JP2001515625A - クライアント・サーバシステムにおけるウイルス検出 - Google Patents
クライアント・サーバシステムにおけるウイルス検出Info
- Publication number
- JP2001515625A JP2001515625A JP54052798A JP54052798A JP2001515625A JP 2001515625 A JP2001515625 A JP 2001515625A JP 54052798 A JP54052798 A JP 54052798A JP 54052798 A JP54052798 A JP 54052798A JP 2001515625 A JP2001515625 A JP 2001515625A
- Authority
- JP
- Japan
- Prior art keywords
- virus
- client
- virus detection
- server
- scanning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (1)
- 【特許請求の範囲】 1.クライアントとサーバとを互いに信号授受するように接続できるシステムに 用いるウイルス検出の方法であって、 前記サーバから前記クライアントに第1のウイルス検出オブジェクトを伝送す る過程と、 前記第1のウイルス検出オブジェクトの実行に基づく結果を受信する過程と、 前記第1のウイルス検出オブジェクトの実行の結果に基づき第2のウイルス検 出オブジェクトを生成し、その第2のウイルス検出オブジェクトを前記サーバか ら前記クライアントに送信する過程と、 前記第2のウイルス検出オブジェクトの実行に基づく結果を受信する過程と、 前記第2のウイルス検出オブジェクトの実行の結果に基づき前記クライアント におけるウイルスの有無を判定する過程と を含む方法。 2.前記クライアントにウイルスがあると判定された場合に前記第1のウイルス 検出オブジェクトの実行の結果および前記第2のウイルス検出オブジェクトの実 行の結果の少なくとも一方に基づき前記ウイルスに対する治療を適合生成する過 程 をさらに含む請求項1記載の方法。 3.前記治療を適合生成する過程が ウイルス処置オブジェクトを生成するとともにそのウイルス処置オブジェクト を前記サーバから前記クライアントに伝送する過程と、 前記ウイルス処置オブジェクトを前記クライアントにおいて実行する過程と を含む請求項2記載の方法。 4.前記サーバから前記クライアントに第1のウイルス検出オブジェクトを伝送 する前記過程の前にウイルス走査を行うべきか否かを判定する過程 をさらに含む請求項1記載の方法。 5.ウイルス走査を行うべきか否かを判定する前記過程がウイルス走査への要求 を検出する過程とそのウイルス走査要求の有効性を判定する過程とを含む請求項 4記載の方法。 6.前記要求がトリガ作用のあるイベントによって促される請求項5記載の方法 。 7.前記トリガ作用のあるイベントが前のウイルス走査から所定時間間隔ののち クライアントが試みた第1のインターネットアクセス試行である請求項6記載の 方法。 8.前記第1のウイルス検出オブジェクトおよび前記第2のウイルス検出オブジ ェクトがウイルス走査段階に対応する請求項1記載の方法。 9.前記第1のウイルス検出オブジェクトを対象ファイルの中における第1のウ イルスシグネチャ部分の有無の判定に用い、前記第2のウイルス検出オブジェク トを前記第1のウイルスシグネチャ部分を含む対象ファイル中における第2のウ イルスシグネチャ部分の有無の判定に用いる請求項8記載の方法。 10.クライアントとサーバとを互いに信号授受するように接続できるシステム に用いるウイルス検出のための装置であって、 前記サーバから前記クライアントに第1のウイルス検出オブジェクトを伝送す る手段と、 前記第1のウイルス検出オブジェクトの実行に基づく結果を受信する手段と、 前記第1のウイルス検出オブジェクトの実行の結果に基づき第2のウイルス検 出オブジェクトを生成する手段と、 前記第2のウイルス検出オブジェクトを前記サーバから前記クライアントに伝 送する手段と、 前記第2のウイルス検出オブジェクトの実行に基づく結果を受信する手段と、 前記第2のウイルス検出オブジェクトの実行の結果に基づき前記クライアント におけるウイルスの有無を判定する手段と を含む装置。 11.前記第1のウイルス検出オブジェクトの実行の結果および前記第2のウイ ルス検出オブジェクトの実行の結果の少なくとも一方に基づき検出ずみウイルス に対する治療を適合生成する手段 をさらに含む請求項10記載の装置。 12.ウイルス走査要求を検出する手段と、 前記ウイルス走査要求の有効性を判定する手段と をさらに含む請求項10記載の装置。 13.前記要求がトリガ作用のあるイベントによって促される請求項12記載の 装置。 14.前記トリガ作用のあるイベントが前のウイルス走査から所定時間間隔のの ちクライアントが試みた第1のインターネットアクセス試行である請求項13記 載の装置。 15.前記第1のウイルス検出オブジェクトおよび前記第2のウイルス検出オブ ジェクトがウイルス走査段階に対応する請求項10記載の装置。 16.前記第1のウイルス検出オブジェクトを対象ファイルの中における第1の ウイルスシグネチャ部分の有無の判定に用い、前記第2のウイルス検出オブジェ クトを前記第1のウイルスシグネチャ部分を含む対象ファイル中における第2の ウイルスシグネチャ部分の有無の判定に用いる請求項15記載の装置。 17.ウイルスを検出するためのウイルス検出サーバであって、 プロセッサと、 前記プロセッサと交信状態にあり、前記プロセッサによる実行時に前記プロセ ッサに、前記ウイルス検出サーバからクライアントへ第1のウイルス検出オブジ ェクトを伝送させ、前記第1のウイルス検出オブジェクトの実行に基づく結果を 受信させ、前記第1のウイルス検出オブジェクトの実行の結果に基づく第2のウ イルス検出オブジェクトを生成させ、前記第2のウイルス検出オブジェクトを前 記サーバから前記クライアントに伝送させ、前記第2のウイルス検出オブジェク トの実行に基づく結果を受信させ、前記第2のウイルス検出オブジェクトの実行 の結果に基づきウイルスがクライアントにあるか否かを判定させるメモリと を含むウイルス検出サーバ。 18.前記第1のウイルス検出オブジェクトを対象ファイルの中における第1の ウイルスシグネチャ部分の有無の判定に用い、前記第2のウイルス検出オブジェ クトを前記第1のウイルスシグネチャ部分を含む対象ファイル中における第2の ウイルスシグネチャ部分の有無の判定に用いる請求項17記載のウイルス検出サ ーバ。 19.ネットワークを診断し保守するネットワーク診断保守装置であって、 前記ネットワークに関連する診断データを提供する診断データモジュールと、 前記診断データモジュールと信号授受し、前記ネットワークの診断および保守 のための知識を提供し、前記診断データを前記知識に適用し、前記診断データの 前記知識への適用に基づき判定を行うエキスパートシステムと、 前記エキスパートシステムを信号授受し、前記エキスパートシステムによる前 記判定に基づきネットワーク保守を要求する保守要求モジュールと を含むネットワーク診断保守装置。 20.前記エキスパートシステムがウイルス情報エキスパートシステムであって 、そのウイルス情報エキスパートシステムが、 ウイルス走査ルール、すなわちウイルス走査を要求すべきか否かを判定するた めの間隔ルールおよびウイルス走査の範囲および種類を判定するための診断ルー ルを含むウイルス走査ルールを供給するウイルス知識モジュールと、 前記ウイルス知識モジュールと信号授受し、前記診断データにアクセスし、前 記診断データを前記ウイルス走査ルールに適用し、前記診断データの前記ルール への適用に基づきウイルス走査判定を行う推論エンジンと を含む請求項19記載のネットワーク診断保守装置。 21.前記診断保守装置がローカルエリアネットワーク内に所属し、前記保守要 求モジュールがウイルス走査要求を前記ローカルエリアネットワークの外にある ウイルス検出サーバに導く請求項20記載のネットワーク診断保守装置。 22.ネットワークを診断し保守するネットワーク診断保守装置に用いるネット ワークの診断保守方法であって、 前記ネットワークに関する診断データを供給する過程と、 前記ネットワークの診断および保守のための知識を供給する過程と、 前記診断データを前記知識に適用する過程と、 前記診断データの前記知識への適用に基づき判定を行う過程と、 前記判定に基づきネットワーク保守を要求する過程と を含む方法。 23.ウイルス走査ルールであって、ウイルス走査を要求すべきか否かを判定す るための間隔ルールおよびウイルス走査の範囲を判定するための診断ルールを含 むウイルス走査ルールを供給する過程と、 前記診断データを前記ウイルス走査ルールに適用する過程と、 前記診断データの前記ルールへの適用に基づきウイルス走査判定を行う過程と をさらに含む請求項22記載の方法。 24.前記ウイルス走査要求が前記ウイルス走査判定を行う過程に基づきウイル ス検出サーバに導かれる請求項23記載の方法。 25.ネットワーク経由でクライアントと信号授受できるウイルス検出サーバで あって、 ウイルスにつき走査すべきクライアントに対応するウイルス走査要求を受ける アクセス管理モジュールと、 ウイルスの検出に用いられるルーチンを供給するウイルス走査モジュールと、 前記アクセス管理モジュールおよび前記ウイルス走査モジュールとの交信のも とに、ウイルスにつき走査すべきクライアントに関する条件データを供給し、ウ イルス走査を要求すべきか否かの判定のための間隔ルールおよびウイルス走査の 範囲および種類の判定のための診断ルールを含むウイルス走査ルールを供給し、 前記条件データを前記ウイルス走査ルールに適用し、前記条件データの前記ルー ルへの適用に基づきウイルス走査判定を行うウイルス情報エキスパートシステム と を含むウイルス検出サーバ。 26.前記ウイルス情報エキスパートシステムとの交信のもとに、前記ウイルス の処置において用いられるルーチンを供給するウイルス清浄化モジュール をさらに含む請求項25記載のウイルス検出サーバ。 27.前記ウイルス情報エキスパートシステムの行う前記ウイルス走査判定に基 づきウイルスの検出および処置のためのルーチンを選択し、それら選択したルー チンをクライアントに伝送する手段 をさらに含む請求項26記載のウイルス検出サーバ。 28.ネットワーク経由でクライアントと信号授受できるウイルス検出サーバに 用いるウイルス検出方法であって、 ウイルスにつき走査すべきクライアントに対応するウイルス走査要求を受ける 過程と、 前記ウイルスの検出において用いる複数のルーチンを供給する過程と、 ウイルスにつき走査すべきクライアントに対応する条件データを供給する過程 と、 ウイルス走査を要求すべきか否かの判定のための間隔ルールおよびウイルス走 査の範囲および種類の判定のための診断ルールを含むウイルス走査ルールを供給 する過程と、 前記条件データを前記ウイルス走査ルールに適用する過程と、 前記診断データの前記ルールへの適用に基づきウイルス走査判定を行う過程と を含む方法。 29.前記ウイルスの処置において用いる複数のルーチンを供給する過程 をさらに含む請求項28記載の方法。 30.前記ウイルス走査判定を行う過程に基づきウイルスの検出および処置を行 うルーチンを選択する過程と、 前記選択したルーチンを前記クライアントに伝送する過程と をさらに含む請求項29記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/820,649 | 1997-03-18 | ||
US08/820,649 US5960170A (en) | 1997-03-18 | 1997-03-18 | Event triggered iterative virus detection |
PCT/US1998/003796 WO1998041919A1 (en) | 1997-03-18 | 1998-03-13 | Virus detection in client-server system |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2001515625A true JP2001515625A (ja) | 2001-09-18 |
JP4052604B2 JP4052604B2 (ja) | 2008-02-27 |
Family
ID=25231376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP54052798A Expired - Lifetime JP4052604B2 (ja) | 1997-03-18 | 1998-03-13 | クライアント・サーバシステムにおけるウイルス検出 |
Country Status (5)
Country | Link |
---|---|
US (1) | US5960170A (ja) |
EP (1) | EP0968466A1 (ja) |
JP (1) | JP4052604B2 (ja) |
AU (1) | AU6537698A (ja) |
WO (1) | WO1998041919A1 (ja) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005229611A (ja) * | 2004-02-10 | 2005-08-25 | Ricoh Co Ltd | 複合機用のウィルス保護 |
JP2005532606A (ja) * | 2001-12-31 | 2005-10-27 | シタデル セキュリティ ソフトウェア インコーポレイテッド | コンピュータの脆弱性を解決する自動化されたシステム |
JP2006526193A (ja) * | 2003-05-17 | 2006-11-16 | マイクロソフト コーポレーション | セキュリティリスクを評価するための機構 |
JP2007293887A (ja) * | 2007-05-30 | 2007-11-08 | Ntt Docomo Inc | サーバ装置、移動通信端末、情報送信システム及び情報送信方法 |
US7299035B2 (en) | 2002-01-17 | 2007-11-20 | Ntt Docomo, Inc. | Server device, mobile communications terminal, information transmitting system and information transmitting method |
