CN109074452A - 用于生成绊网文件的系统和方法 - Google Patents
用于生成绊网文件的系统和方法 Download PDFInfo
- Publication number
- CN109074452A CN109074452A CN201680082693.0A CN201680082693A CN109074452A CN 109074452 A CN109074452 A CN 109074452A CN 201680082693 A CN201680082693 A CN 201680082693A CN 109074452 A CN109074452 A CN 109074452A
- Authority
- CN
- China
- Prior art keywords
- trip wire
- file
- wire file
- client device
- fingerprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Retry When Errors Occur (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (20)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/070,523 US10339304B2 (en) | 2016-03-15 | 2016-03-15 | Systems and methods for generating tripwire files |
US15/070523 | 2016-03-15 | ||
PCT/US2016/069034 WO2017160376A1 (en) | 2016-03-15 | 2016-12-28 | Systems and methods for generating tripwire files |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109074452A true CN109074452A (zh) | 2018-12-21 |
CN109074452B CN109074452B (zh) | 2021-12-03 |
Family
ID=57838528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201680082693.0A Active CN109074452B (zh) | 2016-03-15 | 2016-12-28 | 用于生成绊网文件的系统和方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10339304B2 (zh) |
EP (1) | EP3430559B1 (zh) |
JP (1) | JP6789308B2 (zh) |
CN (1) | CN109074452B (zh) |
WO (1) | WO2017160376A1 (zh) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10715533B2 (en) * | 2016-07-26 | 2020-07-14 | Microsoft Technology Licensing, Llc. | Remediation for ransomware attacks on cloud drive folders |
KR102573921B1 (ko) * | 2016-09-13 | 2023-09-04 | 삼성전자주식회사 | 바이러스/멀웨어로부터 안전한 저장 장치, 그것을 포함한 컴퓨팅 시스템 및 그것의 방법 |
US10262135B1 (en) * | 2016-12-13 | 2019-04-16 | Symantec Corporation | Systems and methods for detecting and addressing suspicious file restore activities |
US10289844B2 (en) | 2017-01-19 | 2019-05-14 | International Business Machines Corporation | Protecting backup files from malware |
US10628585B2 (en) | 2017-01-23 | 2020-04-21 | Microsoft Technology Licensing, Llc | Ransomware resilient databases |
WO2019051507A1 (en) * | 2017-09-11 | 2019-03-14 | Carbon Black, Inc. | METHODS OF BEHAVIORAL DETECTION AND PREVENTION OF CYBERATTAICS, AS WELL AS APPARATUS AND RELATED TECHNIQUES |
US10831888B2 (en) * | 2018-01-19 | 2020-11-10 | International Business Machines Corporation | Data recovery enhancement system |
US11308207B2 (en) * | 2018-03-30 | 2022-04-19 | Microsoft Technology Licensing, Llc | User verification of malware impacted files |
US10963564B2 (en) | 2018-03-30 | 2021-03-30 | Microsoft Technology Licensing, Llc | Selection of restore point based on detection of malware attack |
US11200320B2 (en) | 2018-03-30 | 2021-12-14 | Microsoft Technology Licensing, Llc | Coordinating service ransomware detection with client-side ransomware detection |
US10917416B2 (en) * | 2018-03-30 | 2021-02-09 | Microsoft Technology Licensing, Llc | Service identification of ransomware impacted files |
US10769278B2 (en) | 2018-03-30 | 2020-09-08 | Microsoft Technology Licensing, Llc | Service identification of ransomware impact at account level |
US10739979B2 (en) | 2018-07-16 | 2020-08-11 | Microsoft Technology Licensing, Llc | Histogram slider for quick navigation of a time-based list |
