GB2560861B8 - Labeling computing objects for improved threat detection - Google Patents

Labeling computing objects for improved threat detection

Info

Publication number
GB2560861B8
GB2560861B8 GB1811123.7A GB201811123A GB2560861B8 GB 2560861 B8 GB2560861 B8 GB 2560861B8 GB 201811123 A GB201811123 A GB 201811123A GB 2560861 B8 GB2560861 B8 GB 2560861B8
Authority
GB
United Kingdom
Prior art keywords
threat detection
computing objects
improved threat
labeling
labeling computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1811123.7A
Other versions
GB2560861A8 (en
GB2560861B (en
GB2560861A (en
GB201811123D0 (en
Inventor
D Ray Kenneth
Salvatore Schiappa Daniel
Neil Reed Simon
D Harris Mark
Robert Tyndale Watkiss Neil
J Thomas Andrew
W Cook Robert
Schutz Harald
Edward Tyrone Shaw John
John Merry Anthony
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sophos Ltd
Original Assignee
Sophos Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US14/485,759 priority Critical patent/US9967282B2/en
Priority to US14/485,782 priority patent/US10122687B2/en
Priority to US14/485,765 priority patent/US20160080419A1/en
Priority to US14/485,769 priority patent/US9965627B2/en
Priority to US14/485,762 priority patent/US9967283B2/en
Priority to US14/485,771 priority patent/US9992228B2/en
Priority to US14/485,774 priority patent/US9537841B2/en
Priority to US14/485,790 priority patent/US9967264B2/en
Priority to GB1804873.6A priority patent/GB2558811B/en
Application filed by Sophos Ltd filed Critical Sophos Ltd
Publication of GB201811123D0 publication Critical patent/GB201811123D0/en
Publication of GB2560861A publication Critical patent/GB2560861A/en
Application granted granted Critical
Publication of GB2560861B publication Critical patent/GB2560861B/en
Publication of GB2560861B8 publication Critical patent/GB2560861B8/en
Publication of GB2560861A8 publication Critical patent/GB2560861A8/en
Application status is Active legal-status Critical
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
GB1811123.7A 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection Active GB2560861B8 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
US14/485,765 US20160080419A1 (en) 2014-09-14 2014-09-14 Data behavioral tracking
US14/485,769 US9965627B2 (en) 2014-09-14 2014-09-14 Labeling objects on an endpoint for encryption management
US14/485,762 US9967283B2 (en) 2014-09-14 2014-09-14 Normalized indications of compromise
US14/485,771 US9992228B2 (en) 2014-09-14 2014-09-14 Using indications of compromise for reputation based network security
US14/485,774 US9537841B2 (en) 2014-09-14 2014-09-14 Key management for compromised enterprise endpoints
US14/485,782 US10122687B2 (en) 2014-09-14 2014-09-14 Firewall techniques for colored objects on endpoints
US14/485,790 US9967264B2 (en) 2014-09-14 2014-09-14 Threat detection using a time-based cache of reputation information on an enterprise endpoint
US14/485,759 US9967282B2 (en) 2014-09-14 2014-09-14 Labeling computing objects for improved threat detection
GB1804873.6A GB2558811B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1815249.6A GB2564589B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection

Publications (5)

Publication Number Publication Date
GB201811123D0 GB201811123D0 (en) 2018-08-22
GB2560861A GB2560861A (en) 2018-09-26
GB2560861B GB2560861B (en) 2018-12-26
GB2560861B8 true GB2560861B8 (en) 2019-02-06
GB2560861A8 GB2560861A8 (en) 2019-02-06

Family

ID=55458378

Family Applications (9)

Application Number Title Priority Date Filing Date
GB1715899.9A Active GB2552632B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1811123.7A Active GB2560861B8 (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1820349.7A Active GB2565734B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1804902.3A Active GB2558812B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1804873.6A Active GB2558811B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1815249.6A Active GB2564589B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1820350.5A Active GB2565735B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1705948.6A Active GB2545621B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1811133.6A Active GB2563340B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GB1715899.9A Active GB2552632B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection

Family Applications After (7)

Application Number Title Priority Date Filing Date
GB1820349.7A Active GB2565734B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1804902.3A Active GB2558812B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1804873.6A Active GB2558811B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1815249.6A Active GB2564589B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1820350.5A Active GB2565735B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1705948.6A Active GB2545621B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection
GB1811133.6A Active GB2563340B (en) 2014-09-14 2015-09-14 Labeling computing objects for improved threat detection

Country Status (2)

Country Link
GB (9) GB2552632B (en)
WO (1) WO2016038397A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9967264B2 (en) 2014-09-14 2018-05-08 Sophos Limited Threat detection using a time-based cache of reputation information on an enterprise endpoint
US10122687B2 (en) 2014-09-14 2018-11-06 Sophos Limited Firewall techniques for colored objects on endpoints
US9967283B2 (en) 2014-09-14 2018-05-08 Sophos Limited Normalized indications of compromise
US9967282B2 (en) 2014-09-14 2018-05-08 Sophos Limited Labeling computing objects for improved threat detection
US9992228B2 (en) 2014-09-14 2018-06-05 Sophos Limited Using indications of compromise for reputation based network security
US9965627B2 (en) 2014-09-14 2018-05-08 Sophos Limited Labeling objects on an endpoint for encryption management
US9537841B2 (en) 2014-09-14 2017-01-03 Sophos Limited Key management for compromised enterprise endpoints
GB2565185B (en) * 2016-02-12 2019-11-27 Sophos Ltd Encryption techniques
US9984248B2 (en) 2016-02-12 2018-05-29 Sophos Limited Behavioral-based control of access to encrypted content by a process
US10263966B2 (en) 2016-04-14 2019-04-16 Sophos Limited Perimeter enforcement of encryption rules
US20170310686A1 (en) * 2016-04-22 2017-10-26 Sophos Limited Labeling network flows according to source applications
GB2551983A (en) 2016-06-30 2018-01-10 Sophos Ltd Perimeter encryption