JP2008152769A (ja) * | 2006-11-28 | 2008-07-03 | Avaya Technology Llc | 自動セキュリティ・プラットフォーム |
JP2010517170A (ja) * | 2007-01-26 | 2010-05-20 | ヴァーダシス・インコーポレーテッド | 不正侵入された顧客マシンとの信頼された取引の保証 |
US7778660B2 (en) | 2002-01-17 | 2010-08-17 | Ntt Docomo, Inc. | Mobile communications terminal, information transmitting system and information receiving method |
JP2011523482A (ja) * | 2008-05-21 | 2011-08-11 | シマンテック コーポレーション | ネットワーク照会を利用した最適定義配信による集中型スキャナデータベース |
JP2012501504A (ja) * | 2008-08-29 | 2012-01-19 | エーブイジー テクノロジーズ シーゼット、エス.アール.オー. | マルウェア検知のシステムおよび方法 |
JP2012069143A (ja) * | 1999-12-31 | 2012-04-05 | Inca Internet Co Ltd | オンライン上での有害情報を遮断するためのシステム及び方法 |
JP2015535115A (ja) * | 2012-11-20 | 2015-12-07 | シマンテック コーポレーションSymantec Corporation | マルウェア定義パッケージサイズを縮小するためのテレメトリの使用 |
JP2018538633A (ja) * | 2015-12-19 | 2018-12-27 | ビットディフェンダー アイピーアール マネジメント リミテッド | 複数のネットワークエンドポイントをセキュアにするためのデュアルメモリイントロスペクション |
Families Citing this family (403)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6151643A (en) | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
US8079086B1 (en) | 1997-11-06 | 2011-12-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
IL120420A (en) * | 1997-03-10 | 1999-12-31 | Security 7 Software Ltd | Method and system for preventing the downloading and execution of executable objects |
US6721306B1 (en) * | 1997-03-11 | 2004-04-13 | Verizon Services Corp. | Public wireless/cordless internet gateway |
US6134566A (en) * | 1997-06-30 | 2000-10-17 | Microsoft Corporation | Method for controlling an electronic mail preview pane to avoid system disruption |
US6035423A (en) * | 1997-12-31 | 2000-03-07 | Network Associates, Inc. | Method and system for providing automated updating and upgrading of antivirus applications using a computer network |
US6205551B1 (en) * | 1998-01-29 | 2001-03-20 | Lucent Technologies Inc. | Computer security using virus probing |
US5987610A (en) * | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
AU4568299A (en) * | 1998-06-15 | 2000-01-05 | Dmw Worldwide, Inc. | Method and apparatus for assessing the security of a computer system |
US6182227B1 (en) * | 1998-06-22 | 2001-01-30 | International Business Machines Corporation | Lightweight authentication system and method for validating a server access request |
US6347375B1 (en) * | 1998-07-08 | 2002-02-12 | Ontrack Data International, Inc | Apparatus and method for remote virus diagnosis and repair |
US7047423B1 (en) | 1998-07-21 | 2006-05-16 | Computer Associates Think, Inc. | Information security analysis system |
US6304262B1 (en) | 1998-07-21 | 2001-10-16 | Raytheon Company | Information security analysis system |
US6253337B1 (en) * | 1998-07-21 | 2001-06-26 | Raytheon Company | Information security analysis system |
US6269447B1 (en) | 1998-07-21 | 2001-07-31 | Raytheon Company | Information security analysis system |
US6338141B1 (en) * | 1998-09-30 | 2002-01-08 | Cybersoft, Inc. | Method and apparatus for computer virus detection, analysis, and removal in real time |
US6553507B1 (en) * | 1998-09-30 | 2003-04-22 | Intel Corporation | Just-in-time software updates |
US6577920B1 (en) * | 1998-10-02 | 2003-06-10 | Data Fellows Oyj | Computer virus screening |
US6499109B1 (en) | 1998-12-08 | 2002-12-24 | Networks Associates Technology, Inc. | Method and apparatus for securing software distributed over a network |
US6266774B1 (en) | 1998-12-08 | 2001-07-24 | Mcafee.Com Corporation | Method and system for securing, managing or optimizing a personal computer |
US6664988B1 (en) * | 1999-02-10 | 2003-12-16 | Micron Technology, Inc. | Graphical representation of system information on a remote computer |
US20030191957A1 (en) * | 1999-02-19 | 2003-10-09 | Ari Hypponen | Distributed computer virus detection and scanning |
US6477550B1 (en) | 1999-03-16 | 2002-11-05 | Mcafee.Com Corporation | Method and system for processing events related to a first type of browser from a second type of browser |
US6922781B1 (en) | 1999-04-30 | 2005-07-26 | Ideaflood, Inc. | Method and apparatus for identifying and characterizing errant electronic files |
US6742141B1 (en) | 1999-05-10 | 2004-05-25 | Handsfree Networks, Inc. | System for automated problem detection, diagnosis, and resolution in a software driven system |
US6981155B1 (en) | 1999-07-14 | 2005-12-27 | Symantec Corporation | System and method for computer security |
AU6098800A (en) | 1999-07-14 | 2001-02-05 | Recourse Technologies, Inc. | System and method for dynamically changing a computer port or address |
US7117532B1 (en) | 1999-07-14 | 2006-10-03 | Symantec Corporation | System and method for generating fictitious content for a computer |
US7346929B1 (en) | 1999-07-29 | 2008-03-18 | International Business Machines Corporation | Method and apparatus for auditing network security |
US7089591B1 (en) | 1999-07-30 | 2006-08-08 | Symantec Corporation | Generic detection and elimination of marco viruses |
US6996843B1 (en) * | 1999-08-30 | 2006-02-07 | Symantec Corporation | System and method for detecting computer intrusions |
US7203962B1 (en) | 1999-08-30 | 2007-04-10 | Symantec Corporation | System and method for using timestamps to detect attacks |
US6952776B1 (en) * | 1999-09-22 | 2005-10-04 | International Business Machines Corporation | Method and apparatus for increasing virus detection speed using a database |
US6851057B1 (en) * | 1999-11-30 | 2005-02-01 | Symantec Corporation | Data driven detection of viruses |
US6728886B1 (en) | 1999-12-01 | 2004-04-27 | Trend Micro Incorporated | Distributed virus scanning arrangements and methods therefor |
US6836792B1 (en) * | 1999-12-03 | 2004-12-28 | Trend Micro Incorporated | Techniques for providing add-on services for an email system |
GB2353372B (en) | 1999-12-24 | 2001-08-22 | F Secure Oyj | Remote computer virus scanning |
US7076650B1 (en) * | 1999-12-24 | 2006-07-11 | Mcafee, Inc. | System and method for selective communication scanning at a firewall and a network node |
KR100684987B1 (ko) * | 1999-12-31 | 2007-02-22 | 주식회사 잉카인터넷 | 인터넷을 이용한 전자상거래 시스템에서의 유해정보 및 해킹 차단방법 |
US20010014894A1 (en) * | 2000-02-11 | 2001-08-16 | Han Seog Yeon | File managing method for a digital data stream |
US6594686B1 (en) * | 2000-03-02 | 2003-07-15 | Network Associates Technology, Inc. | Obtaining user responses in a virtual execution environment |
