HK1213107A1 - 裝置,系統和方法識別和減少惡意網絡威脅 - Google Patents

裝置,系統和方法識別和減少惡意網絡威脅

Info

Publication number
HK1213107A1
HK1213107A1 HK16100869.0A HK16100869A HK1213107A1 HK 1213107 A1 HK1213107 A1 HK 1213107A1 HK 16100869 A HK16100869 A HK 16100869A HK 1213107 A1 HK1213107 A1 HK 1213107A1
Authority
HK
Hong Kong
Prior art keywords
identifying
malicious network
network threats
mitigating malicious
mitigating
Prior art date
Application number
HK16100869.0A
Other languages
English (en)
Inventor
Brad Bernay Doctor
Skyler Jameson Bingham
Keshava Berg
John Sherwood Reynolds
Justin George Mohr
Original Assignee
Level 3 Communications Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Level 3 Communications Llc filed Critical Level 3 Communications Llc
Publication of HK1213107A1 publication Critical patent/HK1213107A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/142Denial of service attacks against network infrastructure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/144Detection or countermeasures against botnets

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
HK16100869.0A 2012-09-28 2016-01-26 裝置,系統和方法識別和減少惡意網絡威脅 HK1213107A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261707310P 2012-09-28 2012-09-28
PCT/US2013/062186 WO2014052756A2 (en) 2012-09-28 2013-09-27 Apparatus, system and method for identifying and mitigating malicious network threats

Publications (1)

Publication Number Publication Date
HK1213107A1 true HK1213107A1 (zh) 2016-06-24

Family

ID=50386613

Family Applications (1)

Application Number Title Priority Date Filing Date
HK16100869.0A HK1213107A1 (zh) 2012-09-28 2016-01-26 裝置,系統和方法識別和減少惡意網絡威脅

Country Status (5)

Country Link
US (3) US10129270B2 (zh)
EP (1) EP2901612A4 (zh)
CA (1) CA2886058A1 (zh)
HK (1) HK1213107A1 (zh)
WO (1) WO2014052756A2 (zh)

