HK1213107A1 - 裝置,系統和方法識別和減少惡意網絡威脅 - Google Patents
裝置,系統和方法識別和減少惡意網絡威脅Info
- Publication number
- HK1213107A1 HK1213107A1 HK16100869.0A HK16100869A HK1213107A1 HK 1213107 A1 HK1213107 A1 HK 1213107A1 HK 16100869 A HK16100869 A HK 16100869A HK 1213107 A1 HK1213107 A1 HK 1213107A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- identifying
- malicious network
- network threats
- mitigating malicious
- mitigating
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/142—Denial of service attacks against network infrastructure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/144—Detection or countermeasures against botnets
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261707310P | 2012-09-28 | 2012-09-28 | |
PCT/US2013/062186 WO2014052756A2 (en) | 2012-09-28 | 2013-09-27 | Apparatus, system and method for identifying and mitigating malicious network threats |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1213107A1 true HK1213107A1 (zh) | 2016-06-24 |
Family
ID=50386613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK16100869.0A HK1213107A1 (zh) | 2012-09-28 | 2016-01-26 | 裝置,系統和方法識別和減少惡意網絡威脅 |
Country Status (5)
Country | Link |
---|---|
US (3) | US10129270B2 (zh) |
EP (1) | EP2901612A4 (zh) |
CA (1) | CA2886058A1 (zh) |
HK (1) | HK1213107A1 (zh) |
WO (1) | WO2014052756A2 (zh) |
Families Citing this family (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9792430B2 (en) | 2011-11-03 | 2017-10-17 | Cyphort Inc. | Systems and methods for virtualized malware detection |
US9686293B2 (en) * | 2011-11-03 | 2017-06-20 | Cyphort Inc. | Systems and methods for malware detection and mitigation |
US9519781B2 (en) | 2011-11-03 | 2016-12-13 | Cyphort Inc. | Systems and methods for virtualization and emulation assisted malware detection |
WO2014052756A2 (en) | 2012-09-28 | 2014-04-03 | Level 3 Communications, Llc | Apparatus, system and method for identifying and mitigating malicious network threats |
US10484398B2 (en) * | 2013-09-29 | 2019-11-19 | Mcafee, Llc | Threat intelligence on a data exchange layer |
US10944765B2 (en) * | 2014-01-10 | 2021-03-09 | Red Bend Ltd. | Security system for machine to machine cyber attack detection and prevention |
US10225280B2 (en) | 2014-02-24 | 2019-03-05 | Cyphort Inc. | System and method for verifying and detecting malware |
US10326778B2 (en) | 2014-02-24 | 2019-06-18 | Cyphort Inc. | System and method for detecting lateral movement and data exfiltration |
US11405410B2 (en) | 2014-02-24 | 2022-08-02 | Cyphort Inc. | System and method for detecting lateral movement and data exfiltration |
US10095866B2 (en) * | 2014-02-24 | 2018-10-09 | Cyphort Inc. | System and method for threat risk scoring of security threats |
US10469514B2 (en) * | 2014-06-23 | 2019-11-05 | Hewlett Packard Enterprise Development Lp | Collaborative and adaptive threat intelligence for computer security |
US20160036843A1 (en) * | 2014-08-01 | 2016-02-04 | Honeywell International Inc. | Connected home system with cyber security monitoring |
US9769202B2 (en) | 2014-09-12 | 2017-09-19 | Level 3 Communications, Llc | Event driven route control |
US10171318B2 (en) | 2014-10-21 | 2019-01-01 | RiskIQ, Inc. | System and method of identifying internet-facing assets |
US20160182561A1 (en) * | 2014-12-18 | 2016-06-23 | Level 3 Communications, Llc | Route monitoring system for a communication network |
US9432393B2 (en) * | 2015-02-03 | 2016-08-30 | Cisco Technology, Inc. | Global clustering of incidents based on malware similarity and online trustfulness |