US6842861B1 (en) * | 2000-03-24 | 2005-01-11 | Networks Associates Technology, Inc. | Method and system for detecting viruses on handheld computers |
US7013394B1 (en) * | 2000-04-18 | 2006-03-14 | International Business Machines Corporation | Data flow pattern recognition and manipulation |
US6973577B1 (en) * | 2000-05-26 | 2005-12-06 | Mcafee, Inc. | System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state |
US7565692B1 (en) * | 2000-05-30 | 2009-07-21 | At&T Wireless Services, Inc. | Floating intrusion detection platforms |
US6973578B1 (en) * | 2000-05-31 | 2005-12-06 | Networks Associates Technology, Inc. | System, method and computer program product for process-based selection of virus detection actions |
US6931540B1 (en) * | 2000-05-31 | 2005-08-16 | Networks Associates Technology, Inc. | System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed |
US6907396B1 (en) * | 2000-06-01 | 2005-06-14 | Networks Associates Technology, Inc. | Detecting computer viruses or malicious software by patching instructions into an emulator |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US7017187B1 (en) | 2000-06-20 | 2006-03-21 | Citigroup Global Markets, Inc. | Method and system for file blocking in an electronic messaging system |
US7162649B1 (en) * | 2000-06-30 | 2007-01-09 | Internet Security Systems, Inc. | Method and apparatus for network assessment and authentication |
GB0016835D0 (en) * | 2000-07-07 | 2000-08-30 | Messagelabs Limited | Method of, and system for, processing email |
US20030149677A1 (en) * | 2000-08-04 | 2003-08-07 | Bingham Paris E. | Knowledge automation engine for product knowledge management |
US7146536B2 (en) * | 2000-08-04 | 2006-12-05 | Sun Microsystems, Inc. | Fact collection for product knowledge management |
US7146535B2 (en) * | 2000-08-04 | 2006-12-05 | Sun Microsystems, Inc. | Product knowledge management |
US7100082B2 (en) * | 2000-08-04 | 2006-08-29 | Sun Microsystems, Inc. | Check creation and maintenance for product knowledge management |
US7100083B2 (en) * | 2000-08-04 | 2006-08-29 | Sun Microsystems, Inc. | Checks for product knowledge management |
US7051243B2 (en) * | 2002-04-30 | 2006-05-23 | Sun Microsystems, Inc. | Rules-based configuration problem detection |
US7475293B1 (en) | 2000-08-04 | 2009-01-06 | Sun Microsystems, Inc. | Product check matrix |
US6799197B1 (en) * | 2000-08-29 | 2004-09-28 | Networks Associates Technology, Inc. | Secure method and system for using a public network or email to administer to software on a plurality of client computers |
JP3251000B2 (ja) * | 2000-09-07 | 2002-01-28 | 松本建工株式会社 | 住宅の断熱構造及び使用する遮熱材 |
US6757830B1 (en) * | 2000-10-03 | 2004-06-29 | Networks Associates Technology, Inc. | Detecting unwanted properties in received email messages |
US6968461B1 (en) * | 2000-10-03 | 2005-11-22 | Networks Associates Technology, Inc. | Providing break points in a malware scanning operation |
US6802012B1 (en) * | 2000-10-03 | 2004-10-05 | Networks Associates Technology, Inc. | Scanning computer files for unwanted properties |
US9027121B2 (en) | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
US7086090B1 (en) | 2000-10-20 | 2006-08-01 | International Business Machines Corporation | Method and system for protecting pervasive devices and servers from exchanging viruses |
US7496960B1 (en) * | 2000-10-30 | 2009-02-24 | Trend Micro, Inc. | Tracking and reporting of computer virus information |
UA56310C2 (uk) * | 2000-11-06 | 2003-05-15 | Олексій Юрійович Шевченко | Спосіб ремонтного обслуговування комп'ютерів та система для його здійснення |
TW584801B (en) * | 2000-12-11 | 2004-04-21 | Ntt Docomo Inc | Terminal and repeater |
US7150045B2 (en) * | 2000-12-14 | 2006-12-12 | Widevine Technologies, Inc. | Method and apparatus for protection of electronic media |
US6622150B1 (en) * | 2000-12-18 | 2003-09-16 | Networks Associates Technology, Inc. | System and method for efficiently managing computer virus definitions using a structured virus database |
US7231440B1 (en) * | 2000-12-18 | 2007-06-12 | Mcafee, Inc. | System and method for distributing portable computer virus definition records with binary file conversion |
KR100402842B1 (ko) * | 2001-02-13 | 2003-10-22 | 주식회사 안철수연구소 | 인터넷을 통해 바이러스를 검사하는 방법 |
US7797251B2 (en) * | 2001-02-14 | 2010-09-14 | 5th Fleet, L.L.C. | System and method providing secure credit or debit transactions across unsecure networks |
US7363657B2 (en) * | 2001-03-12 | 2008-04-22 | Emc Corporation | Using a virus checker in one file server to check for viruses in another file server |
US7010696B1 (en) | 2001-03-30 | 2006-03-07 | Mcafee, Inc. | Method and apparatus for predicting the incidence of a virus |
WO2002093334A2 (en) * | 2001-04-06 | 2002-11-21 | Symantec Corporation | Temporal access control for computer virus outbreaks |
US20020147780A1 (en) * | 2001-04-09 | 2002-10-10 | Liu James Y. | Method and system for scanning electronic mail to detect and eliminate computer viruses using a group of email-scanning servers and a recipient's email gateway |
US7089589B2 (en) | 2001-04-10 | 2006-08-08 | Lenovo (Singapore) Pte. Ltd. | Method and apparatus for the detection, notification, and elimination of certain computer viruses on a network using a promiscuous system as bait |
WO2002084495A1 (en) * | 2001-04-13 | 2002-10-24 | Nokia, Inc. | System and method for providing exploit protection for networks |
US20060265746A1 (en) | 2001-04-27 | 2006-11-23 | Internet Security Systems, Inc. | Method and system for managing computer security information |
US7210041B1 (en) * | 2001-04-30 | 2007-04-24 | Mcafee, Inc. | System and method for identifying a macro virus family using a macro virus definitions database |
US6931552B2 (en) * | 2001-05-02 | 2005-08-16 | James B. Pritchard | Apparatus and method for protecting a computer system against computer viruses and unauthorized access |
US20020199120A1 (en) * | 2001-05-04 | 2002-12-26 | Schmidt Jeffrey A. | Monitored network security bridge system and method |
US7228565B2 (en) * | 2001-05-15 | 2007-06-05 | Mcafee, Inc. | Event reporting between a reporting computer and a receiving computer |
WO2002097587A2 (en) | 2001-05-31 | 2002-12-05 | Internet Security Systems, Inc. | Method and system for implementing security devices in a network |
FR2825489B1 (fr) * | 2001-06-05 | 2003-09-05 | Marguerite Paolucci | Procede d'authentification individuelle securisee de connexion a un serveur internet/intranet par acces distant furtif |
