CN104221026B - 用于移动站中的恶意活动检测的方法 - Google Patents

用于移动站中的恶意活动检测的方法 Download PDF

Info

Publication number
CN104221026B
CN104221026B CN201380018927.1A CN201380018927A CN104221026B CN 104221026 B CN104221026 B CN 104221026B CN 201380018927 A CN201380018927 A CN 201380018927A CN 104221026 B CN104221026 B CN 104221026B
Authority
CN
China
Prior art keywords
movement station
behavior
model
movement
mobile station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201380018927.1A
Other languages
English (en)
Chinese (zh)
Other versions
CN104221026A (zh
Inventor
拉贾什·古普塔
萨乌米特拉·莫汉·达斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN104221026A publication Critical patent/CN104221026A/zh
Application granted granted Critical
Publication of CN104221026B publication Critical patent/CN104221026B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Monitoring And Testing Of Transmission In General (AREA)
CN201380018927.1A 2012-04-10 2013-04-08 用于移动站中的恶意活动检测的方法 Active CN104221026B (zh)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201261622463P 2012-04-10 2012-04-10
US61/622,463 2012-04-10
US13/741,388 2013-01-15
US13/741,388 US9439077B2 (en) 2012-04-10 2013-01-15 Method for malicious activity detection in a mobile station
PCT/US2013/035586 WO2013154975A1 (en) 2012-04-10 2013-04-08 Method for malicious activity detection in a mobile station

Publications (2)

Publication Number Publication Date
CN104221026A CN104221026A (zh) 2014-12-17
CN104221026B true CN104221026B (zh) 2017-05-24

Family

ID=49292668

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201380018927.1A Active CN104221026B (zh) 2012-04-10 2013-04-08 用于移动站中的恶意活动检测的方法

Country Status (6)