US11681591B2 (en) * | 2019-04-02 | 2023-06-20 | Acronis International Gmbh | System and method of restoring a clean backup after a malware attack |
US12056239B2 (en) * | 2020-08-18 | 2024-08-06 | Micro Focus Llc | Thread-based malware detection |
US11714907B2 (en) * | 2021-03-09 | 2023-08-01 | WatchPoint Data, Inc. | System, method, and apparatus for preventing ransomware |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090100520A1 (en) * | 2007-10-12 | 2009-04-16 | Microsoft Corporation | Detection and dynamic alteration of execution of potential software threats |
US20090281758A1 (en) * | 2008-05-08 | 2009-11-12 | Lecroy Corporation | Method and Apparatus for Triggering a Test and Measurement Instrument |
CN101763479A (zh) * | 2008-12-22 | 2010-06-30 | 赛门铁克公司 | 自适应数据丢失防护策略 |
CN101777062A (zh) * | 2008-12-17 | 2010-07-14 | 赛门铁克公司 | 场境感知的实时计算机保护系统和方法 |
US8549643B1 (en) * | 2010-04-02 | 2013-10-01 | Symantec Corporation | Using decoys by a data loss prevention system to protect against unscripted activity |
WO2014103115A1 (ja) * | 2012-12-26 | 2014-07-03 | 三菱電機株式会社 | 不正侵入検知装置、不正侵入検知方法、不正侵入検知プログラム及び記録媒体 |
CN104298921A (zh) * | 2013-07-15 | 2015-01-21 | 深圳市腾讯计算机系统有限公司 | 动画源文件安全漏洞检查方法及装置 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8640247B2 (en) | 2006-05-31 | 2014-01-28 | The Invention Science Fund I, Llc | Receiving an indication of a security breach of a protected set of files |
US20120084866A1 (en) * | 2007-06-12 | 2012-04-05 | Stolfo Salvatore J | Methods, systems, and media for measuring computer security |
US9009829B2 (en) | 2007-06-12 | 2015-04-14 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for baiting inside attackers |
US8739281B2 (en) * | 2011-12-06 | 2014-05-27 | At&T Intellectual Property I, L.P. | Multilayered deception for intrusion detection and prevention |
US9992225B2 (en) * | 2014-09-12 | 2018-06-05 | Topspin Security Ltd. | System and a method for identifying malware network activity using a decoy environment |
US20160180087A1 (en) * | 2014-12-23 | 2016-06-23 | Jonathan L. Edwards | Systems and methods for malware detection and remediation |
US9483644B1 (en) * | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
US9923908B2 (en) * | 2015-04-29 | 2018-03-20 | International Business Machines Corporation | Data protection in a networked computing environment |
-
2016
- 2016-03-15 US US15/070,523 patent/US10339304B2/en active Active
- 2016-12-28 CN CN201680082693.0A patent/CN109074452B/zh active Active
- 2016-12-28 WO PCT/US2016/069034 patent/WO2017160376A1/en active Application Filing
- 2016-12-28 JP JP2018546431A patent/JP6789308B2/ja active Active
- 2016-12-28 EP EP16828876.9A patent/EP3430559B1/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090100520A1 (en) * | 2007-10-12 | 2009-04-16 | Microsoft Corporation | Detection and dynamic alteration of execution of potential software threats |
US20090281758A1 (en) * | 2008-05-08 | 2009-11-12 | Lecroy Corporation | Method and Apparatus for Triggering a Test and Measurement Instrument |
CN101777062A (zh) * | 2008-12-17 | 2010-07-14 | 赛门铁克公司 | 场境感知的实时计算机保护系统和方法 |
CN101763479A (zh) * | 2008-12-22 | 2010-06-30 | 赛门铁克公司 | 自适应数据丢失防护策略 |
US8549643B1 (en) * | 2010-04-02 | 2013-10-01 | Symantec Corporation | Using decoys by a data loss prevention system to protect against unscripted activity |