WO2002101516A2 (en) * | 2001-06-13 | 2002-12-19 | Intruvert Networks, Inc. | Method and apparatus for distributed network security |
US7043758B2 (en) | 2001-06-15 | 2006-05-09 | Mcafee, Inc. | Scanning computer files for specified content |
US20020199116A1 (en) * | 2001-06-25 | 2002-12-26 | Keith Hoene | System and method for computer network virus exclusion |
US7146642B1 (en) * | 2001-06-29 | 2006-12-05 | Mcafee, Inc. | System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device |
CA2454828A1 (en) * | 2001-07-24 | 2003-02-06 | Theresa Eileen Phillips | Network security architecture |
US7310817B2 (en) * | 2001-07-26 | 2007-12-18 | Mcafee, Inc. | Centrally managed malware scanning |
US7673343B1 (en) * | 2001-07-26 | 2010-03-02 | Mcafee, Inc. | Anti-virus scanning co-processor |
US7171690B2 (en) | 2001-08-01 | 2007-01-30 | Mcafee, Inc. | Wireless malware scanning back-end system and method |
US6792543B2 (en) * | 2001-08-01 | 2004-09-14 | Networks Associates Technology, Inc. | Virus scanning on thin client devices using programmable assembly language |
US8438241B2 (en) * | 2001-08-14 | 2013-05-07 | Cisco Technology, Inc. | Detecting and protecting against worm traffic on a network |
US7657935B2 (en) | 2001-08-16 | 2010-02-02 | The Trustees Of Columbia University In The City Of New York | System and methods for detecting malicious email transmission |
US7640361B1 (en) * | 2001-08-24 | 2009-12-29 | Mcafee, Inc. | Systems and methods for converting infected electronic files to a safe format |
US7263561B1 (en) * | 2001-08-24 | 2007-08-28 | Mcafee, Inc. | Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient |
US7302706B1 (en) * | 2001-08-31 | 2007-11-27 | Mcafee, Inc | Network-based file scanning and solution delivery in real time |
US7269649B1 (en) * | 2001-08-31 | 2007-09-11 | Mcafee, Inc. | Protocol layer-level system and method for detecting virus activity |
US20030097409A1 (en) * | 2001-10-05 | 2003-05-22 | Hungchou Tsai | Systems and methods for securing computers |
US7310818B1 (en) * | 2001-10-25 | 2007-12-18 | Mcafee, Inc. | System and method for tracking computer viruses |
US7320142B1 (en) * | 2001-11-09 | 2008-01-15 | Cisco Technology, Inc. | Method and system for configurable network intrusion detection |
US20030097378A1 (en) * | 2001-11-20 | 2003-05-22 | Khai Pham | Method and system for removing text-based viruses |
US6546493B1 (en) | 2001-11-30 | 2003-04-08 | Networks Associates Technology, Inc. | System, method and computer program product for risk assessment scanning based on detected anomalous events |
US9306966B2 (en) | 2001-12-14 | 2016-04-05 | The Trustees Of Columbia University In The City Of New York | Methods of unsupervised anomaly detection using a geometric framework |
US6789201B2 (en) * | 2001-12-20 | 2004-09-07 | Networks Associates Technology, Inc. | Anti-virus toolbar system and method for use with a network browser |
US7761605B1 (en) * | 2001-12-20 | 2010-07-20 | Mcafee, Inc. | Embedded anti-virus scanner for a network adapter |
US7114185B2 (en) * | 2001-12-26 | 2006-09-26 | Mcafee, Inc. | Identifying malware containing computer files using embedded text |
KR100407011B1 (ko) * | 2002-01-10 | 2003-11-28 | 한국과학기술원 | 모바일 에이전트를 이용한 안티 바이러스 시스템 |
US7225343B1 (en) | 2002-01-25 | 2007-05-29 | The Trustees Of Columbia University In The City Of New York | System and methods for adaptive model generation for detecting intrusions in computer systems |
GB2384659B (en) * | 2002-01-25 | 2004-01-14 | F Secure Oyj | Anti-virus protection at a network gateway |
US8370936B2 (en) | 2002-02-08 | 2013-02-05 | Juniper Networks, Inc. | Multi-method gateway-based network security systems and methods |
US6772345B1 (en) | 2002-02-08 | 2004-08-03 | Networks Associates Technology, Inc. | Protocol-level malware scanner |
WO2003077129A1 (en) * | 2002-03-13 | 2003-09-18 | Win Enterprise Co., Ltd. | Apparatus for protecting computer using functional character |
US7290282B1 (en) * | 2002-04-08 | 2007-10-30 | Symantec Corporation | Reducing false positive computer virus detections |
AU2003228512A1 (en) | 2002-04-10 | 2003-10-27 | Instasolv, Inc. | Method and system for managing computer systems |
US7237008B1 (en) * | 2002-05-10 | 2007-06-26 | Mcafee, Inc. | Detecting malware carried by an e-mail message |
US7155742B1 (en) | 2002-05-16 | 2006-12-26 | Symantec Corporation | Countering infections to communications modules |
US7634806B2 (en) * | 2002-05-30 | 2009-12-15 | Microsoft Corporation | Peer assembly inspection |
US7367056B1 (en) | 2002-06-04 | 2008-04-29 | Symantec Corporation | Countering malicious code infections to computer files that have been infected more than once |
US20040006715A1 (en) * | 2002-07-05 | 2004-01-08 | Skrepetos Nicholas C. | System and method for providing security to a remote computer over a network browser interface |
US7418729B2 (en) | 2002-07-19 | 2008-08-26 | Symantec Corporation | Heuristic detection of malicious computer code by page tracking |
US20040015718A1 (en) * | 2002-07-22 | 2004-01-22 | Hostsentinel, Inc. | Framework for collaborative suppression of undesirable computer activity |
US7380277B2 (en) * | 2002-07-22 | 2008-05-27 | Symantec Corporation | Preventing e-mail propagation of malicious computer code |
US7478431B1 (en) | 2002-08-02 | 2009-01-13 | Symantec Corporation | Heuristic detection of computer viruses |
US7331062B2 (en) * | 2002-08-30 | 2008-02-12 | Symantec Corporation | Method, computer software, and system for providing end to end security protection of an online transaction |
US7469419B2 (en) * | 2002-10-07 | 2008-12-23 | Symantec Corporation | Detection of malicious computer code |
US7159149B2 (en) * | 2002-10-24 | 2007-01-02 | Symantec Corporation | Heuristic detection and termination of fast spreading network worm attacks |
US7249187B2 (en) | 2002-11-27 | 2007-07-24 | Symantec Corporation | Enforcement of compliance with network security policies |
JP3979285B2 (ja) * | 2002-12-17 | 2007-09-19 | 株式会社日立製作所 | 情報処理システム |
US7631353B2 (en) * | 2002-12-17 | 2009-12-08 | Symantec Corporation | Blocking replication of e-mail worms |
US7418730B2 (en) * | 2002-12-17 | 2008-08-26 | International Business Machines Corporation | Automatic client responses to worm or hacker attacks |
US7296293B2 (en) | 2002-12-31 | 2007-11-13 | Symantec Corporation | Using a benevolent worm to assess and correct computer security vulnerabilities |