Country Link
US (1) US9439077B2 (enExample)
EP (1) EP2836955B1 (enExample)
JP (1) JP6140808B2 (enExample)
KR (1) KR102092045B1 (enExample)
CN (1) CN104221026B (enExample)
WO (1) WO2013154975A1 (enExample)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9690635B2 (en) 2012-05-14 2017-06-27 Qualcomm Incorporated Communicating behavior information in a mobile computing device
US9202047B2 (en) 2012-05-14 2015-12-01 Qualcomm Incorporated System, apparatus, and method for adaptive observation of mobile device behavior
US9609456B2 (en) 2012-05-14 2017-03-28 Qualcomm Incorporated Methods, devices, and systems for communicating behavioral analysis information
US9324034B2 (en) 2012-05-14 2016-04-26 Qualcomm Incorporated On-device real-time behavior analyzer
US9298494B2 (en) 2012-05-14 2016-03-29 Qualcomm Incorporated Collaborative learning for efficient behavioral analysis in networked mobile device
US9495537B2 (en) 2012-08-15 2016-11-15 Qualcomm Incorporated Adaptive observation of behavioral features on a mobile device
US9319897B2 (en) 2012-08-15 2016-04-19 Qualcomm Incorporated Secure behavior analysis over trusted execution environment
US9747440B2 (en) 2012-08-15 2017-08-29 Qualcomm Incorporated On-line behavioral analysis engine in mobile device with multiple analyzer model providers
US9330257B2 (en) 2012-08-15 2016-05-03 Qualcomm Incorporated Adaptive observation of behavioral features on a mobile device
US9686023B2 (en) 2013-01-02 2017-06-20 Qualcomm Incorporated Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors
US9684870B2 (en) 2013-01-02 2017-06-20 Qualcomm Incorporated Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors
US10089582B2 (en) 2013-01-02 2018-10-02 Qualcomm Incorporated Using normalized confidence values for classifying mobile device behaviors
US9742559B2 (en) 2013-01-22 2017-08-22 Qualcomm Incorporated Inter-module authentication for securing application execution integrity within a computing device
US9491187B2 (en) 2013-02-15 2016-11-08 Qualcomm Incorporated APIs for obtaining device-specific behavior classifier models from the cloud
EP3586057B1 (en) 2017-02-24 2022-09-14 ExxonMobil Upstream Research Company Method of purging a dual purpose lng/lin storage tank
US10798112B2 (en) 2017-03-30 2020-10-06 Fireeye, Inc. Attribute-controlled malware detection
US10791138B1 (en) * 2017-03-30 2020-09-29 Fireeye, Inc. Subscription-based malware detection
US10803172B2 (en) 2017-05-02 2020-10-13 Crowdstrike, Inc. Malicious/benign computational behavior detection using canonic patterns of behavior
AU2019281725B2 (en) 2018-06-07 2022-03-17 Exxonmobil Upstream Research Company Pretreatment and pre-cooling of natural gas by high pressure compression and expansion
JP7100762B2 (ja) 2018-08-14 2022-07-13 エクソンモービル アップストリーム リサーチ カンパニー 天然ガス液化施設における混合冷媒の保存方法
AU2019325914B2 (en) 2018-08-22 2023-01-19 ExxonMobil Technology and Engineering Company Primary loop start-up method for a high pressure expander process
WO2020040953A2 (en) 2018-08-22 2020-02-27 Exxonmobil Upstream Research Company Heat exchanger configuration for a high pressure expander process and a method of natural gas liquefaction using the same
WO2020106397A1 (en) 2018-11-20 2020-05-28 Exxonmobil Upstream Research Company Methods and apparatus for improving multi-plate scraped heat exchangers
WO2020106394A1 (en) 2018-11-20 2020-05-28 Exxonmobil Upstream Research Company Poly refrigerated integrated cycle operation using solid-tolerant heat exchangers
EP3657364A1 (en) * 2018-11-20 2020-05-27 Nagravision SA Authorising operations for devices in a network
US11415348B2 (en) 2019-01-30 2022-08-16 Exxonmobil Upstream Research Company Methods for removal of moisture from LNG refrigerant
US11668524B2 (en) 2019-01-30 2023-06-06 Exxonmobil Upstream Research Company Methods for removal of moisture from LNG refrigerant
US11843621B2 (en) * 2019-03-08 2023-12-12 Forescout Technologies, Inc. Behavior based profiling
US11465093B2 (en) 2019-08-19 2022-10-11 Exxonmobil Upstream Research Company Compliant composite heat exchangers
US20210063083A1 (en) 2019-08-29 2021-03-04 Exxonmobil Upstream Research Company Liquefaction of Production Gas
EP4031821A1 (en) 2019-09-19 2022-07-27 ExxonMobil Upstream Research Company Pretreatment and pre-cooling of natural gas by high pressure compression and expansion
JP7326483B2 (ja) 2019-09-19 2023-08-15 エクソンモービル・テクノロジー・アンド・エンジニアリング・カンパニー 高圧圧縮及び膨張による天然ガスの前処理及び予冷
JP7326485B2 (ja) 2019-09-19 2023-08-15 エクソンモービル・テクノロジー・アンド・エンジニアリング・カンパニー 高圧圧縮及び膨張による天然ガスの前処理、予冷及び凝縮物回収
US11083994B2 (en) 2019-09-20 2021-08-10 Exxonmobil Upstream Research Company Removal of acid gases from a gas stream, with O2 enrichment for acid gas capture and sequestration
WO2021061253A1 (en) 2019-09-24 2021-04-01 Exxonmobil Upstream Research Company Cargo stripping features for dual-purpose cryogenic tanks on ships or floating storage units for lng and liquid nitrogen

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936910A (zh) * 2005-11-16 2007-03-28 白杰 未知病毒程序的识别及清除方法
CN101388056A (zh) * 2008-10-20 2009-03-18 成都市华为赛门铁克科技有限公司 一种预防恶意程序的方法、系统及装置
CN101593253A (zh) * 2009-06-22 2009-12-02 成都市华为赛门铁克科技有限公司 一种恶意程序判断方法及装置
WO2010141826A3 (en) * 2009-06-05 2011-03-03 The Regents Of The University Of Michigan System and method for detecting energy consumption anomalies and mobile malware variants