Families Citing this family (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9792430B2 (en) 2011-11-03 2017-10-17 Cyphort Inc. Systems and methods for virtualized malware detection
US9686293B2 (en) * 2011-11-03 2017-06-20 Cyphort Inc. Systems and methods for malware detection and mitigation
US9519781B2 (en) 2011-11-03 2016-12-13 Cyphort Inc. Systems and methods for virtualization and emulation assisted malware detection
WO2014052756A2 (en) 2012-09-28 2014-04-03 Level 3 Communications, Llc Apparatus, system and method for identifying and mitigating malicious network threats
US10484398B2 (en) * 2013-09-29 2019-11-19 Mcafee, Llc Threat intelligence on a data exchange layer
US10944765B2 (en) * 2014-01-10 2021-03-09 Red Bend Ltd. Security system for machine to machine cyber attack detection and prevention
US10225280B2 (en) 2014-02-24 2019-03-05 Cyphort Inc. System and method for verifying and detecting malware
US10326778B2 (en) 2014-02-24 2019-06-18 Cyphort Inc. System and method for detecting lateral movement and data exfiltration
US11405410B2 (en) 2014-02-24 2022-08-02 Cyphort Inc. System and method for detecting lateral movement and data exfiltration
US10095866B2 (en) * 2014-02-24 2018-10-09 Cyphort Inc. System and method for threat risk scoring of security threats
US10469514B2 (en) * 2014-06-23 2019-11-05 Hewlett Packard Enterprise Development Lp Collaborative and adaptive threat intelligence for computer security
US20160036843A1 (en) * 2014-08-01 2016-02-04 Honeywell International Inc. Connected home system with cyber security monitoring
US9769202B2 (en) 2014-09-12 2017-09-19 Level 3 Communications, Llc Event driven route control
US10171318B2 (en) 2014-10-21 2019-01-01 RiskIQ, Inc. System and method of identifying internet-facing assets
US20160182561A1 (en) * 2014-12-18 2016-06-23 Level 3 Communications, Llc Route monitoring system for a communication network
US9432393B2 (en) * 2015-02-03 2016-08-30 Cisco Technology, Inc. Global clustering of incidents based on malware similarity and online trustfulness
US9712554B2 (en) 2015-04-09 2017-07-18 Accenture Global Services Limited Event correlation across heterogeneous operations
US9742788B2 (en) * 2015-04-09 2017-08-22 Accenture Global Services Limited Event correlation across heterogeneous operations
WO2016164403A1 (en) * 2015-04-10 2016-10-13 Level 3 Communications, Llc Systems and methods for generating network threat intelligence
WO2016168661A1 (en) * 2015-04-17 2016-10-20 Level 3 Communications, Llc Illicit route viewing system and method of operation
CN107534646A (zh) 2015-08-28 2018-01-02 慧与发展有限责任合伙企业 用于确定dns分组是否为恶意的提取数据分类
WO2017039593A1 (en) * 2015-08-28 2017-03-09 Hewlett Packard Enterprise Development Lp Identification of a dns packet as malicious based on a value
WO2017049045A1 (en) 2015-09-16 2017-03-23 RiskIQ, Inc. Using hash signatures of dom objects to identify website similarity
US9578048B1 (en) 2015-09-16 2017-02-21 RiskIQ Inc. Identifying phishing websites using DOM characteristics
CN116860489A (zh) * 2015-11-09 2023-10-10 西普霍特公司 用于安全威胁的威胁风险评分的系统和方法
US10673719B2 (en) 2016-02-25 2020-06-02 Imperva, Inc. Techniques for botnet detection and member identification
US10686792B1 (en) * 2016-05-13 2020-06-16 Nuvolex, Inc. Apparatus and method for administering user identities across on premise and third-party computation resources
US10536468B2 (en) * 2016-07-21 2020-01-14 Level 3 Communications, Llc System and method for voice security in a telecommunications network
US11038906B1 (en) * 2017-02-03 2021-06-15 Level 3 Communications, Llc Network threat validation and monitoring
US11425148B2 (en) 2017-03-10 2022-08-23 Visa International Service Association Identifying malicious network devices
US10785249B2 (en) * 2017-04-06 2020-09-22 Fortinet, Inc. Predicting the risk associated with a network flow, such as one involving an IoT device, and applying an appropriate level of security inspection based thereon
US11457022B1 (en) * 2017-09-26 2022-09-27 United Services Automobile Association (Usaa) Systems and methods for detecting malware domain names