US9712554B2 (en) | 2015-04-09 | 2017-07-18 | Accenture Global Services Limited | Event correlation across heterogeneous operations |
US9742788B2 (en) * | 2015-04-09 | 2017-08-22 | Accenture Global Services Limited | Event correlation across heterogeneous operations |
WO2016164403A1 (en) * | 2015-04-10 | 2016-10-13 | Level 3 Communications, Llc | Systems and methods for generating network threat intelligence |
WO2016168661A1 (en) * | 2015-04-17 | 2016-10-20 | Level 3 Communications, Llc | Illicit route viewing system and method of operation |
CN107534646A (zh) | 2015-08-28 | 2018-01-02 | 慧与发展有限责任合伙企业 | 用于确定dns分组是否为恶意的提取数据分类 |
WO2017039593A1 (en) * | 2015-08-28 | 2017-03-09 | Hewlett Packard Enterprise Development Lp | Identification of a dns packet as malicious based on a value |
WO2017049045A1 (en) | 2015-09-16 | 2017-03-23 | RiskIQ, Inc. | Using hash signatures of dom objects to identify website similarity |
US9578048B1 (en) | 2015-09-16 | 2017-02-21 | RiskIQ Inc. | Identifying phishing websites using DOM characteristics |
CN116860489A (zh) * | 2015-11-09 | 2023-10-10 | 西普霍特公司 | 用于安全威胁的威胁风险评分的系统和方法 |
US10673719B2 (en) | 2016-02-25 | 2020-06-02 | Imperva, Inc. | Techniques for botnet detection and member identification |
US10686792B1 (en) * | 2016-05-13 | 2020-06-16 | Nuvolex, Inc. | Apparatus and method for administering user identities across on premise and third-party computation resources |
US10536468B2 (en) * | 2016-07-21 | 2020-01-14 | Level 3 Communications, Llc | System and method for voice security in a telecommunications network |
US11038906B1 (en) * | 2017-02-03 | 2021-06-15 | Level 3 Communications, Llc | Network threat validation and monitoring |
US11425148B2 (en) | 2017-03-10 | 2022-08-23 | Visa International Service Association | Identifying malicious network devices |
US10785249B2 (en) * | 2017-04-06 | 2020-09-22 | Fortinet, Inc. | Predicting the risk associated with a network flow, such as one involving an IoT device, and applying an appropriate level of security inspection based thereon |
US11457022B1 (en) * | 2017-09-26 | 2022-09-27 | United Services Automobile Association (Usaa) | Systems and methods for detecting malware domain names |
US11513188B2 (en) * | 2017-10-02 | 2022-11-29 | Red Bend Ltd. | Detection and prevention of a cyber physical attack aimed at sensors |
US10812499B2 (en) | 2017-11-09 | 2020-10-20 | Accenture Global Solutions Limited | Detection of adversary lateral movement in multi-domain IIOT environments |
US11381593B2 (en) * | 2017-12-11 | 2022-07-05 | Radware, Ltd. | System and method for providing insights on distributed denial of service attacks |
JP6977625B2 (ja) * | 2018-03-07 | 2021-12-08 | 富士通株式会社 | 評価プログラム、評価方法および評価装置 |
US11658995B1 (en) | 2018-03-20 | 2023-05-23 | F5, Inc. | Methods for dynamically mitigating network attacks and devices thereof |
US11218448B2 (en) * | 2018-06-05 | 2022-01-04 | Imperva, Inc. | Aggregating alerts of malicious events for computer security |
US11102301B2 (en) | 2018-07-12 | 2021-08-24 | Sap Se | PCA-based scoring of the similarity of damage patterns of operational assets |
JP7054003B2 (ja) * | 2018-07-17 | 2022-04-13 | 日本電信電話株式会社 | DDoS対処装置、DDoS対処方法、及びプログラム |
US10740206B2 (en) * | 2018-07-18 | 2020-08-11 | Sap Se | Record-based planning in operational maintenance and service |
US11522897B2 (en) * | 2018-07-25 | 2022-12-06 | International Business Machines Corporation | Detecting and patching network vulnerabilities |
US11050770B2 (en) * | 2018-08-02 | 2021-06-29 | Bae Systems Information And Electronic Systems Integration Inc. | Network defense system and method thereof |
