GB201804776D0 - Malware Barrier - Google Patents
Malware BarrierInfo
- Publication number
- GB201804776D0 GB201804776D0 GBGB1804776.1A GB201804776A GB201804776D0 GB 201804776 D0 GB201804776 D0 GB 201804776D0 GB 201804776 A GB201804776 A GB 201804776A GB 201804776 D0 GB201804776 D0 GB 201804776D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- malware
- barrier
- malware barrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1804776.1A GB201804776D0 (en) | 2018-03-25 | 2018-03-25 | Malware Barrier |
GB1903788.6A GB2574093B (en) | 2018-03-25 | 2019-03-20 | Malware barrier |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1804776.1A GB201804776D0 (en) | 2018-03-25 | 2018-03-25 | Malware Barrier |
Publications (1)
Publication Number | Publication Date |
---|---|
GB201804776D0 true GB201804776D0 (en) | 2018-05-09 |
Family
ID=62067957
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB1804776.1A Ceased GB201804776D0 (en) | 2018-03-25 | 2018-03-25 | Malware Barrier |
GB1903788.6A Active GB2574093B (en) | 2018-03-25 | 2019-03-20 | Malware barrier |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1903788.6A Active GB2574093B (en) | 2018-03-25 | 2019-03-20 | Malware barrier |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB201804776D0 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112469041A (en) * | 2020-11-30 | 2021-03-09 | 广州大学 | Malicious program isolation and control method based on wireless sensor network |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4107919A1 (en) * | 2020-02-17 | 2022-12-28 | British Telecommunications public limited company | Malware propagation forecasting |
US20230100643A1 (en) * | 2020-02-17 | 2023-03-30 | British Telecommunications Public Limited Company | Real-time malware propagation forecasting |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007249579A (en) * | 2006-03-15 | 2007-09-27 | Fujitsu Ltd | Worm countermeasure parameter determination program, worm countermeasure parameter determination device, node number determination program, node number determination device and node number limitation system |
CN104166708A (en) * | 2014-08-11 | 2014-11-26 | 肇庆学院 | Mobile phone virus spreading modeling method based on social network and semi-Markov process |
CN106027513B (en) * | 2016-05-15 | 2019-01-08 | 广东技术师范学院 | Propagation characteristic analysis method of the computer virus under SDN mobile environment |
KR101825911B1 (en) * | 2016-09-26 | 2018-02-07 | 국방과학연구소 | Worm attack modeling and simulation for data transport network having hierarchical structure |
CN106656571A (en) * | 2016-11-09 | 2017-05-10 | 天津大学 | Clustering wireless sensor network malicious program propagation model based on evolution game |
CN106936855B (en) * | 2017-05-12 | 2020-01-10 | 中国人民解放军信息工程大学 | Network security defense decision-making determination method and device based on attack and defense differential game |
-
2018
- 2018-03-25 GB GBGB1804776.1A patent/GB201804776D0/en not_active Ceased
-
2019
- 2019-03-20 GB GB1903788.6A patent/GB2574093B/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112469041A (en) * | 2020-11-30 | 2021-03-09 | 广州大学 | Malicious program isolation and control method based on wireless sensor network |
CN112469041B (en) * | 2020-11-30 | 2022-11-04 | 广州大学 | Malicious program isolation and control method based on wireless sensor network |
Also Published As
Publication number | Publication date |
---|---|
GB201903788D0 (en) | 2019-05-01 |
GB2574093B (en) | 2020-10-07 |
GB2574093A (en) | 2019-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL267949A (en) | Altered virus | |
GB202018989D0 (en) | Malware detection | |
GB2575052B (en) | Phishing detection | |
GB201711744D0 (en) | Barrier system | |
GB2555384B (en) | Preventing phishing attacks | |
GB2574093B (en) | Malware barrier | |
IL271529A (en) | Barrier | |
EP3867476C0 (en) | Passage barrier | |
GB201820983D0 (en) | Virus | |
GB201717370D0 (en) | Barrier | |
GB2594660B (en) | Barrier | |
GB201703675D0 (en) | Barrier arrangement | |
GB201713671D0 (en) | Barrier system | |
CA194487S (en) | Barrier | |
ZA201807645B (en) | Barrier | |
ZA202006468B (en) | Barrier | |
GB2580051B (en) | Barrier assembly | |
ZA202004873B (en) | Barrier arrangement | |
GB201914157D0 (en) | Barrier | |
GB201904877D0 (en) | Barrier | |
EP3867456C0 (en) | Passage barrier | |
GB2567437B (en) | Barrier | |
GB201811225D0 (en) | Area denial | |
GB2611724B (en) | Phishing detection | |
GB2579509B (en) | Barrier system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AT | Applications terminated before publication under section 16(1) |