US11513188B2 (en) * 2017-10-02 2022-11-29 Red Bend Ltd. Detection and prevention of a cyber physical attack aimed at sensors
US10812499B2 (en) 2017-11-09 2020-10-20 Accenture Global Solutions Limited Detection of adversary lateral movement in multi-domain IIOT environments
US11381593B2 (en) * 2017-12-11 2022-07-05 Radware, Ltd. System and method for providing insights on distributed denial of service attacks
JP6977625B2 (ja) * 2018-03-07 2021-12-08 富士通株式会社 評価プログラム、評価方法および評価装置
US11658995B1 (en) 2018-03-20 2023-05-23 F5, Inc. Methods for dynamically mitigating network attacks and devices thereof
US11218448B2 (en) * 2018-06-05 2022-01-04 Imperva, Inc. Aggregating alerts of malicious events for computer security
US11102301B2 (en) 2018-07-12 2021-08-24 Sap Se PCA-based scoring of the similarity of damage patterns of operational assets
JP7054003B2 (ja) * 2018-07-17 2022-04-13 日本電信電話株式会社 DDoS対処装置、DDoS対処方法、及びプログラム
US10740206B2 (en) * 2018-07-18 2020-08-11 Sap Se Record-based planning in operational maintenance and service
US11522897B2 (en) * 2018-07-25 2022-12-06 International Business Machines Corporation Detecting and patching network vulnerabilities
US11050770B2 (en) * 2018-08-02 2021-06-29 Bae Systems Information And Electronic Systems Integration Inc. Network defense system and method thereof
WO2020069367A1 (en) * 2018-09-27 2020-04-02 Bayshore Networks, Inc. System and methods for automated computer security policy generation and anomaly detection
US11032311B2 (en) * 2018-12-11 2021-06-08 F5 Networks, Inc. Methods for detecting and mitigating malicious network activity based on dynamic application context and devices thereof
US10834114B2 (en) 2018-12-13 2020-11-10 At&T Intellectual Property I, L.P. Multi-tiered server architecture to mitigate malicious traffic
US11233804B2 (en) 2019-01-28 2022-01-25 Microsoft Technology Licensing, Llc Methods and systems for scalable privacy-preserving compromise detection in the cloud
US11627147B2 (en) 2019-05-17 2023-04-11 Charter Communications Operating, Llc Botnet detection and mitigation
WO2021061526A1 (en) * 2019-09-25 2021-04-01 Level 3 Communications, Llc Network cyber-security platform
US11310660B2 (en) * 2019-11-26 2022-04-19 International Business Machines Corporation Identifying network risk
FR3105486B1 (fr) * 2019-12-20 2022-08-19 Orange Procédé de détection d’un comportement malveillant dans un réseau de communication, dispositif, équipement d’accès audit réseau, procédé de détection d’une attaque distribuée dans ledit réseau, dispositif, équipement nœud et programmes d’ordinateur correspondants
US11892924B2 (en) * 2020-03-20 2024-02-06 UncommonX Inc. Generation of an issue detection evaluation regarding a system aspect of a system
US11831606B2 (en) 2020-04-29 2023-11-28 Kyndryl, Inc. Dynamically managing firewall ports of an enterprise network
US11882138B2 (en) 2020-06-18 2024-01-23 International Business Machines Corporation Fast identification of offense and attack execution in network traffic patterns
CN111935082B (zh) * 2020-06-28 2022-09-09 新浪网技术(中国)有限公司 一种网络威胁信息关联分析系统及方法
US11252188B1 (en) 2020-08-13 2022-02-15 Room40 Labs, Inc. Methods and apparatus to automate cyber defense decision process and response actions by operationalizing adversarial technique frameworks
US11770405B2 (en) * 2020-09-10 2023-09-26 Arbor Networks, Inc. Automated selection of DDoS countermeasures using statistical analysis
US11966319B2 (en) 2021-02-23 2024-04-23 Mellanox Technologies, Ltd. Identifying anomalies in a data center using composite metrics and/or machine learning
US20230224275A1 (en) * 2022-01-12 2023-07-13 Bank Of America Corporation Preemptive threat detection for an information system
US11805145B2 (en) * 2022-03-16 2023-10-31 Interpres Security, Inc. Systems and methods for continuous threat-informed exposure management
CN114500122B (zh) * 2022-04-18 2022-07-01 国家计算机网络与信息安全管理中心江苏分中心 一种基于多源数据融合的特定网络行为分析方法和系统
CN117319095B (zh) * 2023-11-29 2024-02-13 杭州海康威视数字技术股份有限公司 基于模糊逻辑的物联网威胁轻量协同探测方法及装置