WO2020069367A1 (en) * | 2018-09-27 | 2020-04-02 | Bayshore Networks, Inc. | System and methods for automated computer security policy generation and anomaly detection |
US11032311B2 (en) * | 2018-12-11 | 2021-06-08 | F5 Networks, Inc. | Methods for detecting and mitigating malicious network activity based on dynamic application context and devices thereof |
US10834114B2 (en) | 2018-12-13 | 2020-11-10 | At&T Intellectual Property I, L.P. | Multi-tiered server architecture to mitigate malicious traffic |
US11233804B2 (en) | 2019-01-28 | 2022-01-25 | Microsoft Technology Licensing, Llc | Methods and systems for scalable privacy-preserving compromise detection in the cloud |
US11627147B2 (en) | 2019-05-17 | 2023-04-11 | Charter Communications Operating, Llc | Botnet detection and mitigation |
WO2021061526A1 (en) * | 2019-09-25 | 2021-04-01 | Level 3 Communications, Llc | Network cyber-security platform |
US11310660B2 (en) * | 2019-11-26 | 2022-04-19 | International Business Machines Corporation | Identifying network risk |
FR3105486B1 (fr) * | 2019-12-20 | 2022-08-19 | Orange | Procédé de détection d’un comportement malveillant dans un réseau de communication, dispositif, équipement d’accès audit réseau, procédé de détection d’une attaque distribuée dans ledit réseau, dispositif, équipement nœud et programmes d’ordinateur correspondants |
US11892924B2 (en) * | 2020-03-20 | 2024-02-06 | UncommonX Inc. | Generation of an issue detection evaluation regarding a system aspect of a system |
US11831606B2 (en) | 2020-04-29 | 2023-11-28 | Kyndryl, Inc. | Dynamically managing firewall ports of an enterprise network |
US11882138B2 (en) | 2020-06-18 | 2024-01-23 | International Business Machines Corporation | Fast identification of offense and attack execution in network traffic patterns |
CN111935082B (zh) * | 2020-06-28 | 2022-09-09 | 新浪网技术(中国)有限公司 | 一种网络威胁信息关联分析系统及方法 |
US11252188B1 (en) | 2020-08-13 | 2022-02-15 | Room40 Labs, Inc. | Methods and apparatus to automate cyber defense decision process and response actions by operationalizing adversarial technique frameworks |
US11770405B2 (en) * | 2020-09-10 | 2023-09-26 | Arbor Networks, Inc. | Automated selection of DDoS countermeasures using statistical analysis |
US11966319B2 (en) | 2021-02-23 | 2024-04-23 | Mellanox Technologies, Ltd. | Identifying anomalies in a data center using composite metrics and/or machine learning |
US20230224275A1 (en) * | 2022-01-12 | 2023-07-13 | Bank Of America Corporation | Preemptive threat detection for an information system |
US11805145B2 (en) * | 2022-03-16 | 2023-10-31 | Interpres Security, Inc. | Systems and methods for continuous threat-informed exposure management |
CN114500122B (zh) * | 2022-04-18 | 2022-07-01 | 国家计算机网络与信息安全管理中心江苏分中心 | 一种基于多源数据融合的特定网络行为分析方法和系统 |
CN117319095B (zh) * | 2023-11-29 | 2024-02-13 | 杭州海康威视数字技术股份有限公司 | 基于模糊逻辑的物联网威胁轻量协同探测方法及装置 |
Family Cites Families (120)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6134664A (en) * | 1998-07-06 | 2000-10-17 | Prc Inc. | Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources |
US6671818B1 (en) * | 1999-11-22 | 2003-12-30 | Accenture Llp | Problem isolation through translating and filtering events into a standard object format in a network based supply chain |
US7159237B2 (en) * | 2000-03-16 | 2007-01-02 | Counterpane Internet Security, Inc. | Method and system for dynamic network intrusion monitoring, detection and response |
US7222187B2 (en) * | 2001-07-31 | 2007-05-22 | Sun Microsystems, Inc. | Distributed trust mechanism for decentralized networks |
US20030084349A1 (en) * | 2001-10-12 | 2003-05-01 | Oliver Friedrichs | Early warning system for network attacks |
