CA2718594A1 - Method and system for protection against information stealing software - Google Patents

Method and system for protection against information stealing software Download PDF

Info

Publication number
CA2718594A1
CA2718594A1 CA2718594A CA2718594A CA2718594A1 CA 2718594 A1 CA2718594 A1 CA 2718594A1 CA 2718594 A CA2718594 A CA 2718594A CA 2718594 A CA2718594 A CA 2718594A CA 2718594 A1 CA2718594 A1 CA 2718594A1
Authority
CA
Canada
Prior art keywords
bait
sensitive information
information
traffic analyzer
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA2718594A
Other languages
English (en)
French (fr)
Inventor
Lidror Troyansky
Sharon Bruckner
Daniel Lyle Hubbard
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Websense LLC
Original Assignee
Websense LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/051,579 external-priority patent/US9015842B2/en
Priority claimed from US12/051,616 external-priority patent/US9130986B2/en
Priority claimed from US12/051,670 external-priority patent/US8407784B2/en
Application filed by Websense LLC filed Critical Websense LLC
Publication of CA2718594A1 publication Critical patent/CA2718594A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
CA2718594A 2008-03-19 2009-03-17 Method and system for protection against information stealing software Abandoned CA2718594A1 (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US12/051,579 US9015842B2 (en) 2008-03-19 2008-03-19 Method and system for protection against information stealing software
US12/051,616 US9130986B2 (en) 2008-03-19 2008-03-19 Method and system for protection against information stealing software
US12/051,616 2008-03-19
US12/051,670 2008-03-19
US12/051,579 2008-03-19
US12/051,670 US8407784B2 (en) 2008-03-19 2008-03-19 Method and system for protection against information stealing software
PCT/US2009/037435 WO2009117445A2 (en) 2008-03-19 2009-03-17 Method and system for protection against information stealing software

Publications (1)

Publication Number Publication Date
CA2718594A1 true CA2718594A1 (en) 2009-09-24

Family

ID=40736626

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2718594A Abandoned CA2718594A1 (en) 2008-03-19 2009-03-17 Method and system for protection against information stealing software

Country Status (5)

Country Link
EP (1) EP2272024A2 (de)
CN (1) CN101978376A (de)
AU (1) AU2009225671A1 (de)
CA (1) CA2718594A1 (de)
WO (1) WO2009117445A2 (de)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130298254A1 (en) * 2010-10-26 2013-11-07 Matthew Richard Thomas Hall Methods and systems for detecting suspected data leakage using traffic samples
CN103607392A (zh) * 2010-12-14 2014-02-26 华为数字技术(成都)有限公司 一种防范钓鱼攻击的方法及装置
CN102098285B (zh) * 2010-12-14 2013-12-04 华为数字技术(成都)有限公司 一种防范钓鱼攻击的方法及装置
JP5624938B2 (ja) * 2011-05-13 2014-11-12 日立オムロンターミナルソリューションズ株式会社 自動取引装置および自動取引システム
CN102801688B (zh) * 2011-05-23 2015-11-25 联想(北京)有限公司 一种数据访问的方法、装置及支持数据访问的终端
CN103294950B (zh) * 2012-11-29 2016-07-06 北京安天电子设备有限公司 一种基于反向追踪的高威窃密恶意代码检测方法及系统
CN103177204B (zh) * 2013-03-29 2016-09-28 北京奇虎科技有限公司 密码信息提示方法及装置
MY184389A (en) * 2013-05-17 2021-04-01 Mimos Berhad Method and system for detecting keylogger
US9357397B2 (en) * 2014-07-23 2016-05-31 Qualcomm Incorporated Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device
CN105512020B (zh) * 2014-09-24 2018-05-04 阿里巴巴集团控股有限公司 测试方法及装置
CN105447385B (zh) * 2014-12-08 2018-04-24 哈尔滨安天科技股份有限公司 一种多层次检测的应用型数据库蜜罐实现系统及方法
CN105141610A (zh) 2015-08-28 2015-12-09 百度在线网络技术(北京)有限公司 钓鱼页面检测方法及系统
CN106549960A (zh) * 2016-10-27 2017-03-29 北京安天电子设备有限公司 一种基于网络监控追踪攻击者的方法及系统
CN108256323A (zh) * 2016-12-29 2018-07-06 武汉安天信息技术有限责任公司 一种针对钓鱼应用的检测方法及装置
CN108830089B (zh) * 2018-05-16 2022-04-08 哈尔滨工业大学 高频数据传输中电磁辐射信息泄漏的主动防护系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1147795C (zh) * 2001-04-29 2004-04-28 北京瑞星科技股份有限公司 检测和清除已知及未知计算机病毒的方法、系统
US7636943B2 (en) 2005-06-13 2009-12-22 Aladdin Knowledge Systems Ltd. Method and system for detecting blocking and removing spyware
US7721333B2 (en) * 2006-01-18 2010-05-18 Webroot Software, Inc. Method and system for detecting a keylogger on a computer
WO2009032379A1 (en) * 2007-06-12 2009-03-12 The Trustees Of Columbia University In The City Of New York Methods and systems for providing trap-based defenses

Also Published As

Publication number Publication date
WO2009117445A3 (en) 2009-11-12
AU2009225671A1 (en) 2009-09-24
CN101978376A (zh) 2011-02-16
EP2272024A2 (de) 2011-01-12
WO2009117445A2 (en) 2009-09-24

Similar Documents

Publication Publication Date Title
US9455981B2 (en) Method and system for protection against information stealing software
US9495539B2 (en) Method and system for protection against information stealing software
US8959634B2 (en) Method and system for protection against information stealing software
CA2718594A1 (en) Method and system for protection against information stealing software
Ussath et al. Advanced persistent threats: Behind the scenes
JP6104149B2 (ja) ログ分析装置及びログ分析方法及びログ分析プログラム
US7890612B2 (en) Method and apparatus for regulating data flow between a communications device and a network
US7681234B2 (en) Preventing phishing attacks
KR101689298B1 (ko) 보안이벤트 자동 검증 방법 및 장치
Biju et al. Cyber attacks and its different types
CN102246490A (zh) 对不需要的软件或恶意软件进行分类的系统和方法
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Altwairqi et al. Four most famous cyber attacks for financial gains
CA2587867C (en) Network security device
Waziri Website forgery: Understanding phishing attacks and nontechnical Countermeasures
Ruhani et al. Keylogger: The Unsung Hacking Weapon
Abbas et al. A comprehensive approach to designing internet security taxonomy
Vakil et al. Cyber Attacks: Detection and Prevention
Khanday et al. Intrusion Detection Systems for Trending Cyberattacks
Berchi et al. Security Issues in Cloud-based IoT Systems
Harrison et al. A protocol layer survey of network security
Teichmann et al. Phishing attacks: risks and challenges for law firms
Sarowa et al. Analysis of Cyber Attacks and Cyber Incident Patterns over APCERT Member Countries
Muthengi Combating current and emerging cybercrimes in Kenya
Ogwueleka et al. A Mitigation Technique For Internet Security Threat of Toolkits Attack

Legal Events

Date Code Title Description
FZDE Discontinued

Effective date: 20130318