GB2574093B - Malware barrier - Google Patents

Malware barrier Download PDF

Info

Publication number
GB2574093B
GB2574093B GB1903788.6A GB201903788A GB2574093B GB 2574093 B GB2574093 B GB 2574093B GB 201903788 A GB201903788 A GB 201903788A GB 2574093 B GB2574093 B GB 2574093B
Authority
GB
United Kingdom
Prior art keywords
malware
barrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1903788.6A
Other versions
GB201903788D0 (en
GB2574093A (en
Inventor
Wang Xiao-Si
Cui Zhan
Herwono Ian
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to GBGB1804776.1A priority Critical patent/GB201804776D0/en
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Publication of GB201903788D0 publication Critical patent/GB201903788D0/en
Publication of GB2574093A publication Critical patent/GB2574093A/en
Application granted granted Critical
Publication of GB2574093B publication Critical patent/GB2574093B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
GB1903788.6A 2018-03-25 2019-03-20 Malware barrier Active GB2574093B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GBGB1804776.1A GB201804776D0 (en) 2018-03-25 2018-03-25 Malware Barrier

Publications (3)

Publication Number Publication Date
GB201903788D0 GB201903788D0 (en) 2019-05-01
GB2574093A GB2574093A (en) 2019-11-27
GB2574093B true GB2574093B (en) 2020-10-07

Family

ID=62067957

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB1804776.1A Ceased GB201804776D0 (en) 2018-03-25 2018-03-25 Malware Barrier
GB1903788.6A Active GB2574093B (en) 2018-03-25 2019-03-20 Malware barrier

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB1804776.1A Ceased GB201804776D0 (en) 2018-03-25 2018-03-25 Malware Barrier

Country Status (1)

Country Link
GB (2) GB201804776D0 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1835429A2 (en) * 2006-03-15 2007-09-19 Fujitsu Ltd. Anti-worm-measure parameter determining apparatus, number-of-nodes determining apparatus, number-of-nodes limiting system, and computer product
CN104166708A (en) * 2014-08-11 2014-11-26 肇庆学院 Mobile phone virus spreading modeling method based on social network and semi-Markov process
CN106027513A (en) * 2016-05-15 2016-10-12 广东技术师范学院 Method for analyzing propagation characteristics of computer virus in SDN mobile environment
CN106656571A (en) * 2016-11-09 2017-05-10 天津大学 Clustering wireless sensor network malicious program propagation model based on evolution game
CN106936855A (en) * 2017-05-12 2017-07-07 中国人民解放军信息工程大学 Network security defence decision-making based on attacking and defending differential game determines method and its device
KR101825911B1 (en) * 2016-09-26 2018-02-07 국방과학연구소 Worm attack modeling and simulation for data transport network having hierarchical structure

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1835429A2 (en) * 2006-03-15 2007-09-19 Fujitsu Ltd. Anti-worm-measure parameter determining apparatus, number-of-nodes determining apparatus, number-of-nodes limiting system, and computer product
CN104166708A (en) * 2014-08-11 2014-11-26 肇庆学院 Mobile phone virus spreading modeling method based on social network and semi-Markov process
CN106027513A (en) * 2016-05-15 2016-10-12 广东技术师范学院 Method for analyzing propagation characteristics of computer virus in SDN mobile environment
KR101825911B1 (en) * 2016-09-26 2018-02-07 국방과학연구소 Worm attack modeling and simulation for data transport network having hierarchical structure
CN106656571A (en) * 2016-11-09 2017-05-10 天津大学 Clustering wireless sensor network malicious program propagation model based on evolution game
CN106936855A (en) * 2017-05-12 2017-07-07 中国人民解放军信息工程大学 Network security defence decision-making based on attacking and defending differential game determines method and its device

Also Published As

Publication number Publication date
GB201903788D0 (en) 2019-05-01
GB2574093A (en) 2019-11-27
GB201804776D0 (en) 2018-05-09

Similar Documents

Publication Publication Date Title
GB201700350D0 (en) Altered virus
GB2555384B (en) Preventing phishing attacks
GB201604033D0 (en) Barrier
GB202018989D0 (en) Malware detection
GB201820983D0 (en) Virus
GB201717370D0 (en) Barrier
GB201711744D0 (en) Barrier system
GB2574093B (en) Malware barrier
CA194487S (en) Barrier
GB2580051B (en) Barrier assembly
GB2555529B (en) Barrier
ZA201807645B (en) Barrier
ZA202006468B (en) Barrier
GB201914157D0 (en) Barrier
GB201904877D0 (en) Barrier
ZA202004873B (en) Barrier arrangement
GB201811225D0 (en) Area denial
GB201717018D0 (en) Barrier
GB201716597D0 (en) Barrier
GB202110741D0 (en) Barrier
GB201715640D0 (en) Barrier
GB201715662D0 (en) Barrier
GB201803562D0 (en) Barrier assembly
GB201703439D0 (en) Barrier
GB201703436D0 (en) Barrier