US7140041B2 (en) * | 2002-04-11 | 2006-11-21 | International Business Machines Corporation | Detecting dissemination of malicious programs |
US20080196099A1 (en) * | 2002-06-10 | 2008-08-14 | Akonix Systems, Inc. | Systems and methods for detecting and blocking malicious content in instant messages |
WO2004019186A2 (en) * | 2002-08-26 | 2004-03-04 | Guardednet, Inc. | Determining threat level associated with network activity |
US20050198269A1 (en) * | 2004-02-13 | 2005-09-08 | Champagne Andrew F. | Method and system for monitoring border gateway protocol (BGP) data in a distributed computer network |
US7925766B2 (en) * | 2004-02-18 | 2011-04-12 | At&T Intellectual Property Ii, L.P. | Method for distributed denial-of-service attack mitigation by selective black-holing in MPLS VPNS |
US7444417B2 (en) * | 2004-02-18 | 2008-10-28 | Thusitha Jayawardena | Distributed denial-of-service attack mitigation by selective black-holing in IP networks |
US8201257B1 (en) * | 2004-03-31 | 2012-06-12 | Mcafee, Inc. | System and method of managing network security risks |
US8204984B1 (en) * | 2004-04-01 | 2012-06-19 | Fireeye, Inc. | Systems and methods for detecting encrypted bot command and control communication channels |
US7587537B1 (en) * | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
US8561177B1 (en) * | 2004-04-01 | 2013-10-15 | Fireeye, Inc. | Systems and methods for detecting communication channels of bots |
US9027135B1 (en) * | 2004-04-01 | 2015-05-05 | Fireeye, Inc. | Prospective client identification using malware attack detection |
US8230480B2 (en) * | 2004-04-26 | 2012-07-24 | Avaya Inc. | Method and apparatus for network security based on device security status |
WO2005116851A2 (en) * | 2004-05-25 | 2005-12-08 | Postini, Inc. | Electronic message source information reputation system |
US20060021045A1 (en) * | 2004-07-22 | 2006-01-26 | Cook Chad L | Input translation for network security analysis |
US20060021048A1 (en) * | 2004-07-22 | 2006-01-26 | Cook Chad L | Techniques for determining network security using an attack tree |
US20060021047A1 (en) * | 2004-07-22 | 2006-01-26 | Cook Chad L | Techniques for determining network security using time based indications |
US20060021050A1 (en) * | 2004-07-22 | 2006-01-26 | Cook Chad L | Evaluation of network security based on security syndromes |
US20060021049A1 (en) * | 2004-07-22 | 2006-01-26 | Cook Chad L | Techniques for identifying vulnerabilities in a network |
US20060021034A1 (en) * | 2004-07-22 | 2006-01-26 | Cook Chad L | Techniques for modeling changes in network security |
US20060021046A1 (en) * | 2004-07-22 | 2006-01-26 | Cook Chad L | Techniques for determining network security |
US20060064740A1 (en) | 2004-09-22 | 2006-03-23 | International Business Machines Corporation | Network threat risk assessment tool |
US20070043878A1 (en) * | 2005-08-18 | 2007-02-22 | Microsoft Corporation | Virtual robot communication format customized by endpoint |
US8566928B2 (en) * | 2005-10-27 | 2013-10-22 | Georgia Tech Research Corporation | Method and system for detecting and responding to attacking networks |
US7752556B2 (en) * | 2005-10-27 | 2010-07-06 | Apple Inc. | Workflow widgets |
EP1994486B1 (en) * | 2006-03-22 | 2015-03-04 | BRITISH TELECOMMUNICATIONS public limited company | Method and apparatus for automated testing of software |
US20080016339A1 (en) * | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
US7808958B1 (en) * | 2006-09-28 | 2010-10-05 | Symantec Corporation | Rogue wireless access point detection |