US20040158741A1 (en) * | 2003-02-07 | 2004-08-12 | Peter Schneider | System and method for remote virus scanning in wireless networks |
US7203959B2 (en) | 2003-03-14 | 2007-04-10 | Symantec Corporation | Stream scanning through network proxy servers |
EP2141603A1 (en) * | 2003-04-25 | 2010-01-06 | Fujitsu Limited | Messaging virus protection program and the like |
US20050015599A1 (en) * | 2003-06-25 | 2005-01-20 | Nokia, Inc. | Two-phase hash value matching technique in message protection systems |
US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US7386719B2 (en) * | 2003-07-29 | 2008-06-10 | International Business Machines Corporation | System and method for eliminating viruses at a web page server |
US8271774B1 (en) | 2003-08-11 | 2012-09-18 | Symantec Corporation | Circumstantial blocking of incoming network traffic containing code |
US20050081053A1 (en) * | 2003-10-10 | 2005-04-14 | International Business Machines Corlporation | Systems and methods for efficient computer virus detection |
CN100395985C (zh) * | 2003-12-09 | 2008-06-18 | 趋势株式会社 | 强制设置防毒软件的方法及网络系统 |
US7426574B2 (en) * | 2003-12-16 | 2008-09-16 | Trend Micro Incorporated | Technique for intercepting data in a peer-to-peer network |
US20050137980A1 (en) * | 2003-12-17 | 2005-06-23 | Bank Of America Corporation | Active disablement of malicious code in association with the provision of on-line financial services |
US8544096B2 (en) * | 2003-12-30 | 2013-09-24 | Emc Corporation | On-access and on-demand distributed virus scanning |
US7721334B2 (en) * | 2004-01-30 | 2010-05-18 | Microsoft Corporation | Detection of code-free files |
US7337327B1 (en) | 2004-03-30 | 2008-02-26 | Symantec Corporation | Using mobility tokens to observe malicious mobile code |
US8528086B1 (en) | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
US9106694B2 (en) | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
US8881282B1 (en) | 2004-04-01 | 2014-11-04 | Fireeye, Inc. | Systems and methods for malware attack detection and identification |
US8793787B2 (en) | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
US7587537B1 (en) | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
US7533415B2 (en) * | 2004-04-21 | 2009-05-12 | Trend Micro Incorporated | Method and apparatus for controlling traffic in a computer network |
US7373667B1 (en) | 2004-05-14 | 2008-05-13 | Symantec Corporation | Protecting a computer coupled to a network from malicious code infections |
US7484094B1 (en) | 2004-05-14 | 2009-01-27 | Symantec Corporation | Opening computer files quickly and safely over a network |
US20050259678A1 (en) * | 2004-05-21 | 2005-11-24 | Gaur Daniel R | Network interface controller circuitry |
US7370233B1 (en) | 2004-05-21 | 2008-05-06 | Symantec Corporation | Verification of desired end-state using a virtual machine environment |
US7490268B2 (en) * | 2004-06-01 | 2009-02-10 | The Trustees Of Columbia University In The City Of New York | Methods and systems for repairing applications |
KR100609839B1 (ko) * | 2004-06-08 | 2006-08-08 | (주)파인핸즈 | 인터넷 유해정보 접촉 관제방법 |
US8353028B2 (en) * | 2004-06-21 | 2013-01-08 | Ebay Inc. | Render engine, and method of using the same, to verify data for access and/or publication via a computer system |
US7552186B2 (en) | 2004-06-28 | 2009-06-23 | International Business Machines Corporation | Method and system for filtering spam using an adjustable reliability value |
US7183915B2 (en) * | 2004-08-05 | 2007-02-27 | 3Si Security Systems, Inc. | Wireless ATM security system |
US20060047826A1 (en) * | 2004-08-25 | 2006-03-02 | International Business Machines Corp. | Client computer self health check |
JP4643204B2 (ja) * | 2004-08-25 | 2011-03-02 | 株式会社エヌ・ティ・ティ・ドコモ | サーバ装置 |
US7441042B1 (en) | 2004-08-25 | 2008-10-21 | Symanetc Corporation | System and method for correlating network traffic and corresponding file input/output traffic |
US7690034B1 (en) | 2004-09-10 | 2010-03-30 | Symantec Corporation | Using behavior blocking mobility tokens to facilitate distributed worm detection |
US7441273B2 (en) * | 2004-09-27 | 2008-10-21 | Mcafee, Inc. | Virus scanner system and method with integrated spyware detection capabilities |
US7748032B2 (en) | 2004-09-30 | 2010-06-29 | Citrix Systems, Inc. | Method and apparatus for associating tickets in a ticket hierarchy |
US7711835B2 (en) | 2004-09-30 | 2010-05-04 | Citrix Systems, Inc. | Method and apparatus for reducing disclosure of proprietary data in a networked environment |
US8613048B2 (en) | 2004-09-30 | 2013-12-17 | Citrix Systems, Inc. | Method and apparatus for providing authorized remote access to application sessions |
US20060080637A1 (en) * | 2004-10-12 | 2006-04-13 | Microsoft Corporation | System and method for providing malware information for programmatic access |
US7313878B2 (en) * | 2004-11-05 | 2008-01-01 | Tim Clegg | Rotary pop-up envelope |
US7565686B1 (en) | 2004-11-08 | 2009-07-21 | Symantec Corporation | Preventing unauthorized loading of late binding code into a process |
US7716527B2 (en) * | 2004-11-08 | 2010-05-11 | International Business Machines Corporation | Repair system |
US20060101277A1 (en) * | 2004-11-10 | 2006-05-11 | Meenan Patrick A | Detecting and remedying unauthorized computer programs |
WO2006060581A2 (en) * | 2004-11-30 | 2006-06-08 | Sensory Networks Inc. | Apparatus and method for acceleration of security applications through pre-filtering |
WO2006101549A2 (en) * | 2004-12-03 | 2006-09-28 | Whitecell Software, Inc. | Secure system for allowing the execution of authorized computer program code |
US7810158B2 (en) * | 2004-12-16 | 2010-10-05 | At&T Intellectual Property I, L.P. | Methods and systems for deceptively trapping electronic worms |
US7610610B2 (en) | 2005-01-10 | 2009-10-27 | Mcafee, Inc. | Integrated firewall, IPS, and virus scanner system and method |
US8024568B2 (en) | 2005-01-28 | 2011-09-20 | Citrix Systems, Inc. | Method and system for verification of an endpoint security scan |
US8037534B2 (en) * | 2005-02-28 | 2011-10-11 | Smith Joseph B | Strategies for ensuring that executable content conforms to predetermined patterns of behavior (“inverse virus checking”) |
US8104086B1 (en) | 2005-03-03 | 2012-01-24 | Symantec Corporation | Heuristically detecting spyware/adware registry activity |
CN1838668A (zh) * | 2005-03-22 | 2006-09-27 | 松下电器产业株式会社 | 侦测计算机病毒的方法及其应用 |
US7603712B2 (en) * | 2005-04-21 | 2009-10-13 | Microsoft Corporation | Protecting a computer that provides a Web service from malware |
