GB2512754B - Training a Maximum Entropy Discrimination classifier for controlling access to an Internet Resource - Google Patents

Training a Maximum Entropy Discrimination classifier for controlling access to an Internet Resource

Info

Publication number
GB2512754B
GB2512754B GB1406626.0A GB201406626A GB2512754B GB 2512754 B GB2512754 B GB 2512754B GB 201406626 A GB201406626 A GB 201406626A GB 2512754 B GB2512754 B GB 2512754B
Authority
GB
United Kingdom
Prior art keywords
training
controlling access
maximum entropy
internet resource
entropy discrimination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1406626.0A
Other versions
GB2512754A (en
GB2512754A8 (en
GB201406626D0 (en
Inventor
Christopher Harris
Ronald Hegli
Hal Lonas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Webroot Inc
Original Assignee
Webroot Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/709,504 external-priority patent/US8438386B2/en
Application filed by Webroot Inc filed Critical Webroot Inc
Publication of GB201406626D0 publication Critical patent/GB201406626D0/en
Publication of GB2512754A publication Critical patent/GB2512754A/en
Publication of GB2512754A8 publication Critical patent/GB2512754A8/en
Application granted granted Critical
Publication of GB2512754B publication Critical patent/GB2512754B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
GB1406626.0A 2009-04-21 2010-02-27 Training a Maximum Entropy Discrimination classifier for controlling access to an Internet Resource Active GB2512754B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US17126409P 2009-04-21 2009-04-21
US24138909P 2009-09-10 2009-09-10
US12/709,504 US8438386B2 (en) 2009-04-21 2010-02-21 System and method for developing a risk profile for an internet service
GB1119949.4A GB2483808B (en) 2009-04-21 2010-02-27 System and method for developing a risk profile for an internet resource

Publications (4)

Publication Number Publication Date
GB201406626D0 GB201406626D0 (en) 2014-05-28
GB2512754A GB2512754A (en) 2014-10-08
GB2512754A8 GB2512754A8 (en) 2014-10-15
GB2512754B true GB2512754B (en) 2015-02-25

Family

ID=51536072

Family Applications (2)

Application Number Title Priority Date Filing Date
GB1406626.0A Active GB2512754B (en) 2009-04-21 2010-02-27 Training a Maximum Entropy Discrimination classifier for controlling access to an Internet Resource
GB1406624.5A Active GB2512753B (en) 2009-04-21 2010-02-27 Controlling access to Internet resources

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB1406624.5A Active GB2512753B (en) 2009-04-21 2010-02-27 Controlling access to Internet resources

Country Status (1)

Country Link
GB (2) GB2512754B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10268976B2 (en) * 2016-02-17 2019-04-23 SecurityScorecard, Inc. Non-intrusive techniques for discovering and using organizational relationships
CN113282921A (en) * 2021-06-11 2021-08-20 深信服科技股份有限公司 File detection method, device, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8438499B2 (en) * 2005-05-03 2013-05-07 Mcafee, Inc. Indicating website reputations during user interactions
US20080082662A1 (en) * 2006-05-19 2008-04-03 Richard Dandliker Method and apparatus for controlling access to network resources based on reputation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KAN ET AL, "Fast webpage classification using URL features" [online], August 2005, NUS School of Computing. *
Proceedings of the 6th International Conference on Internet Information Retrieval, December 2006, Korea, pp 143149, NGUYEN ET AL, "A Maximum Entropy Model for Text Classification". *

Also Published As

Publication number Publication date
GB2512754A (en) 2014-10-08
GB2512754A8 (en) 2014-10-15
GB2512753B (en) 2015-02-25
GB2512753A (en) 2014-10-08
GB201406624D0 (en) 2014-05-28
GB201406626D0 (en) 2014-05-28

Similar Documents

Publication Publication Date Title
HK1173537A1 (en) Controlling resource access based on resource properties
EP2622818A4 (en) Attention commands enhancement
EP2497041A4 (en) Content-based image search
GB2469657B (en) Flywheel assembly
GB0905344D0 (en) A flywheel
GB0905343D0 (en) A flywheel
GB0817411D0 (en) Flywheel
EP2417722A4 (en) Dynamic energy control
GB201120461D0 (en) Hammer mechanism
HK1187102A1 (en) A vibrating densitometer including an improved vibrating member
GB0902840D0 (en) A flywheel
GB0905345D0 (en) A flywheel
EP2659387A4 (en) Predictive software streaming
EP2408342A4 (en) Separator lid
GB201107991D0 (en) Riveting tool
GB2482050B (en) An electric hammer
GB2512754B (en) Training a Maximum Entropy Discrimination classifier for controlling access to an Internet Resource
PL390993A1 (en) Top roller blind box
GB2478133B (en) Image classification
TWM389706U (en) Die sorting mechanism
EP2478971A4 (en) Combined classifier
GB201109934D0 (en) Percussion mechanism
GB201018683D0 (en) Control box
TWM390370U (en) Small press-forming shaft screw
GB0914408D0 (en) Eobd power saver lead

Legal Events

Date Code Title Description
R108 Alteration of time limits (patents rules 1995)

Free format text: EXTENSION APPLICATION

Effective date: 20150112