US8533819B2 (en) * | 2006-09-29 | 2013-09-10 | At&T Intellectual Property Ii, L.P. | Method and apparatus for detecting compromised host computers |
US20080148398A1 (en) * | 2006-10-31 | 2008-06-19 | Derek John Mezack | System and Method for Definition and Automated Analysis of Computer Security Threat Models |
US7937353B2 (en) * | 2007-01-15 | 2011-05-03 | International Business Machines Corporation | Method and system for determining whether to alter a firewall configuration |
US8775369B2 (en) * | 2007-01-24 | 2014-07-08 | Vir2Us, Inc. | Computer system architecture and method having isolated file system management for secure and reliable data processing |
US7870610B1 (en) * | 2007-03-16 | 2011-01-11 | The Board Of Directors Of The Leland Stanford Junior University | Detection of malicious programs |
US7823202B1 (en) * | 2007-03-21 | 2010-10-26 | Narus, Inc. | Method for detecting internet border gateway protocol prefix hijacking attacks |
US9083712B2 (en) * | 2007-04-04 | 2015-07-14 | Sri International | Method and apparatus for generating highly predictive blacklists |
US8495727B2 (en) * | 2007-08-07 | 2013-07-23 | Microsoft Corporation | Spam reduction in real time communications by human interaction proof |
US8255926B2 (en) * | 2007-11-06 | 2012-08-28 | International Business Machines Corporation | Virus notification based on social groups |
US8108517B2 (en) | 2007-11-27 | 2012-01-31 | Umber Systems | System and method for collecting, reporting and analyzing data on application-level activity and other user information on a mobile data network |
US20090238077A1 (en) * | 2008-03-19 | 2009-09-24 | Paritosh Bajpay | Method and apparatus for providing automated processing of a virtual connection alarm |
US10027688B2 (en) * | 2008-08-11 | 2018-07-17 | Damballa, Inc. | Method and system for detecting malicious and/or botnet-related domain names |
US8433785B2 (en) * | 2008-09-16 | 2013-04-30 | Yahoo! Inc. | System and method for detecting internet bots |
US8220056B2 (en) | 2008-09-23 | 2012-07-10 | Savvis, Inc. | Threat management system and method |
US8806632B2 (en) | 2008-11-17 | 2014-08-12 | Solarwinds Worldwide, Llc | Systems, methods, and devices for detecting security vulnerabilities in IP networks |
US7916664B2 (en) * | 2008-11-24 | 2011-03-29 | At&T Intellectual Property I, L.P. | Reverse engineering peering at Internet exchange point |
US8904530B2 (en) * | 2008-12-22 | 2014-12-02 | At&T Intellectual Property I, L.P. | System and method for detecting remotely controlled E-mail spam hosts |
KR101010302B1 (ko) * | 2008-12-24 | 2011-01-25 | 한국인터넷진흥원 | Irc 및 http 봇넷 보안 관제를 위한 관리 시스템 및 그 방법 |
US8869243B2 (en) | 2008-12-26 | 2014-10-21 | Facebook, Inc. | Authenticating user sessions based on reputation of user locations |
JP5327915B2 (ja) * | 2009-02-02 | 2013-10-30 | レベル スリー コミュニケーションズ,エルエルシー | ネットワークトラフィックの分析 |
JP5453323B2 (ja) * | 2009-02-16 | 2014-03-26 | パナソニック株式会社 | 改竄監視システム、管理装置及び改竄管理方法 |
JP5453461B2 (ja) * | 2009-03-05 | 2014-03-26 | インターデイジタル パテント ホールディングス インコーポレイテッド | H(e)NB完全性検証および妥当性確認のための方法および機器 |
AU2010223925A1 (en) * | 2009-03-13 | 2011-11-03 | Rutgers, The State University Of New Jersey | Systems and methods for the detection of malware |
US9112850B1 (en) * | 2009-03-25 | 2015-08-18 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US8505103B2 (en) * | 2009-09-09 | 2013-08-06 | Fujitsu Limited | Hardware trust anchor |
US8255453B2 (en) * | 2009-09-14 | 2012-08-28 | International Business Machines Corporation | Public BOT management in private networks |
CN102045214B (zh) * | 2009-10-20 | 2013-06-26 | 成都市华为赛门铁克科技有限公司 | 僵尸网络检测方法、装置和系统 |