WO2014103115A1 (ja) * | 2012-12-26 | 2014-07-03 | 三菱電機株式会社 | 不正侵入検知装置、不正侵入検知方法、不正侵入検知プログラム及び記録媒体 |
JP2016033690A (ja) * | 2012-12-26 | 2016-03-10 | 三菱電機株式会社 | 不正侵入検知装置、不正侵入検知方法、不正侵入検知プログラム及び記録媒体 |
CN104298921A (zh) * | 2013-07-15 | 2015-01-21 | 深圳市腾讯计算机系统有限公司 | 动画源文件安全漏洞检查方法及装置 |
Non-Patent Citations (5)
Title |
---|
MATHIEU JAN, ET AL.: "Usage of the safety-oriented real-time OASIS approach to build deterministic protection relays", 《INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEM (SIES)》 * |
丁振凡 等: "基于Spring 的网站文件安全监测系统设计", 《计算机技术与发展》 * |
刘欣欣 等: "端口扫描与漏洞安全检测系统SD", 《计算机应用与软件》 * |
王畅 等: "劫持Linux系统调用封杀Core Dump漏洞攻击", 《计算机安全》 * |
黄荣荣 等: "基于安全审计日志的网络文件系统数据完整性保护方法", 《第15届全国信息存储技术学术会议论文集》 * |
Also Published As
Publication number | Publication date |
---|---|
JP6789308B2 (ja) | 2020-11-25 |
CN109074452B (zh) | 2021-12-03 |
EP3430559B1 (en) | 2020-08-26 |
US20170270293A1 (en) | 2017-09-21 |
JP2019512142A (ja) | 2019-05-09 |
US10339304B2 (en) | 2019-07-02 |
EP3430559A1 (en) | 2019-01-23 |
WO2017160376A1 (en) | 2017-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109074452A (zh) | 用于生成绊网文件的系统和方法 | |
CN106133743B (zh) | 用于优化预安装应用程序的扫描的系统和方法 | |
CN105453102B (zh) | 用于识别已泄漏的私有密钥的系统和方法 | |
CN106133741B (zh) | 用于响应于检测可疑行为来扫描打包程序的系统和方法 | |
CN110383278A (zh) | 用于检测恶意计算事件的系统和方法 | |
CN108701188A (zh) | 响应于检测潜在勒索软件以用于修改文件备份的系统和方法 | |
US9245123B1 (en) | Systems and methods for identifying malicious files | |
JP6703616B2 (ja) | セキュリティ脅威を検出するためのシステム及び方法 | |
US10410158B1 (en) | Systems and methods for evaluating cybersecurity risk | |
US9317679B1 (en) | Systems and methods for detecting malicious documents based on component-object reuse | |
CN107810504A (zh) | 基于用户行为确定恶意下载风险的系统和方法 | |
US9185119B1 (en) | Systems and methods for detecting malware using file clustering | |
CN109154962A (zh) | 用于确定安全风险简档的系统和方法 | |
CN106415584B (zh) | 移动设备恶意软件的预安装检测系统和方法 | |
CN107005543A (zh) | 用于防止未经授权的网络入侵的系统和方法 | |
US9338012B1 (en) | Systems and methods for identifying code signing certificate misuse | |
US9973525B1 (en) | Systems and methods for determining the risk of information leaks from cloud-based services | |
CN105683910B (zh) | 用于更新只读系统映像内的系统级服务的系统和方法 | |
CN108293044A (zh) | 用于经由域名服务流量分析来检测恶意软件感染的系统和方法 | |
US10425435B1 (en) | Systems and methods for detecting anomalous behavior in shared data repositories | |
US10366233B1 (en) | Systems and methods for trichotomous malware classification | |
US9292691B1 (en) | Systems and methods for protecting users from website security risks using templates | |
US9652615B1 (en) | Systems and methods for analyzing suspected malware | |
CN106030527B (zh) | 将可供下载的应用程序通知用户的系统和方法 | |
CN109997138A (zh) | 用于检测计算设备上的恶意进程的系统和方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: California, USA Applicant after: Norton weifuke Co. Address before: California, USA Applicant before: Symantec Corp. |
|
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Arizona, USA Applicant after: Norton weifuke Co. Address before: California, USA Applicant before: Norton weifuke Co. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Arizona Patentee after: Keane Digital Co. Address before: Arizona Patentee before: Norton weifuke Co. |
|
CP01 | Change in the name or title of a patent holder |