GB2425679A (en) * | 2005-04-27 | 2006-11-01 | Hewlett Packard Development Co | Scanning computing entities for vulnerabilities |
US20060248179A1 (en) * | 2005-04-29 | 2006-11-02 | Short Michael E | Method and system for event-driven network management |
US8561190B2 (en) * | 2005-05-16 | 2013-10-15 | Microsoft Corporation | System and method of opportunistically protecting a computer from malware |
US20060282525A1 (en) * | 2005-06-10 | 2006-12-14 | Giles James R | Method and apparatus for delegating responses to conditions in computing systems |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US7624447B1 (en) | 2005-09-08 | 2009-11-24 | Cisco Technology, Inc. | Using threshold lists for worm detection |
US7937758B2 (en) * | 2006-01-25 | 2011-05-03 | Symantec Corporation | File origin determination |
US8387138B2 (en) | 2006-03-21 | 2013-02-26 | At&T Intellectual Property I, L.P. | Security scanning system and method |
US8151323B2 (en) | 2006-04-12 | 2012-04-03 | Citrix Systems, Inc. | Systems and methods for providing levels of access and action control via an SSL VPN appliance |
US8239915B1 (en) | 2006-06-30 | 2012-08-07 | Symantec Corporation | Endpoint management using trust rating data |
GB2443005A (en) * | 2006-07-19 | 2008-04-23 | Chronicle Solutions | Analysing network traffic by decoding a wide variety of protocols (or object types) of each packet |
US8230509B2 (en) * | 2006-09-14 | 2012-07-24 | Ca, Inc. | System and method for using rules to protect against malware |
US7523502B1 (en) * | 2006-09-21 | 2009-04-21 | Symantec Corporation | Distributed anti-malware |
JP2008097414A (ja) * | 2006-10-13 | 2008-04-24 | Nec Infrontia Corp | 情報処理システムおよび情報処理方法 |
US8533846B2 (en) | 2006-11-08 | 2013-09-10 | Citrix Systems, Inc. | Method and system for dynamically associating access rights with a resource |
US7779454B2 (en) * | 2006-11-29 | 2010-08-17 | Lenovo (Singapore) Pte. Ltd. | System and method for virtualized hypervisor to detect insertion of removable media |
US8091134B2 (en) * | 2006-11-29 | 2012-01-03 | Lenovo (Singapore) Pte. Ltd. | System and method for autonomic peer-to-peer virus inoculation |
US7743140B2 (en) * | 2006-12-08 | 2010-06-22 | International Business Machines Corporation | Binding processes in a non-uniform memory access system |
CN101212469A (zh) * | 2006-12-28 | 2008-07-02 | 朗迅科技公司 | Ims网的抗病毒系统 |
US8156557B2 (en) * | 2007-01-04 | 2012-04-10 | Cisco Technology, Inc. | Protection against reflection distributed denial of service attacks |
US8635691B2 (en) * | 2007-03-02 | 2014-01-21 | 403 Labs, Llc | Sensitive data scanner |
US8782786B2 (en) * | 2007-03-30 | 2014-07-15 | Sophos Limited | Remedial action against malicious code at a client facility |
US8099785B1 (en) | 2007-05-03 | 2012-01-17 | Kaspersky Lab, Zao | Method and system for treatment of cure-resistant computer malware |
US8850587B2 (en) * | 2007-05-04 | 2014-09-30 | Wipro Limited | Network security scanner for enterprise protection |
US8127358B1 (en) * | 2007-05-30 | 2012-02-28 | Trend Micro Incorporated | Thin client for computer security applications |
US7853689B2 (en) * | 2007-06-15 | 2010-12-14 | Broadcom Corporation | Multi-stage deep packet inspection for lightweight devices |
US8341428B2 (en) * | 2007-06-25 | 2012-12-25 | International Business Machines Corporation | System and method to protect computing systems |
US20080320423A1 (en) * | 2007-06-25 | 2008-12-25 | International Business Machines Corporation | System and method to protect computing systems |
JP4587053B2 (ja) | 2007-08-28 | 2010-11-24 | 日本電気株式会社 | 通信装置、通信システム、パケット欠落検出方法、およびパケット欠落検出プログラム |
US8601318B2 (en) * | 2007-10-26 | 2013-12-03 | International Business Machines Corporation | Method, apparatus and computer program product for rule-based directed problem resolution for servers with scalable proactive monitoring |
US8316441B2 (en) * | 2007-11-14 | 2012-11-20 | Lockheed Martin Corporation | System for protecting information |
US8370937B2 (en) * | 2007-12-03 | 2013-02-05 | Cisco Technology, Inc. | Handling of DDoS attacks from NAT or proxy devices |
US7392544B1 (en) | 2007-12-18 | 2008-06-24 | Kaspersky Lab, Zao | Method and system for anti-malware scanning with variable scan settings |
JP4488074B2 (ja) * | 2008-02-13 | 2010-06-23 | 日本電気株式会社 | パターン検出装置、パターン検出システム、パターン検出プログラム、およびパターン検出方法 |
CA2622773C (en) * | 2008-02-19 | 2012-11-27 | David A. Loeks | Modular log building construction |
US20090210622A1 (en) * | 2008-02-19 | 2009-08-20 | Stefan Birrer | Compressed cache in a controller partition |
KR100954353B1 (ko) * | 2008-03-10 | 2010-04-21 | 주식회사 안철수연구소 | 악성 코드명 제공 시스템 및 그 방법, 그리고 이에적용되는 서버 |
KR100954449B1 (ko) | 2008-03-27 | 2010-04-27 | (주)제닉스어소시에츠 | 애플릿과 rmi를 이용한 자바 클라이언트 에이전트의인증처리 시스템 및 그 방법 |
EP2157525B1 (de) * | 2008-08-21 | 2018-01-10 | Unify GmbH & Co. KG | Verfahren zur Erkennung von Schadsoftware |
KR100996855B1 (ko) | 2008-08-29 | 2010-11-26 | 주식회사 안철수연구소 | 정상 파일 데이터베이스 제공 시스템 및 방법 |
US20100083381A1 (en) * | 2008-09-30 | 2010-04-01 | Khosravi Hormuzd M | Hardware-based anti-virus scan service |
US8935788B1 (en) * | 2008-10-15 | 2015-01-13 | Trend Micro Inc. | Two stage virus detection |
KR100927240B1 (ko) | 2008-12-29 | 2009-11-16 | 주식회사 이글루시큐리티 | 가상환경을 통한 악성코드탐지방법 |
US8146158B2 (en) * | 2008-12-30 | 2012-03-27 | Microsoft Corporation | Extensible activation exploit scanner |
US8813222B1 (en) * | 2009-01-21 | 2014-08-19 | Bitdefender IPR Management Ltd. | Collaborative malware scanning |
US9177145B2 (en) * | 2009-03-24 | 2015-11-03 | Sophos Limited | Modified file tracking on virtual machines |
US8826424B2 (en) * | 2009-03-27 | 2014-09-02 | Sophos Limited | Run-time additive disinfection of malware functions |
GB2469323B (en) * | 2009-04-09 | 2014-01-01 | F Secure Oyj | Providing information to a security application |
KR101045870B1 (ko) * | 2009-04-22 | 2011-07-01 | 주식회사 안철수연구소 | 네트워크 기반 악성 코드 진단 방법 및 진단 서버 |
KR101063010B1 (ko) | 2009-06-03 | 2011-09-07 | 주식회사 미라지웍스 | 악성 프로그램 탐지가 가능한 프로세스 관리 방법 및 장치 |
GB2471716A (en) * | 2009-07-10 | 2011-01-12 | F Secure Oyj | Anti-virus scan management using intermediate results |
KR100942456B1 (ko) * | 2009-07-23 | 2010-02-12 | 주식회사 안철수연구소 | 클라우드 컴퓨팅을 이용한 DDoS 공격 탐지 및 차단 방법 및 서버 |
US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
US9002972B2 (en) * | 2010-01-29 | 2015-04-07 | Symantec Corporation | Systems and methods for sharing the results of computing operations among related computing systems |