US8495745B1 (en) * | 2009-11-30 | 2013-07-23 | Mcafee, Inc. | Asset risk analysis |
KR101038048B1 (ko) * | 2009-12-21 | 2011-06-01 | 한국인터넷진흥원 | 봇넷 악성행위 실시간 분석 시스템 |
US8805707B2 (en) * | 2009-12-31 | 2014-08-12 | Hartford Fire Insurance Company | Systems and methods for providing a safety score associated with a user location |
US8578497B2 (en) * | 2010-01-06 | 2013-11-05 | Damballa, Inc. | Method and system for detecting malware |
US9009299B2 (en) * | 2010-01-07 | 2015-04-14 | Polytechnic Institute Of New York University | Method and apparatus for identifying members of a peer-to-peer botnet |
US8516576B2 (en) | 2010-01-13 | 2013-08-20 | Microsoft Corporation | Network intrusion detection with distributed correlation |
US8826438B2 (en) * | 2010-01-19 | 2014-09-02 | Damballa, Inc. | Method and system for network-based detecting of malware from behavioral clustering |
US8260914B1 (en) * | 2010-06-22 | 2012-09-04 | Narus, Inc. | Detecting DNS fast-flux anomalies |
US10397246B2 (en) * | 2010-07-21 | 2019-08-27 | Radware, Ltd. | System and methods for malware detection using log based crowdsourcing analysis |
US11343265B2 (en) * | 2010-07-21 | 2022-05-24 | Seculert Ltd. | System and methods for malware detection using log analytics for channels and super channels |
US9516058B2 (en) * | 2010-08-10 | 2016-12-06 | Damballa, Inc. | Method and system for determining whether domain names are legitimate or malicious |
US8661544B2 (en) * | 2010-08-31 | 2014-02-25 | Cisco Technology, Inc. | Detecting botnets |
US8561187B1 (en) * | 2010-09-30 | 2013-10-15 | Webroot Inc. | System and method for prosecuting dangerous IP addresses on the internet |
KR101442020B1 (ko) * | 2010-11-04 | 2014-09-24 | 한국전자통신연구원 | 송신 제어 프로토콜 플러딩 공격 방어 방법 및 장치 |
US9219744B2 (en) * | 2010-12-08 | 2015-12-22 | At&T Intellectual Property I, L.P. | Mobile botnet mitigation |
KR20120068612A (ko) * | 2010-12-17 | 2012-06-27 | 한국전자통신연구원 | Dns 쿼리 트래픽 감시 및 처리 방법과 그 장치 |
US8682812B1 (en) * | 2010-12-23 | 2014-03-25 | Narus, Inc. | Machine learning based botnet detection using real-time extracted traffic features |
US8631489B2 (en) * | 2011-02-01 | 2014-01-14 | Damballa, Inc. | Method and system for detecting malicious domain names at an upper DNS hierarchy |
EP2487860B1 (en) * | 2011-02-10 | 2013-09-25 | Telefónica, S.A. | Method and system for improving security threats detection in communication networks |
US8438644B2 (en) | 2011-03-07 | 2013-05-07 | Isight Partners, Inc. | Information system security based on threat vectors |
US8695095B2 (en) * | 2011-03-11 | 2014-04-08 | At&T Intellectual Property I, L.P. | Mobile malicious software mitigation |
US8578493B1 (en) * | 2011-05-10 | 2013-11-05 | Narus, Inc. | Botnet beacon detection |
US8555388B1 (en) * | 2011-05-24 | 2013-10-08 | Palo Alto Networks, Inc. | Heuristic botnet detection |
US9118702B2 (en) * | 2011-05-31 | 2015-08-25 | Bce Inc. | System and method for generating and refining cyber threat intelligence data |
US9323928B2 (en) | 2011-06-01 | 2016-04-26 | Mcafee, Inc. | System and method for non-signature based detection of malicious processes |
US20120311710A1 (en) * | 2011-06-03 | 2012-12-06 | Voodoosoft Holdings, Llc | Computer program, method, and system for preventing execution of viruses and malware |
US9106680B2 (en) * | 2011-06-27 | 2015-08-11 | Mcafee, Inc. | System and method for protocol fingerprinting and reputation correlation |
US10742591B2 (en) | 2011-07-06 | 2020-08-11 | Akamai Technologies Inc. | System for domain reputation scoring |