Family Cites Families (120)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6134664A (en) * 1998-07-06 2000-10-17 Prc Inc. Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources
US6671818B1 (en) * 1999-11-22 2003-12-30 Accenture Llp Problem isolation through translating and filtering events into a standard object format in a network based supply chain
US7159237B2 (en) * 2000-03-16 2007-01-02 Counterpane Internet Security, Inc. Method and system for dynamic network intrusion monitoring, detection and response
US7222187B2 (en) * 2001-07-31 2007-05-22 Sun Microsystems, Inc. Distributed trust mechanism for decentralized networks
US20030084349A1 (en) * 2001-10-12 2003-05-01 Oliver Friedrichs Early warning system for network attacks
US7140041B2 (en) * 2002-04-11 2006-11-21 International Business Machines Corporation Detecting dissemination of malicious programs
US20080196099A1 (en) * 2002-06-10 2008-08-14 Akonix Systems, Inc. Systems and methods for detecting and blocking malicious content in instant messages
WO2004019186A2 (en) * 2002-08-26 2004-03-04 Guardednet, Inc. Determining threat level associated with network activity
US20050198269A1 (en) * 2004-02-13 2005-09-08 Champagne Andrew F. Method and system for monitoring border gateway protocol (BGP) data in a distributed computer network
US7925766B2 (en) * 2004-02-18 2011-04-12 At&T Intellectual Property Ii, L.P. Method for distributed denial-of-service attack mitigation by selective black-holing in MPLS VPNS
US7444417B2 (en) * 2004-02-18 2008-10-28 Thusitha Jayawardena Distributed denial-of-service attack mitigation by selective black-holing in IP networks
US8201257B1 (en) * 2004-03-31 2012-06-12 Mcafee, Inc. System and method of managing network security risks
US8204984B1 (en) * 2004-04-01 2012-06-19 Fireeye, Inc. Systems and methods for detecting encrypted bot command and control communication channels
US7587537B1 (en) * 2007-11-30 2009-09-08 Altera Corporation Serializer-deserializer circuits formed from input-output circuit registers
US8561177B1 (en) * 2004-04-01 2013-10-15 Fireeye, Inc. Systems and methods for detecting communication channels of bots
US9027135B1 (en) * 2004-04-01 2015-05-05 Fireeye, Inc. Prospective client identification using malware attack detection
US8230480B2 (en) * 2004-04-26 2012-07-24 Avaya Inc. Method and apparatus for network security based on device security status
WO2005116851A2 (en) * 2004-05-25 2005-12-08 Postini, Inc. Electronic message source information reputation system
US20060021045A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Input translation for network security analysis
US20060021048A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Techniques for determining network security using an attack tree
US20060021047A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Techniques for determining network security using time based indications
US20060021050A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Evaluation of network security based on security syndromes
US20060021049A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Techniques for identifying vulnerabilities in a network
US20060021034A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Techniques for modeling changes in network security
US20060021046A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Techniques for determining network security
US20060064740A1 (en) 2004-09-22 2006-03-23 International Business Machines Corporation Network threat risk assessment tool
US20070043878A1 (en) * 2005-08-18 2007-02-22 Microsoft Corporation Virtual robot communication format customized by endpoint
US8566928B2 (en) * 2005-10-27 2013-10-22 Georgia Tech Research Corporation Method and system for detecting and responding to attacking networks
US7752556B2 (en) * 2005-10-27 2010-07-06 Apple Inc. Workflow widgets
EP1994486B1 (en) * 2006-03-22 2015-03-04 BRITISH TELECOMMUNICATIONS public limited company Method and apparatus for automated testing of software
US20080016339A1 (en) * 2006-06-29 2008-01-17 Jayant Shukla Application Sandbox to Detect, Remove, and Prevent Malware
US7808958B1 (en) * 2006-09-28 2010-10-05 Symantec Corporation Rogue wireless access point detection
US8533819B2 (en) * 2006-09-29 2013-09-10 At&T Intellectual Property Ii, L.P. Method and apparatus for detecting compromised host computers
US20080148398A1 (en) * 2006-10-31 2008-06-19 Derek John Mezack System and Method for Definition and Automated Analysis of Computer Security Threat Models
US7937353B2 (en) * 2007-01-15 2011-05-03 International Business Machines Corporation Method and system for determining whether to alter a firewall configuration
US8775369B2 (en) * 2007-01-24 2014-07-08 Vir2Us, Inc. Computer system architecture and method having isolated file system management for secure and reliable data processing
US7870610B1 (en) * 2007-03-16 2011-01-11 The Board Of Directors Of The Leland Stanford Junior University Detection of malicious programs
US7823202B1 (en) * 2007-03-21 2010-10-26 Narus, Inc. Method for detecting internet border gateway protocol prefix hijacking attacks
US9083712B2 (en) * 2007-04-04 2015-07-14 Sri International Method and apparatus for generating highly predictive blacklists
US8495727B2 (en) * 2007-08-07 2013-07-23 Microsoft Corporation Spam reduction in real time communications by human interaction proof
US8255926B2 (en) * 2007-11-06 2012-08-28 International Business Machines Corporation Virus notification based on social groups
US8108517B2 (en) 2007-11-27 2012-01-31 Umber Systems System and method for collecting, reporting and analyzing data on application-level activity and other user information on a mobile data network
US20090238077A1 (en) * 2008-03-19 2009-09-24 Paritosh Bajpay Method and apparatus for providing automated processing of a virtual connection alarm
US10027688B2 (en) * 2008-08-11 2018-07-17 Damballa, Inc. Method and system for detecting malicious and/or botnet-related domain names
US8433785B2 (en) * 2008-09-16 2013-04-30 Yahoo! Inc. System and method for detecting internet bots
US8220056B2 (en) 2008-09-23 2012-07-10 Savvis, Inc. Threat management system and method
US8806632B2 (en) 2008-11-17 2014-08-12 Solarwinds Worldwide, Llc Systems, methods, and devices for detecting security vulnerabilities in IP networks
US7916664B2 (en) * 2008-11-24 2011-03-29 At&T Intellectual Property I, L.P. Reverse engineering peering at Internet exchange point
US8904530B2 (en) * 2008-12-22 2014-12-02 At&T Intellectual Property I, L.P. System and method for detecting remotely controlled E-mail spam hosts
KR101010302B1 (ko) * 2008-12-24 2011-01-25 한국인터넷진흥원 Irc 및 http 봇넷 보안 관제를 위한 관리 시스템 및 그 방법
US8869243B2 (en) 2008-12-26 2014-10-21 Facebook, Inc. Authenticating user sessions based on reputation of user locations
JP5327915B2 (ja) * 2009-02-02 2013-10-30 レベル スリー コミュニケーションズ,エルエルシー ネットワークトラフィックの分析
JP5453323B2 (ja) * 2009-02-16 2014-03-26 パナソニック株式会社 改竄監視システム、管理装置及び改竄管理方法
JP5453461B2 (ja) * 2009-03-05 2014-03-26 インターデイジタル パテント ホールディングス インコーポレイテッド H(e)NB完全性検証および妥当性確認のための方法および機器
AU2010223925A1 (en) * 2009-03-13 2011-11-03 Rutgers, The State University Of New Jersey Systems and methods for the detection of malware
US9112850B1 (en) * 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US8505103B2 (en) * 2009-09-09 2013-08-06 Fujitsu Limited Hardware trust anchor
US8255453B2 (en) * 2009-09-14 2012-08-28 International Business Machines Corporation Public BOT management in private networks
CN102045214B (zh) * 2009-10-20 2013-06-26 成都市华为赛门铁克科技有限公司 僵尸网络检测方法、装置和系统
US8495745B1 (en) * 2009-11-30 2013-07-23 Mcafee, Inc. Asset risk analysis
KR101038048B1 (ko) * 2009-12-21 2011-06-01 한국인터넷진흥원 봇넷 악성행위 실시간 분석 시스템
US8805707B2 (en) * 2009-12-31 2014-08-12 Hartford Fire Insurance Company Systems and methods for providing a safety score associated with a user location
US8578497B2 (en) * 2010-01-06 2013-11-05 Damballa, Inc. Method and system for detecting malware
US9009299B2 (en) * 2010-01-07 2015-04-14 Polytechnic Institute Of New York University Method and apparatus for identifying members of a peer-to-peer botnet
US8516576B2 (en) 2010-01-13 2013-08-20 Microsoft Corporation Network intrusion detection with distributed correlation
US8826438B2 (en) * 2010-01-19 2014-09-02 Damballa, Inc. Method and system for network-based detecting of malware from behavioral clustering
US8260914B1 (en) * 2010-06-22 2012-09-04 Narus, Inc. Detecting DNS fast-flux anomalies
US10397246B2 (en) * 2010-07-21 2019-08-27 Radware, Ltd. System and methods for malware detection using log based crowdsourcing analysis
US11343265B2 (en) * 2010-07-21 2022-05-24 Seculert Ltd. System and methods for malware detection using log analytics for channels and super channels
US9516058B2 (en) * 2010-08-10 2016-12-06 Damballa, Inc. Method and system for determining whether domain names are legitimate or malicious
US8661544B2 (en) * 2010-08-31 2014-02-25 Cisco Technology, Inc. Detecting botnets
US8561187B1 (en) * 2010-09-30 2013-10-15 Webroot Inc. System and method for prosecuting dangerous IP addresses on the internet
KR101442020B1 (ko) * 2010-11-04 2014-09-24 한국전자통신연구원 송신 제어 프로토콜 플러딩 공격 방어 방법 및 장치
US9219744B2 (en) * 2010-12-08 2015-12-22 At&T Intellectual Property I, L.P. Mobile botnet mitigation
KR20120068612A (ko) * 2010-12-17 2012-06-27 한국전자통신연구원 Dns 쿼리 트래픽 감시 및 처리 방법과 그 장치
US8682812B1 (en) * 2010-12-23 2014-03-25 Narus, Inc. Machine learning based botnet detection using real-time extracted traffic features
US8631489B2 (en) * 2011-02-01 2014-01-14 Damballa, Inc. Method and system for detecting malicious domain names at an upper DNS hierarchy
EP2487860B1 (en) * 2011-02-10 2013-09-25 Telefónica, S.A. Method and system for improving security threats detection in communication networks
US8438644B2 (en) 2011-03-07 2013-05-07 Isight Partners, Inc. Information system security based on threat vectors
US8695095B2 (en) * 2011-03-11 2014-04-08 At&T Intellectual Property I, L.P. Mobile malicious software mitigation
US8578493B1 (en) * 2011-05-10 2013-11-05 Narus, Inc. Botnet beacon detection
US8555388B1 (en) * 2011-05-24 2013-10-08 Palo Alto Networks, Inc. Heuristic botnet detection
US9118702B2 (en) * 2011-05-31 2015-08-25 Bce Inc. System and method for generating and refining cyber threat intelligence data
US9323928B2 (en) 2011-06-01 2016-04-26 Mcafee, Inc. System and method for non-signature based detection of malicious processes
US20120311710A1 (en) * 2011-06-03 2012-12-06 Voodoosoft Holdings, Llc Computer program, method, and system for preventing execution of viruses and malware
US9106680B2 (en) * 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US10742591B2 (en) 2011-07-06 2020-08-11 Akamai Technologies Inc. System for domain reputation scoring
US9065826B2 (en) * 2011-08-08 2015-06-23 Microsoft Technology Licensing, Llc Identifying application reputation based on resource accesses
US20130074143A1 (en) * 2011-09-15 2013-03-21 Mcafee, Inc. System and method for real-time customized threat protection
JP5543949B2 (ja) * 2011-09-21 2014-07-09 株式会社東芝 制御装置およびモニタプログラム
US9396329B2 (en) * 2011-10-17 2016-07-19 Intel Corporation Methods and apparatus for a safe and secure software update solution against attacks from malicious or unauthorized programs to update protected secondary storage
US9519781B2 (en) * 2011-11-03 2016-12-13 Cyphort Inc. Systems and methods for virtualization and emulation assisted malware detection
US9392010B2 (en) * 2011-11-07 2016-07-12 Netflow Logic Corporation Streaming method and system for processing network metadata
US9509581B2 (en) * 2011-12-20 2016-11-29 Thomson Licensing Methods for monitoring data traffic in a gateway device
US8745737B2 (en) * 2011-12-29 2014-06-03 Verisign, Inc Systems and methods for detecting similarities in network traffic
AU2013210813A1 (en) * 2012-01-18 2014-09-11 Yoav Lorch Incremental content purchase and management systems and methods
US9710644B2 (en) * 2012-02-01 2017-07-18 Servicenow, Inc. Techniques for sharing network security event information
US9137258B2 (en) * 2012-02-01 2015-09-15 Brightpoint Security, Inc. Techniques for sharing network security event information
US8914406B1 (en) * 2012-02-01 2014-12-16 Vorstack, Inc. Scalable network security with fast response protocol
US9356942B1 (en) * 2012-03-05 2016-05-31 Neustar, Inc. Method and system for detecting network compromise
US9203860B1 (en) * 2012-03-20 2015-12-01 United Services Automobile Association (Usaa) Dynamic risk engine
US20130254260A1 (en) 2012-03-22 2013-09-26 Akamai Technologies Inc. Network threat assessment system with servers performing message exchange accounting
IL219499B (en) * 2012-04-30 2019-02-28 Verint Systems Ltd A system and method for detecting malicious software
US9092616B2 (en) 2012-05-01 2015-07-28 Taasera, Inc. Systems and methods for threat identification and remediation
US8782793B2 (en) * 2012-05-22 2014-07-15 Kaspersky Lab Zao System and method for detection and treatment of malware on data storage devices
US9154517B2 (en) * 2012-06-19 2015-10-06 AO Kaspersky Lab System and method for preventing spread of malware in peer-to-peer network
US8813228B2 (en) * 2012-06-29 2014-08-19 Deloitte Development Llc Collective threat intelligence gathering system
US8925082B2 (en) * 2012-08-22 2014-12-30 International Business Machines Corporation Cooperative intrusion detection ecosystem for IP reputation-based security
US9258321B2 (en) * 2012-08-23 2016-02-09 Raytheon Foreground Security, Inc. Automated internet threat detection and mitigation system and associated methods
US9894088B2 (en) * 2012-08-31 2018-02-13 Damballa, Inc. Data mining to identify malicious activity
US9680861B2 (en) * 2012-08-31 2017-06-13 Damballa, Inc. Historical analysis to identify malicious activity
US9166994B2 (en) * 2012-08-31 2015-10-20 Damballa, Inc. Automation discovery to identify malicious activity
WO2014052756A2 (en) 2012-09-28 2014-04-03 Level 3 Communications, Llc Apparatus, system and method for identifying and mitigating malicious network threats
US20150215334A1 (en) 2012-09-28 2015-07-30 Level 3 Communications, Llc Systems and methods for generating network threat intelligence
US8818892B1 (en) * 2013-03-15 2014-08-26 Palantir Technologies, Inc. Prioritizing data clusters with customizable scoring strategies
US9189626B1 (en) * 2013-09-24 2015-11-17 Symantec Corporation Techniques for detecting malicious code
US8881281B1 (en) 2014-05-29 2014-11-04 Singularity Networks, Inc. Application and network abuse detection with adaptive mitigation utilizing multi-modal intelligence data
US9043894B1 (en) * 2014-11-06 2015-05-26 Palantir Technologies Inc. Malicious software detection in a computing system
US9148424B1 (en) 2015-03-13 2015-09-29 Snapchat, Inc. Systems and methods for IP-based intrusion detection
WO2018066000A1 (en) * 2016-10-05 2018-04-12 Kaalbi Technologies Private Limited System and method to detect and block bot traffic

Also Published As

Publication number Publication date
WO2014052756A2 (en) 2014-04-03
EP2901612A4 (en) 2016-06-15
US20190104136A1 (en) 2019-04-04
US20140096251A1 (en) 2014-04-03
US10129270B2 (en) 2018-11-13
WO2014052756A3 (en) 2014-05-30
CA2886058A1 (en) 2014-04-03
US20200344246A1 (en) 2020-10-29
US10721243B2 (en) 2020-07-21
EP2901612A2 (en) 2015-08-05

Similar Documents

Publication Publication Date Title
HK1213107A1 (zh) 裝置,系統和方法識別和減少惡意網絡威脅
HK1192081A1 (zh) 種識別惡意網絡設備的方法、裝置和系統
EP2861385A4 (en) APPARATUS, APPARATUS AUTHENTICATION MANAGEMENT SYSTEM, AND APPARATUS AUTHENTICATION METHOD
HK1202192A1 (zh) 用於對用戶身份進行認證的方法、系統及其使用的設備
EP2940617A4 (en) SYSTEM AND METHOD FOR SAFE REGISTRATION AND DEVICE THEREFOR
EP2852107A4 (en) METHOD, APPARATUS, HOST AND NETWORK SYSTEM FOR PROCESSING PACKETS
EP2724279A4 (en) SYSTEM, METHOD AND APPARATUS FOR FACILITATING RESOURCE SECURITY
HK1216569A1 (zh) 用於呼叫篩選的系統、方法和設備
HK1213133A1 (zh) 種 接入網絡的選擇方法、裝置、系統及種
EP2869509A4 (en) METHOD, APPARATUS AND SYSTEM FOR PROCESSING DATA PACKET
PL3261373T3 (pl) Sposób, urządzenie i system ustanowienia kontekstu bezpieczeństwa
GB201200772D0 (en) Method and apparatus for network access
EP2665302A4 (en) NETWORK ACCESS PROCESS, DEVICE AND SYSTEM
EP2552049A4 (en) AUTHENTICATION PROCESS, DEVICE AND SYSTEM
IL219499A0 (en) System and method for malware detection
SG11201510187PA (en) Data communications method, apparatus, and system
EP2852109A4 (en) METHOD, DEVICE AND SERVICE PROCESSING SYSTEM
EP2860882A4 (en) METHOD, DEVICE AND SERVICE PROCESSING SYSTEM
EP2858211A4 (en) APPARATUS, SYSTEM AND METHOD FOR UNAUTHORIZED CONNECTION DETECTION
EP2763493A4 (en) METHOD FOR DEVICE ACCESSING NETWORK, ACCESS POINT, DEVICE, AND NETWORK ACCESS SYSTEM
EP2882238A4 (en) METHOD, APPARATUS, DEVICE AND NETWORK SYSTEM FOR ADDING SECONDARY CELL
EP2677689A4 (en) METHOD, APPARATUS AND SYSTEM FOR CONFIGURING A NETWORK DEVICE
EP2731295A4 (en) METHOD, DEVICE AND SYSTEM FOR DOCUMENTAL RIGHTS MANAGEMENT
EP2858395A4 (en) METHOD, DEVICE AND SYSTEM FOR ACCESSING A MOBILE NETWORK
GB2508926B (en) Mounting apparatus, method and system