US8875292B1 (en) * | 2010-04-05 | 2014-10-28 | Symantec Corporation | Systems and methods for managing malware signatures |
US9098333B1 (en) | 2010-05-07 | 2015-08-04 | Ziften Technologies, Inc. | Monitoring computer process resource usage |
RU2444056C1 (ru) * | 2010-11-01 | 2012-02-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ ускорения решения проблем за счет накопления статистической информации |
EP2466506A1 (fr) * | 2010-12-17 | 2012-06-20 | Gemalto SA | Procédé dynamique de contrôle de l'intégrité de l'exécution d'un code exécutable |
US9317690B2 (en) | 2011-03-28 | 2016-04-19 | Mcafee, Inc. | System and method for firmware based anti-malware security |
US9262246B2 (en) | 2011-03-31 | 2016-02-16 | Mcafee, Inc. | System and method for securing memory and storage of an electronic device with a below-operating system security agent |
US8650642B2 (en) * | 2011-03-31 | 2014-02-11 | Mcafee, Inc. | System and method for below-operating system protection of an operating system kernel |
US9032525B2 (en) | 2011-03-29 | 2015-05-12 | Mcafee, Inc. | System and method for below-operating system trapping of driver filter attachment |
US8813227B2 (en) | 2011-03-29 | 2014-08-19 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
US8966629B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for below-operating system trapping of driver loading and unloading |
US8863283B2 (en) | 2011-03-31 | 2014-10-14 | Mcafee, Inc. | System and method for securing access to system calls |
US8966624B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for securing an input/output path of an application against malware with a below-operating system security agent |
US9038176B2 (en) | 2011-03-31 | 2015-05-19 | Mcafee, Inc. | System and method for below-operating system trapping and securing loading of code into memory |
US8925089B2 (en) | 2011-03-29 | 2014-12-30 | Mcafee, Inc. | System and method for below-operating system modification of malicious code on an electronic device |
US9087199B2 (en) | 2011-03-31 | 2015-07-21 | Mcafee, Inc. | System and method for providing a secured operating system execution environment |
US8959638B2 (en) | 2011-03-29 | 2015-02-17 | Mcafee, Inc. | System and method for below-operating system trapping and securing of interdriver communication |
US9244818B1 (en) * | 2011-03-29 | 2016-01-26 | Amazon Technologies, Inc. | Automated selection of quality control tests to run on a software application |
US8677493B2 (en) * | 2011-09-07 | 2014-03-18 | Mcafee, Inc. | Dynamic cleaning for malware using cloud technology |
WO2013041016A1 (zh) | 2011-09-19 | 2013-03-28 | 北京奇虎科技有限公司 | 处理计算机病毒的方法和装置 |
US20130227352A1 (en) * | 2012-02-24 | 2013-08-29 | Commvault Systems, Inc. | Log monitoring |
US9026864B2 (en) * | 2012-02-29 | 2015-05-05 | Red Hat, Inc. | Offloading health-checking policy |
US9027138B2 (en) | 2012-06-29 | 2015-05-05 | Centurylink Intellectual Property Llc | Identification of infected devices in broadband environments |
US10572665B2 (en) | 2012-12-28 | 2020-02-25 | Fireeye, Inc. | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
US9195829B1 (en) | 2013-02-23 | 2015-11-24 | Fireeye, Inc. | User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications |
US9104867B1 (en) | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
US9626509B1 (en) | 2013-03-13 | 2017-04-18 | Fireeye, Inc. | Malicious content analysis with multi-version application support within single operating environment |
US9311479B1 (en) | 2013-03-14 | 2016-04-12 | Fireeye, Inc. | Correlation and consolidation of analytic data for holistic view of a malware attack |
WO2014145805A1 (en) | 2013-03-15 | 2014-09-18 | Mandiant, Llc | System and method employing structured intelligence to verify and contain threats at endpoints |
US9311480B2 (en) | 2013-03-15 | 2016-04-12 | Mcafee, Inc. | Server-assisted anti-malware client |
US9143519B2 (en) | 2013-03-15 | 2015-09-22 | Mcafee, Inc. | Remote malware remediation |
US9614865B2 (en) | 2013-03-15 | 2017-04-04 | Mcafee, Inc. | Server-assisted anti-malware client |
US10713358B2 (en) | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
US9495180B2 (en) | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
US9635039B1 (en) | 2013-05-13 | 2017-04-25 | Fireeye, Inc. | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
US9491193B2 (en) * | 2013-06-27 | 2016-11-08 | Secureage Technology, Inc. | System and method for antivirus protection |
US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
US9690936B1 (en) | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
US9736179B2 (en) | 2013-09-30 | 2017-08-15 | Fireeye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
US9171160B2 (en) | 2013-09-30 | 2015-10-27 | Fireeye, Inc. | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
US9628507B2 (en) | 2013-09-30 | 2017-04-18 | Fireeye, Inc. | Advanced persistent threat (APT) detection center |
US10515214B1 (en) | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
US9117081B2 (en) | 2013-12-20 | 2015-08-25 | Bitdefender IPR Management Ltd. | Strongly isolated malware scanning using secure virtual containers |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US9747446B1 (en) | 2013-12-26 | 2017-08-29 | Fireeye, Inc. | System and method for run-time object classification |
US9740857B2 (en) | 2014-01-16 | 2017-08-22 | Fireeye, Inc. | Threat-aware microvisor |
US10432658B2 (en) * | 2014-01-17 | 2019-10-01 | Watchguard Technologies, Inc. | Systems and methods for identifying and performing an action in response to identified malicious network traffic |
US9262635B2 (en) | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
US9223972B1 (en) | 2014-03-31 | 2015-12-29 | Fireeye, Inc. | Dynamically remote tuning of a malware content detection system |
RU2583711C2 (ru) | 2014-06-20 | 2016-05-10 | Закрытое акционерное общество "Лаборатория Касперского" | Способ отложенного устранения вредоносного кода |
US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
US10002252B2 (en) | 2014-07-01 | 2018-06-19 | Fireeye, Inc. | Verification of trusted threat-aware microvisor |
US10671726B1 (en) | 2014-09-22 | 2020-06-02 | Fireeye Inc. | System and method for malware analysis using thread-level event monitoring |
US9727727B2 (en) | 2014-09-26 | 2017-08-08 | Dropbox Inc. | Scanning content items based on user activity |