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7921284B1 (en) * 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7552472B2 (en) * 2002-12-19 2009-06-23 International Business Machines Corporation Developing and assuring policy documents through a process of refinement and classification
US7324108B2 (en) * 2003-03-12 2008-01-29 International Business Machines Corporation Monitoring events in a computer network
US20080141376A1 (en) * 2006-10-24 2008-06-12 Pc Tools Technology Pty Ltd. Determining maliciousness of software
US9367680B2 (en) * 2008-10-21 2016-06-14 Lookout, Inc. System and method for mobile communication device application advisement
US8607340B2 (en) * 2009-07-21 2013-12-10 Sophos Limited Host intrusion prevention system using software and user behavior analysis
US9038168B2 (en) * 2009-11-20 2015-05-19 Microsoft Technology Licensing, Llc Controlling resource access based on resource properties
US9407603B2 (en) * 2010-06-25 2016-08-02 Salesforce.Com, Inc. Methods and systems for providing context-based outbound processing application firewalls
US9100425B2 (en) * 2010-12-01 2015-08-04 Cisco Technology, Inc. Method and apparatus for detecting malicious software using generic signatures
US8042186B1 (en) * 2011-04-28 2011-10-18 Kaspersky Lab Zao System and method for detection of complex malware
US9106680B2 (en) * 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US8931043B2 (en) * 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US9092616B2 (en) * 2012-05-01 2015-07-28 Taasera, Inc. Systems and methods for threat identification and remediation
IL219597D0 (en) * 2012-05-03 2012-10-31 Syndrome X Ltd Malicious threat detection, malicious threat prevention, and a learning systems and methods for malicious threat detection and prevention
US8832848B1 (en) * 2012-07-26 2014-09-09 Symantec Corporation Systems and methods for content-aware access control
US9104864B2 (en) * 2012-10-24 2015-08-11 Sophos Limited Threat detection through the accumulated detection of threat characteristics
US9355172B2 (en) * 2013-01-10 2016-05-31 Accenture Global Services Limited Data trend analysis
US9104865B2 (en) * 2013-08-29 2015-08-11 International Business Machines Corporation Threat condition management
WO2015060857A1 (en) * 2013-10-24 2015-04-30 Mcafee, Inc. Agent assisted malicious application blocking in a network environment

Also Published As

Publication number Publication date
GB201820350D0 (en) 2019-01-30
GB2560861B (en) 2018-12-26
GB2545621B (en) 2018-03-28
GB2558811A (en) 2018-07-18
GB201815249D0 (en) 2018-10-31
GB2558812A8 (en) 2018-09-05
GB2565735A (en) 2019-02-20
GB2552632B (en) 2018-05-09
GB201804902D0 (en) 2018-05-09
GB2558812A (en) 2018-07-18
GB2558812B (en) 2019-03-27
GB201715899D0 (en) 2017-11-15
GB201804873D0 (en) 2018-05-09
GB2564589B (en) 2019-07-03
GB201811123D0 (en) 2018-08-22
GB201705948D0 (en) 2017-05-31
GB2565735B (en) 2019-05-29
GB2565734B (en) 2019-05-29
GB2565734A (en) 2019-02-20
GB2560861A (en) 2018-09-26
GB2560861A8 (en) 2019-02-06
GB2563340A (en) 2018-12-12
GB2545621A (en) 2017-06-21
GB201820349D0 (en) 2019-01-30
GB2563340B (en) 2019-07-03
GB2552632A (en) 2018-01-31
WO2016038397A1 (en) 2016-03-17
GB201811133D0 (en) 2018-08-22
GB2558811B (en) 2019-03-27
GB2563340A8 (en) 2019-03-27
GB2564589A (en) 2019-01-16

Similar Documents

Publication Publication Date Title
GB2512543B (en) Object tracking
RU2016129617A (en) Capture detection
EP3215242A4 (en) Rider detection system
GB201501791D0 (en) Non-linear echo path detection
SG11201701182VA (en) Compounds and methods for inhibiting histone demethylases
GB2520446B (en) Quorum-Based Data Processing
EP3100677A4 (en) Vital sign detection garment
GB2516131B (en) Proximity detection
IL252501D0 (en) Systems and methods for malicious code detection
PL2984641T3 (en) System and method for position detection
GB201401723D0 (en) Computing device
SG11201610904UA (en) Syk inhibitors
GB2565735B (en) Labeling computing objects for improved threat detection
GB201406400D0 (en) Data Processing Systems
SG10201504721WA (en) Seismic data processing
IL258803D0 (en) Single image detection
GB201407609D0 (en) Graphics processing systems
GB201412977D0 (en) Single nucleotide detection method
EP3108707A4 (en) Proximity detection
AU362787S (en) Containers
ZA201800932B (en) Condition detection using image processing
GB201411892D0 (en) Graphics processing
EP3107382A4 (en) Object detection systems
GB2528233B (en) Identifying features
FR3017481B1 (en) Method for detecting and tracking targets

Legal Events

Date Code Title Description
S117 Correction of errors in patents and applications (sect. 117/patents act 1977)

Free format text: REQUEST FILED; REQUEST FOR CORRECTION UNDER SECTION 117 FILED ON 18 JANUARY 2019

S117 Correction of errors in patents and applications (sect. 117/patents act 1977)

Free format text: CORRECTIONS ALLOWED; REQUEST FOR CORRECTION UNDER SECTION 117 FILED ON 18 JANUARY 2019 ALLOWED ON 29 JANUARY 2019