AU2009225671A1 - Method and system for protection against information stealing software - Google Patents
Method and system for protection against information stealing software Download PDFInfo
- Publication number
- AU2009225671A1 AU2009225671A1 AU2009225671A AU2009225671A AU2009225671A1 AU 2009225671 A1 AU2009225671 A1 AU 2009225671A1 AU 2009225671 A AU2009225671 A AU 2009225671A AU 2009225671 A AU2009225671 A AU 2009225671A AU 2009225671 A1 AU2009225671 A1 AU 2009225671A1
- Authority
- AU
- Australia
- Prior art keywords
- sensitive information
- bait
- traffic analyzer
- network
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/051,579 US9015842B2 (en) | 2008-03-19 | 2008-03-19 | Method and system for protection against information stealing software |
US12/051,616 US9130986B2 (en) | 2008-03-19 | 2008-03-19 | Method and system for protection against information stealing software |
US12/051,616 | 2008-03-19 | ||
US12/051,670 | 2008-03-19 | ||
US12/051,579 | 2008-03-19 | ||
US12/051,670 US8407784B2 (en) | 2008-03-19 | 2008-03-19 | Method and system for protection against information stealing software |
PCT/US2009/037435 WO2009117445A2 (en) | 2008-03-19 | 2009-03-17 | Method and system for protection against information stealing software |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2009225671A1 true AU2009225671A1 (en) | 2009-09-24 |
Family
ID=40736626
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2009225671A Abandoned AU2009225671A1 (en) | 2008-03-19 | 2009-03-17 | Method and system for protection against information stealing software |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP2272024A2 (de) |
CN (1) | CN101978376A (de) |
AU (1) | AU2009225671A1 (de) |
CA (1) | CA2718594A1 (de) |
WO (1) | WO2009117445A2 (de) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130298254A1 (en) * | 2010-10-26 | 2013-11-07 | Matthew Richard Thomas Hall | Methods and systems for detecting suspected data leakage using traffic samples |
CN103607392A (zh) * | 2010-12-14 | 2014-02-26 | 华为数字技术(成都)有限公司 | 一种防范钓鱼攻击的方法及装置 |
CN102098285B (zh) * | 2010-12-14 | 2013-12-04 | 华为数字技术(成都)有限公司 | 一种防范钓鱼攻击的方法及装置 |
JP5624938B2 (ja) * | 2011-05-13 | 2014-11-12 | 日立オムロンターミナルソリューションズ株式会社 | 自動取引装置および自動取引システム |
CN102801688B (zh) * | 2011-05-23 | 2015-11-25 | 联想(北京)有限公司 | 一种数据访问的方法、装置及支持数据访问的终端 |
CN103294950B (zh) * | 2012-11-29 | 2016-07-06 | 北京安天电子设备有限公司 | 一种基于反向追踪的高威窃密恶意代码检测方法及系统 |
CN103177204B (zh) * | 2013-03-29 | 2016-09-28 | 北京奇虎科技有限公司 | 密码信息提示方法及装置 |
MY184389A (en) * | 2013-05-17 | 2021-04-01 | Mimos Berhad | Method and system for detecting keylogger |
US9357397B2 (en) * | 2014-07-23 | 2016-05-31 | Qualcomm Incorporated | Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device |
CN105512020B (zh) * | 2014-09-24 | 2018-05-04 | 阿里巴巴集团控股有限公司 | 测试方法及装置 |
CN105447385B (zh) * | 2014-12-08 | 2018-04-24 | 哈尔滨安天科技股份有限公司 | 一种多层次检测的应用型数据库蜜罐实现系统及方法 |
CN105141610A (zh) | 2015-08-28 | 2015-12-09 | 百度在线网络技术(北京)有限公司 | 钓鱼页面检测方法及系统 |
CN106549960A (zh) * | 2016-10-27 | 2017-03-29 | 北京安天电子设备有限公司 | 一种基于网络监控追踪攻击者的方法及系统 |
CN108256323A (zh) * | 2016-12-29 | 2018-07-06 | 武汉安天信息技术有限责任公司 | 一种针对钓鱼应用的检测方法及装置 |
CN108830089B (zh) * | 2018-05-16 | 2022-04-08 | 哈尔滨工业大学 | 高频数据传输中电磁辐射信息泄漏的主动防护系统 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1147795C (zh) * | 2001-04-29 | 2004-04-28 | 北京瑞星科技股份有限公司 | 检测和清除已知及未知计算机病毒的方法、系统 |
US7636943B2 (en) | 2005-06-13 | 2009-12-22 | Aladdin Knowledge Systems Ltd. | Method and system for detecting blocking and removing spyware |
US7721333B2 (en) * | 2006-01-18 | 2010-05-18 | Webroot Software, Inc. | Method and system for detecting a keylogger on a computer |
WO2009032379A1 (en) * | 2007-06-12 | 2009-03-12 | The Trustees Of Columbia University In The City Of New York | Methods and systems for providing trap-based defenses |
-
2009
- 2009-03-17 WO PCT/US2009/037435 patent/WO2009117445A2/en active Application Filing
- 2009-03-17 CA CA2718594A patent/CA2718594A1/en not_active Abandoned
- 2009-03-17 EP EP09721776A patent/EP2272024A2/de not_active Withdrawn
- 2009-03-17 AU AU2009225671A patent/AU2009225671A1/en not_active Abandoned
- 2009-03-17 CN CN2009801094588A patent/CN101978376A/zh active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2009117445A3 (en) | 2009-11-12 |
CA2718594A1 (en) | 2009-09-24 |
CN101978376A (zh) | 2011-02-16 |
EP2272024A2 (de) | 2011-01-12 |
WO2009117445A2 (en) | 2009-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9455981B2 (en) | Method and system for protection against information stealing software | |
US9495539B2 (en) | Method and system for protection against information stealing software | |
US8407784B2 (en) | Method and system for protection against information stealing software | |
AU2009225671A1 (en) | Method and system for protection against information stealing software | |
Ussath et al. | Advanced persistent threats: Behind the scenes | |
JP6104149B2 (ja) | ログ分析装置及びログ分析方法及びログ分析プログラム | |
US7890612B2 (en) | Method and apparatus for regulating data flow between a communications device and a network | |
US7681234B2 (en) | Preventing phishing attacks | |
EP2147390B1 (de) | Detektion von gegnern durch sammeln und korrelation von bewertungen | |
US20120331556A1 (en) | System and method for protocol fingerprinting and reputation correlation | |
Biju et al. | Cyber attacks and its different types | |
CN102246490A (zh) | 对不需要的软件或恶意软件进行分类的系统和方法 | |
KR20170045699A (ko) | 보안이벤트 자동 검증 방법 및 장치 | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
Altwairqi et al. | Four most famous cyber attacks for financial gains | |
Tanwar et al. | Classification and imapct of cyber threats in India: a review | |
CA2587867C (en) | Network security device | |
Waziri | Website forgery: Understanding phishing attacks and nontechnical Countermeasures | |
Ruhani et al. | Keylogger: The Unsung Hacking Weapon | |
Vakil et al. | Cyber Attacks: Detection and Prevention | |
SIMION et al. | Applied cryptography and practical scenarios for cyber security defense | |
Khanday et al. | Intrusion Detection Systems for Trending Cyberattacks | |
Berchi et al. | Security Issues in Cloud-based IoT Systems | |
Muthengi | Combating current and emerging cybercrimes in Kenya | |
Sarowa et al. | Analysis of Cyber Attacks and Cyber Incident Patterns over APCERT Member Countries |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK4 | Application lapsed section 142(2)(d) - no continuation fee paid for the application |