US9065826B2 (en) * | 2011-08-08 | 2015-06-23 | Microsoft Technology Licensing, Llc | Identifying application reputation based on resource accesses |
US20130074143A1 (en) * | 2011-09-15 | 2013-03-21 | Mcafee, Inc. | System and method for real-time customized threat protection |
JP5543949B2 (ja) * | 2011-09-21 | 2014-07-09 | 株式会社東芝 | 制御装置およびモニタプログラム |
US9396329B2 (en) * | 2011-10-17 | 2016-07-19 | Intel Corporation | Methods and apparatus for a safe and secure software update solution against attacks from malicious or unauthorized programs to update protected secondary storage |
US9519781B2 (en) * | 2011-11-03 | 2016-12-13 | Cyphort Inc. | Systems and methods for virtualization and emulation assisted malware detection |
US9392010B2 (en) * | 2011-11-07 | 2016-07-12 | Netflow Logic Corporation | Streaming method and system for processing network metadata |
US9509581B2 (en) * | 2011-12-20 | 2016-11-29 | Thomson Licensing | Methods for monitoring data traffic in a gateway device |
US8745737B2 (en) * | 2011-12-29 | 2014-06-03 | Verisign, Inc | Systems and methods for detecting similarities in network traffic |
AU2013210813A1 (en) * | 2012-01-18 | 2014-09-11 | Yoav Lorch | Incremental content purchase and management systems and methods |
US9710644B2 (en) * | 2012-02-01 | 2017-07-18 | Servicenow, Inc. | Techniques for sharing network security event information |
US9137258B2 (en) * | 2012-02-01 | 2015-09-15 | Brightpoint Security, Inc. | Techniques for sharing network security event information |
US8914406B1 (en) * | 2012-02-01 | 2014-12-16 | Vorstack, Inc. | Scalable network security with fast response protocol |
US9356942B1 (en) * | 2012-03-05 | 2016-05-31 | Neustar, Inc. | Method and system for detecting network compromise |
US9203860B1 (en) * | 2012-03-20 | 2015-12-01 | United Services Automobile Association (Usaa) | Dynamic risk engine |
US20130254260A1 (en) | 2012-03-22 | 2013-09-26 | Akamai Technologies Inc. | Network threat assessment system with servers performing message exchange accounting |
IL219499B (en) * | 2012-04-30 | 2019-02-28 | Verint Systems Ltd | A system and method for detecting malicious software |
US9092616B2 (en) | 2012-05-01 | 2015-07-28 | Taasera, Inc. | Systems and methods for threat identification and remediation |
US8782793B2 (en) * | 2012-05-22 | 2014-07-15 | Kaspersky Lab Zao | System and method for detection and treatment of malware on data storage devices |
US9154517B2 (en) * | 2012-06-19 | 2015-10-06 | AO Kaspersky Lab | System and method for preventing spread of malware in peer-to-peer network |
US8813228B2 (en) * | 2012-06-29 | 2014-08-19 | Deloitte Development Llc | Collective threat intelligence gathering system |
US8925082B2 (en) * | 2012-08-22 | 2014-12-30 | International Business Machines Corporation | Cooperative intrusion detection ecosystem for IP reputation-based security |
US9258321B2 (en) * | 2012-08-23 | 2016-02-09 | Raytheon Foreground Security, Inc. | Automated internet threat detection and mitigation system and associated methods |
US9894088B2 (en) * | 2012-08-31 | 2018-02-13 | Damballa, Inc. | Data mining to identify malicious activity |
US9680861B2 (en) * | 2012-08-31 | 2017-06-13 | Damballa, Inc. | Historical analysis to identify malicious activity |
US9166994B2 (en) * | 2012-08-31 | 2015-10-20 | Damballa, Inc. | Automation discovery to identify malicious activity |
WO2014052756A2 (en) | 2012-09-28 | 2014-04-03 | Level 3 Communications, Llc | Apparatus, system and method for identifying and mitigating malicious network threats |
US20150215334A1 (en) | 2012-09-28 | 2015-07-30 | Level 3 Communications, Llc | Systems and methods for generating network threat intelligence |
