;Ke Wang等;《Recent Advances in Intrusion Detection》;20040917;第3224卷;正文第1节、第3.2节 *
IM蠕虫检测方案的设计与实现;赵彬彬;《计算机工程》;20091130;第35卷(第21期);全文 *
一种混合的网络蠕虫检测方法;周翰逊等;《小型微型计算机系统》;20110515;第32卷(第5期);正文第1-3节、第4.2节 *
网络蠕虫传播模型及检测技术研究;周翰逊;《中国博士学位论文全文数据库 信息科技辑(2011年)》;20110515(第05期);正文第5.2.3节 *

Also Published As

Publication number Publication date
CN103490992A (en) 2014-01-01

Similar Documents

Publication Publication Date Title
Van Der Heijden et al. Cognitive triaging of phishing attacks
US8443441B2 (en) System and methods for detecting malicious email transmission
US10305921B2 (en) Network security apparatus and method of detecting malicious behavior in computer networks via cost-sensitive and connectivity constrained classification
JP2019145107A (en) Cyber threat defense system protecting e-email network using machine learning model
US20140310808A1 (en) Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery
US20040083129A1 (en) Sdi-scam
Wang Machine learning for the detection of spam in twitter networks
Holm et al. Cyber security for a smart grid-what about phishing?
Michalopoulos et al. Utilizing document classification for grooming attack recognition
Singh et al. Detection and differentiation of application layer DDoS attack from flash events using fuzzy‐GA computation
Wang et al. Towards large-scale social networks with online diffusion provenance detection
Baye et al. Api security in large enterprises: Leveraging machine learning for anomaly detection
Lota et al. A systematic literature review on sms spam detection techniques
Ping et al. Sybil-aware least cost rumor blocking in social networks
CN103490992B (en) Instant messaging Worm detection method
Shao et al. A fuzzy detection approach toward different speed port scan attacks based on Dempster–Shafer evidence theory
Roy et al. An efficient spam filtering techniques for email account
Maleki A behavioral based detection approach for business email compromises
Sun et al. A SYN flooding attack detection approach with hierarchical policies based on self‐information
Chen et al. Detecting spam on Twitter via message-passing based on retweet-relation
Hewett Toward identification of key breakers in social cyber-physical networks
Tham et al. Phishing message detection based on keyword matching
Zhang et al. A Probabilistic Model for Malicious User and Rumor Detection on Social Media.
Akande et al. Development of a Real Time Smishing Detection Mobile Application using Rule Based Techniques
Zhang et al. Early detection of rumors in heterogeneous mobile social network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190926

Address after: Room 509, Building 508 Chundong Road, Minhang District, Shanghai 201108

Patentee after: SHANGHAI TAIYU INFORMATION TECHNOLOGY CO.,LTD.

Address before: 518110 Building 1619, No. 3, Queshan Yunfeng Road, Gaofeng Community, Dalang Street, Longhua District, Shenzhen City, Guangdong Province

Patentee before: Shenzhen Pengbo Information Technology Co.,Ltd.

Effective date of registration: 20190926

Address after: 518110 Building 1619, No. 3, Queshan Yunfeng Road, Gaofeng Community, Dalang Street, Longhua District, Shenzhen City, Guangdong Province

Patentee after: Shenzhen Pengbo Information Technology Co.,Ltd.

Address before: 110136, Liaoning, Shenyang, Shenbei New Area moral South Avenue No. 37

Patentee before: Shenyang Aerospace University

TR01 Transfer of patent right