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060062179A1 (en) * 2004-09-23 2006-03-23 Arne Simonsson Transparent broadcast structure in communication systems
JP4327698B2 (ja) * 2004-10-19 2009-09-09 富士通株式会社 ネットワーク型ウィルス活動検出プログラム、処理方法およびシステム
US8095983B2 (en) * 2005-03-15 2012-01-10 Mu Dynamics, Inc. Platform for analyzing the security of communication protocols and channels
US20070123214A1 (en) 2005-11-25 2007-05-31 Motorola, Inc. Mobile device system and strategies for determining malicious code activity
US8201244B2 (en) * 2006-09-19 2012-06-12 Microsoft Corporation Automated malware signature generation
WO2008067335A2 (en) 2006-11-27 2008-06-05 Smobile Systems, Inc. Wireless intrusion prevention system and method
US9367680B2 (en) 2008-10-21 2016-06-14 Lookout, Inc. System and method for mobile communication device application advisement
US9235704B2 (en) 2008-10-21 2016-01-12 Lookout, Inc. System and method for a scanning API
US8769684B2 (en) * 2008-12-02 2014-07-01 The Trustees Of Columbia University In The City Of New York Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
US9280778B2 (en) * 2008-12-15 2016-03-08 Qualcomm Incorporated Location logging and location and time based filtering
US8468602B2 (en) 2010-03-08 2013-06-18 Raytheon Company System and method for host-level malware detection
US8464345B2 (en) 2010-04-28 2013-06-11 Symantec Corporation Behavioral signature generation using clustering
JP5478390B2 (ja) * 2010-07-12 2014-04-23 Kddi株式会社 ログ抽出システムおよびプログラム
JP5779334B2 (ja) * 2010-11-09 2015-09-16 デジタルア−ツ株式会社 出力制御装置、出力制御プログラム、出力制御方法および出力制御システム
US20120167218A1 (en) * 2010-12-23 2012-06-28 Rajesh Poornachandran Signature-independent, system behavior-based malware detection
KR101834810B1 (ko) * 2011-06-07 2018-03-06 엘지전자 주식회사 이동 단말기 및 그의 배터리 절전모드 전환 방법

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936910A (zh) * 2005-11-16 2007-03-28 白杰 未知病毒程序的识别及清除方法
CN101388056A (zh) * 2008-10-20 2009-03-18 成都市华为赛门铁克科技有限公司 一种预防恶意程序的方法、系统及装置
WO2010141826A3 (en) * 2009-06-05 2011-03-03 The Regents Of The University Of Michigan System and method for detecting energy consumption anomalies and mobile malware variants
CN101593253A (zh) * 2009-06-22 2009-12-02 成都市华为赛门铁克科技有限公司 一种恶意程序判断方法及装置

Also Published As

Publication number Publication date
KR20140143839A (ko) 2014-12-17
JP6140808B2 (ja) 2017-05-31
CN104221026A (zh) 2014-12-17
EP2836955A1 (en) 2015-02-18
WO2013154975A1 (en) 2013-10-17
KR102092045B1 (ko) 2020-03-23
EP2836955B1 (en) 2020-04-01
US9439077B2 (en) 2016-09-06
JP2015519789A (ja) 2015-07-09
US20130267201A1 (en) 2013-10-10

Similar Documents

Publication Publication Date Title
CN104221026B (zh) 用于移动站中的恶意活动检测的方法
KR102057565B1 (ko) 멀웨어를 검출하기 위한 컴퓨팅 디바이스
US9609456B2 (en) Methods, devices, and systems for communicating behavioral analysis information
Alan et al. Can Android applications be identified using only TCP/IP headers of their launch time traffic?
TWI530141B (zh) 動態地產生及使用裝置特定及裝置狀態特定之分類器模型以高效率分類行動裝置行為之方法及系統
Schmidt et al. Monitoring smartphones for anomaly detection
US9357397B2 (en) Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device
CN104272788B (zh) 在移动计算装置中传达行为信息
US11689550B2 (en) Methods and apparatus to analyze network traffic for malicious activity
EP3117361B1 (en) Behavioral analysis for securing peripheral devices
CN107408178A (zh) 用于通过云与客户端行为的差异来识别恶意软件的方法及系统
WO2014164918A1 (en) Method for efficient behavioral analysis on a mobile station

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant