ES2871898T3 - Indicador de reputación dinámica para optimizar operaciones de seguridad informática - Google Patents
Indicador de reputación dinámica para optimizar operaciones de seguridad informática Download PDFInfo
- Publication number
- ES2871898T3 ES2871898T3 ES17825369T ES17825369T ES2871898T3 ES 2871898 T3 ES2871898 T3 ES 2871898T3 ES 17825369 T ES17825369 T ES 17825369T ES 17825369 T ES17825369 T ES 17825369T ES 2871898 T3 ES2871898 T3 ES 2871898T3
- Authority
- ES
- Spain
- Prior art keywords
- reputation
- target entity
- indicator
- entity
- reputation indicator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/336,387 US10237293B2 (en) | 2016-10-27 | 2016-10-27 | Dynamic reputation indicator for optimizing computer security operations |
| PCT/EP2017/077390 WO2018077996A1 (en) | 2016-10-27 | 2017-10-26 | Dynamic reputation indicator for optimizing computer security operations |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ES2871898T3 true ES2871898T3 (es) | 2021-11-02 |
Family
ID=60935760
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| ES17825369T Active ES2871898T3 (es) | 2016-10-27 | 2017-10-26 | Indicador de reputación dinámica para optimizar operaciones de seguridad informática |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US10237293B2 (enExample) |
| EP (1) | EP3516572B1 (enExample) |
| JP (1) | JP7068294B2 (enExample) |
| KR (1) | KR102116573B1 (enExample) |
| CN (1) | CN109891422B (enExample) |
| AU (1) | AU2017350292B2 (enExample) |
| CA (1) | CA3037453C (enExample) |
| ES (1) | ES2871898T3 (enExample) |
| IL (1) | IL266200B (enExample) |
| RU (1) | RU2723665C1 (enExample) |
| SG (1) | SG11201903491XA (enExample) |
| WO (1) | WO2018077996A1 (enExample) |
Families Citing this family (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10237293B2 (en) * | 2016-10-27 | 2019-03-19 | Bitdefender IPR Management Ltd. | Dynamic reputation indicator for optimizing computer security operations |
| US9756061B1 (en) * | 2016-11-18 | 2017-09-05 | Extrahop Networks, Inc. | Detecting attacks using passive network monitoring |
| TWI755616B (zh) | 2017-04-21 | 2022-02-21 | 美商時美媒體公司 | 用於編碼器導引自適應性品質演現的系統及方法 |
| US11050783B2 (en) * | 2018-01-31 | 2021-06-29 | International Business Machines Corporation | System and method for detecting client participation in malware activity |
| US11165814B2 (en) | 2019-07-29 | 2021-11-02 | Extrahop Networks, Inc. | Modifying triage information based on network monitoring |
| US11409868B2 (en) * | 2019-09-26 | 2022-08-09 | At&T Intellectual Property I, L.P. | Ransomware detection and mitigation |
| CN111027067A (zh) * | 2019-11-25 | 2020-04-17 | 深圳传音控股股份有限公司 | 基于大数据分析的恶意软件识别方法、服务器及存储介质 |
| US11165823B2 (en) | 2019-12-17 | 2021-11-02 | Extrahop Networks, Inc. | Automated preemptive polymorphic deception |
| KR102180105B1 (ko) * | 2020-08-13 | 2020-11-17 | 최원천 | 장치에 설치된 소프트웨어에 대한 악성 소프트웨어 판단 방법 및 장치 |
| US11683331B2 (en) * | 2020-11-23 | 2023-06-20 | Juniper Networks, Inc. | Trust scoring of network entities in networks |
| US11349861B1 (en) | 2021-06-18 | 2022-05-31 | Extrahop Networks, Inc. | Identifying network entities based on beaconing activity |
| US11914709B2 (en) * | 2021-07-20 | 2024-02-27 | Bank Of America Corporation | Hybrid machine learning and knowledge graph approach for estimating and mitigating the spread of malicious software |
| US12074879B2 (en) | 2021-09-14 | 2024-08-27 | Juniper Networks, Inc. | Inferring trust in computer networks |
| US12170670B2 (en) | 2021-12-15 | 2024-12-17 | Juniper Networks, Inc. | Use of sentiment analysis to assess trust in a network |
| US12348568B1 (en) * | 2022-12-23 | 2025-07-01 | F5, Inc. | Methods for optimizing selection of a hardware security server and devices thereof |
| US12355803B2 (en) | 2022-12-30 | 2025-07-08 | Juniper Networks, Inc. | Remediation work score for network trust applications |
| US12483384B1 (en) | 2025-04-16 | 2025-11-25 | Extrahop Networks, Inc. | Resynchronizing encrypted network traffic |
Family Cites Families (35)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6931540B1 (en) | 2000-05-31 | 2005-08-16 | Networks Associates Technology, Inc. | System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed |
| US20020184362A1 (en) * | 2001-05-31 | 2002-12-05 | International Business Machines Corporation | System and method for extending server security through monitored load management |
| US8635690B2 (en) | 2004-11-05 | 2014-01-21 | Mcafee, Inc. | Reputation based message processing |
| WO2006101549A2 (en) | 2004-12-03 | 2006-09-28 | Whitecell Software, Inc. | Secure system for allowing the execution of authorized computer program code |
| WO2007117585A2 (en) * | 2006-04-06 | 2007-10-18 | Smobile Systems Inc. | System and method for managing malware protection on mobile devices |
| US8769673B2 (en) * | 2007-02-28 | 2014-07-01 | Microsoft Corporation | Identifying potentially offending content using associations |
| US8584094B2 (en) * | 2007-06-29 | 2013-11-12 | Microsoft Corporation | Dynamically computing reputation scores for objects |
| US7392544B1 (en) | 2007-12-18 | 2008-06-24 | Kaspersky Lab, Zao | Method and system for anti-malware scanning with variable scan settings |
| US8595282B2 (en) | 2008-06-30 | 2013-11-26 | Symantec Corporation | Simplified communication of a reputation score for an entity |
| US8225406B1 (en) | 2009-03-31 | 2012-07-17 | Symantec Corporation | Systems and methods for using reputation data to detect shared-object-based security threats |
| US8381289B1 (en) * | 2009-03-31 | 2013-02-19 | Symantec Corporation | Communication-based host reputation system |
| US8001606B1 (en) * | 2009-06-30 | 2011-08-16 | Symantec Corporation | Malware detection using a white list |
| US8955131B2 (en) | 2010-01-27 | 2015-02-10 | Mcafee Inc. | Method and system for proactive detection of malicious shared libraries via a remote reputation system |
| US9147071B2 (en) * | 2010-07-20 | 2015-09-29 | Mcafee, Inc. | System and method for proactive detection of malware device drivers via kernel forensic behavioral monitoring and a back-end reputation system |
| US8327441B2 (en) | 2011-02-17 | 2012-12-04 | Taasera, Inc. | System and method for application attestation |
| US9106680B2 (en) * | 2011-06-27 | 2015-08-11 | Mcafee, Inc. | System and method for protocol fingerprinting and reputation correlation |
| US9262624B2 (en) | 2011-09-16 | 2016-02-16 | Mcafee, Inc. | Device-tailored whitelists |
| RU2011138462A (ru) * | 2011-09-20 | 2013-04-10 | Закрытое акционерное общество "Лаборатория Касперского" | Использование решений пользователей для обнаружения неизвестных компьютерных угроз |
| US9235706B2 (en) * | 2011-12-02 | 2016-01-12 | Mcafee, Inc. | Preventing execution of task scheduled malware |
| US8769676B1 (en) * | 2011-12-22 | 2014-07-01 | Symantec Corporation | Techniques for identifying suspicious applications using requested permissions |
| US8918881B2 (en) * | 2012-02-24 | 2014-12-23 | Appthority, Inc. | Off-device anti-malware protection for mobile devices |
| US8914886B2 (en) | 2012-10-29 | 2014-12-16 | Mcafee, Inc. | Dynamic quarantining for malware detection |
| US9614865B2 (en) * | 2013-03-15 | 2017-04-04 | Mcafee, Inc. | Server-assisted anti-malware client |
| WO2014143000A1 (en) * | 2013-03-15 | 2014-09-18 | Mcafee, Inc. | Server-assisted anti-malware |
| WO2014143012A1 (en) * | 2013-03-15 | 2014-09-18 | Mcafee, Inc. | Remote malware remediation |
| US9639693B2 (en) | 2013-06-28 | 2017-05-02 | Symantec Corporation | Techniques for detecting a security vulnerability |
| US9117077B2 (en) * | 2013-09-27 | 2015-08-25 | Bitdefender IPR Management Ltd. | Systems and methods for using a reputation indicator to facilitate malware scanning |
| US9363282B1 (en) * | 2014-01-28 | 2016-06-07 | Infoblox Inc. | Platforms for implementing an analytics framework for DNS security |
| US9009827B1 (en) * | 2014-02-20 | 2015-04-14 | Palantir Technologies Inc. | Security sharing system |
| US9411959B2 (en) * | 2014-09-30 | 2016-08-09 | Juniper Networks, Inc. | Identifying an evasive malicious object based on a behavior delta |
| US10079846B2 (en) * | 2015-06-04 | 2018-09-18 | Cisco Technology, Inc. | Domain name system (DNS) based anomaly detection |
| US10063571B2 (en) * | 2016-01-04 | 2018-08-28 | Microsoft Technology Licensing, Llc | Systems and methods for the detection of advanced attackers using client side honeytokens |
| CN105578455B (zh) * | 2016-01-27 | 2020-06-09 | 哈尔滨工业大学深圳研究生院 | 一种机会网络中分布式动态信誉评估方法 |
| US10237293B2 (en) * | 2016-10-27 | 2019-03-19 | Bitdefender IPR Management Ltd. | Dynamic reputation indicator for optimizing computer security operations |
| US10681070B2 (en) * | 2017-05-26 | 2020-06-09 | Qatar Foundatiion | Method to identify malicious web domain names thanks to their dynamics |
-
2016
- 2016-10-27 US US15/336,387 patent/US10237293B2/en active Active
-
2017
- 2017-10-26 ES ES17825369T patent/ES2871898T3/es active Active
- 2017-10-26 KR KR1020197012029A patent/KR102116573B1/ko active Active
- 2017-10-26 CN CN201780066204.7A patent/CN109891422B/zh active Active
- 2017-10-26 WO PCT/EP2017/077390 patent/WO2018077996A1/en not_active Ceased
- 2017-10-26 EP EP17825369.6A patent/EP3516572B1/en active Active
- 2017-10-26 AU AU2017350292A patent/AU2017350292B2/en active Active
- 2017-10-26 CA CA3037453A patent/CA3037453C/en active Active
- 2017-10-26 SG SG11201903491XA patent/SG11201903491XA/en unknown
- 2017-10-26 JP JP2019522880A patent/JP7068294B2/ja active Active
- 2017-10-26 RU RU2019112780A patent/RU2723665C1/ru active
-
2019
- 2019-04-23 IL IL266200A patent/IL266200B/en active IP Right Grant
Also Published As
| Publication number | Publication date |
|---|---|
| KR20190067820A (ko) | 2019-06-17 |
| CN109891422B (zh) | 2023-03-10 |
| CA3037453A1 (en) | 2018-05-03 |
| JP2019533258A (ja) | 2019-11-14 |
| CA3037453C (en) | 2021-04-27 |
| RU2723665C1 (ru) | 2020-06-17 |
| WO2018077996A1 (en) | 2018-05-03 |
| KR102116573B1 (ko) | 2020-06-03 |
| CN109891422A (zh) | 2019-06-14 |
| EP3516572A1 (en) | 2019-07-31 |
| US20180124078A1 (en) | 2018-05-03 |
| IL266200A (en) | 2019-06-30 |
| JP7068294B2 (ja) | 2022-05-16 |
| AU2017350292A1 (en) | 2019-04-04 |
| IL266200B (en) | 2021-01-31 |
| EP3516572B1 (en) | 2021-03-24 |
| AU2017350292B2 (en) | 2021-08-26 |
| US10237293B2 (en) | 2019-03-19 |
| SG11201903491XA (en) | 2019-05-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ES2871898T3 (es) | Indicador de reputación dinámica para optimizar operaciones de seguridad informática | |
| ES2869400T3 (es) | Sistemas y métodos para usar un indicador de reputación con el fin de facilitar el escaneo de malware | |
| ES2794624T3 (es) | Sistemas y métodos para rastrear comportamiento malicioso a través de múltiples entidades de software | |
| US9183377B1 (en) | Unauthorized account monitoring system and method | |
| US7814549B2 (en) | Direct process access | |
| Kazoleas et al. | A novel malicious remote administration tool using stealth and self-defense techniques | |
| Zaheri et al. | Preventing reflective DLL injection on UWP apps | |
| HK40004203A (en) | Dynamic reputation indicator for optimizing computer security operations | |
| HK40004203B (en) | Dynamic reputation indicator for optimizing computer security operations | |
| Salahi et al. | Domain Ontology to Distinguish Different Types of Rootkits | |
| ERA | THE AV INDUSTRY IN THE | |
| Gupta et al. | Predictability in viral computing | |
| HK1219790B (zh) | 使用声誉指示符来促进恶意软件扫描的系统和方法 | |
| AU2006203351A1 (en) | Direct Process Access |