US8818892B1 (en) * | 2013-03-15 | 2014-08-26 | Palantir Technologies, Inc. | Prioritizing data clusters with customizable scoring strategies |
US9189626B1 (en) * | 2013-09-24 | 2015-11-17 | Symantec Corporation | Techniques for detecting malicious code |
US8881281B1 (en) | 2014-05-29 | 2014-11-04 | Singularity Networks, Inc. | Application and network abuse detection with adaptive mitigation utilizing multi-modal intelligence data |
US9043894B1 (en) * | 2014-11-06 | 2015-05-26 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US9148424B1 (en) | 2015-03-13 | 2015-09-29 | Snapchat, Inc. | Systems and methods for IP-based intrusion detection |
WO2018066000A1 (en) * | 2016-10-05 | 2018-04-12 | Kaalbi Technologies Private Limited | System and method to detect and block bot traffic |
-
2013
- 2013-09-27 WO PCT/US2013/062186 patent/WO2014052756A2/en active Application Filing
- 2013-09-27 CA CA2886058A patent/CA2886058A1/en not_active Abandoned
- 2013-09-27 EP EP13842826.3A patent/EP2901612A4/en not_active Withdrawn
- 2013-09-27 US US14/039,251 patent/US10129270B2/en active Active
-
2016
- 2016-01-26 HK HK16100869.0A patent/HK1213107A1/zh unknown
-
2018
- 2018-11-13 US US16/189,538 patent/US10721243B2/en active Active
-
2020
- 2020-07-14 US US16/928,438 patent/US20200344246A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO2014052756A2 (en) | 2014-04-03 |
EP2901612A4 (en) | 2016-06-15 |
US20190104136A1 (en) | 2019-04-04 |
US20140096251A1 (en) | 2014-04-03 |
US10129270B2 (en) | 2018-11-13 |
WO2014052756A3 (en) | 2014-05-30 |
CA2886058A1 (en) | 2014-04-03 |
US20200344246A1 (en) | 2020-10-29 |
US10721243B2 (en) | 2020-07-21 |
EP2901612A2 (en) | 2015-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1213107A1 (zh) | 裝置,系統和方法識別和減少惡意網絡威脅 | |
HK1192081A1 (zh) | 種識別惡意網絡設備的方法、裝置和系統 | |
EP2861385A4 (en) | APPARATUS, APPARATUS AUTHENTICATION MANAGEMENT SYSTEM, AND APPARATUS AUTHENTICATION METHOD | |
HK1202192A1 (zh) | 用於對用戶身份進行認證的方法、系統及其使用的設備 | |
EP2940617A4 (en) | SYSTEM AND METHOD FOR SAFE REGISTRATION AND DEVICE THEREFOR | |
EP2852107A4 (en) | METHOD, APPARATUS, HOST AND NETWORK SYSTEM FOR PROCESSING PACKETS | |
EP2724279A4 (en) | SYSTEM, METHOD AND APPARATUS FOR FACILITATING RESOURCE SECURITY | |
HK1216569A1 (zh) | 用於呼叫篩選的系統、方法和設備 | |
HK1213133A1 (zh) | 種 接入網絡的選擇方法、裝置、系統及種 | |
EP2869509A4 (en) | METHOD, APPARATUS AND SYSTEM FOR PROCESSING DATA PACKET | |
PL3261373T3 (pl) | Sposób, urządzenie i system ustanowienia kontekstu bezpieczeństwa | |
GB201200772D0 (en) | Method and apparatus for network access | |
EP2665302A4 (en) | NETWORK ACCESS PROCESS, DEVICE AND SYSTEM | |
EP2552049A4 (en) | AUTHENTICATION PROCESS, DEVICE AND SYSTEM | |
IL219499A0 (en) | System and method for malware detection | |
SG11201510187PA (en) | Data communications method, apparatus, and system | |
EP2852109A4 (en) | METHOD, DEVICE AND SERVICE PROCESSING SYSTEM | |
EP2860882A4 (en) | METHOD, DEVICE AND SERVICE PROCESSING SYSTEM | |
EP2858211A4 (en) | APPARATUS, SYSTEM AND METHOD FOR UNAUTHORIZED CONNECTION DETECTION | |
EP2763493A4 (en) | METHOD FOR DEVICE ACCESSING NETWORK, ACCESS POINT, DEVICE, AND NETWORK ACCESS SYSTEM | |
EP2882238A4 (en) | METHOD, APPARATUS, DEVICE AND NETWORK SYSTEM FOR ADDING SECONDARY CELL | |
EP2677689A4 (en) | METHOD, APPARATUS AND SYSTEM FOR CONFIGURING A NETWORK DEVICE | |
EP2731295A4 (en) | METHOD, DEVICE AND SYSTEM FOR DOCUMENTAL RIGHTS MANAGEMENT | |
EP2858395A4 (en) | METHOD, DEVICE AND SYSTEM FOR ACCESSING A MOBILE NETWORK | |
GB2508926B (en) | Mounting apparatus, method and system |