US10027689B1 (en) | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
US9160680B1 (en) * | 2014-11-18 | 2015-10-13 | Kaspersky Lab Zao | System and method for dynamic network resource categorization re-assignment |
US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US9934376B1 (en) | 2014-12-29 | 2018-04-03 | Fireeye, Inc. | Malware detection appliance architecture |
US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
US9483644B1 (en) | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
US10474813B1 (en) | 2015-03-31 | 2019-11-12 | Fireeye, Inc. | Code injection technique for remediation at an endpoint of a network |
US10417031B2 (en) | 2015-03-31 | 2019-09-17 | Fireeye, Inc. | Selective virtualization for security threat detection |
US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
CN108804925B (zh) * | 2015-05-27 | 2022-02-01 | 北京百度网讯科技有限公司 | 用于检测恶意代码的方法和系统 |
US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
US10715542B1 (en) | 2015-08-14 | 2020-07-14 | Fireeye, Inc. | Mobile application risk analysis |
US10033747B1 (en) | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
US10817606B1 (en) | 2015-09-30 | 2020-10-27 | Fireeye, Inc. | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
US9825989B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Cyber attack early warning system |
US10601865B1 (en) | 2015-09-30 | 2020-03-24 | Fireeye, Inc. | Detection of credential spearphishing attacks using email analysis |
US10210329B1 (en) | 2015-09-30 | 2019-02-19 | Fireeye, Inc. | Method to detect application execution hijacking using memory protection |
US10706149B1 (en) | 2015-09-30 | 2020-07-07 | Fireeye, Inc. | Detecting delayed activation malware using a primary controller and plural time controllers |
US10846117B1 (en) | 2015-12-10 | 2020-11-24 | Fireeye, Inc. | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
US10447728B1 (en) | 2015-12-10 | 2019-10-15 | Fireeye, Inc. | Technique for protecting guest processes using a layered virtualization architecture |
US10108446B1 (en) | 2015-12-11 | 2018-10-23 | Fireeye, Inc. | Late load technique for deploying a virtualization layer underneath a running operating system |
US10565378B1 (en) | 2015-12-30 | 2020-02-18 | Fireeye, Inc. | Exploit of privilege detection framework |
US10133866B1 (en) | 2015-12-30 | 2018-11-20 | Fireeye, Inc. | System and method for triggering analysis of an object for malware in response to modification of that object |
US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
US11552986B1 (en) | 2015-12-31 | 2023-01-10 | Fireeye Security Holdings Us Llc | Cyber-security framework for application of virtual features |
US10581874B1 (en) | 2015-12-31 | 2020-03-03 | Fireeye, Inc. | Malware detection system with contextual analysis |
US10601863B1 (en) | 2016-03-25 | 2020-03-24 | Fireeye, Inc. | System and method for managing sensor enrollment |
US10671721B1 (en) | 2016-03-25 | 2020-06-02 | Fireeye, Inc. | Timeout management services |
US10785255B1 (en) | 2016-03-25 | 2020-09-22 | Fireeye, Inc. | Cluster configuration within a scalable malware detection system |
US10476906B1 (en) | 2016-03-25 | 2019-11-12 | Fireeye, Inc. | System and method for managing formation and modification of a cluster within a malware detection system |
US10705829B2 (en) * | 2016-03-30 | 2020-07-07 | International Business Machines Corporation | Software discovery using exclusion |
US10826933B1 (en) | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10326599B2 (en) * | 2016-05-09 | 2019-06-18 | Hewlett Packard Enterprise Development Lp | Recovery agents and recovery plans over networks |
US10169585B1 (en) | 2016-06-22 | 2019-01-01 | Fireeye, Inc. | System and methods for advanced malware detection through placement of transition events |
US10462173B1 (en) | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
US10536476B2 (en) * | 2016-07-21 | 2020-01-14 | Sap Se | Realtime triggering framework |
US10482241B2 (en) | 2016-08-24 | 2019-11-19 | Sap Se | Visualization of data distributed in multiple dimensions |
US10542016B2 (en) | 2016-08-31 | 2020-01-21 | Sap Se | Location enrichment in enterprise threat detection |
US10592678B1 (en) | 2016-09-09 | 2020-03-17 | Fireeye, Inc. | Secure communications between peers using a verified virtual trusted platform module |
US10630705B2 (en) | 2016-09-23 | 2020-04-21 | Sap Se | Real-time push API for log events in enterprise threat detection |
US10673879B2 (en) | 2016-09-23 | 2020-06-02 | Sap Se | Snapshot of a forensic investigation for enterprise threat detection |
US10491627B1 (en) | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
US10795991B1 (en) | 2016-11-08 | 2020-10-06 | Fireeye, Inc. | Enterprise search |
US10587647B1 (en) | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
US10534908B2 (en) | 2016-12-06 | 2020-01-14 | Sap Se | Alerts based on entities in security information and event management products |
US10534907B2 (en) | 2016-12-15 | 2020-01-14 | Sap Se | Providing semantic connectivity between a java application server and enterprise threat detection system using a J2EE data |
US10530792B2 (en) | 2016-12-15 | 2020-01-07 | Sap Se | Using frequency analysis in enterprise threat detection to detect intrusions in a computer system |
US10552605B2 (en) | 2016-12-16 | 2020-02-04 | Sap Se | Anomaly detection in enterprise threat detection |
US11470094B2 (en) | 2016-12-16 | 2022-10-11 | Sap Se | Bi-directional content replication logic for enterprise threat detection |
US10764306B2 (en) | 2016-12-19 | 2020-09-01 | Sap Se | Distributing cloud-computing platform content to enterprise threat detection systems |
US10581879B1 (en) | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
US10552610B1 (en) | 2016-12-22 | 2020-02-04 | Fireeye, Inc. | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
US10523609B1 (en) | 2016-12-27 | 2019-12-31 | Fireeye, Inc. | Multi-vector malware detection and analysis |
US10904286B1 (en) | 2017-03-24 | 2021-01-26 | Fireeye, Inc. | Detection of phishing attacks using similarity analysis |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10848397B1 (en) | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
US10902119B1 (en) | 2017-03-30 | 2021-01-26 | Fireeye, Inc. | Data extraction system for malware analysis |
US10855700B1 (en) | 2017-06-29 | 2020-12-01 | Fireeye, Inc. | Post-intrusion detection of cyber-attacks during lateral movement within networks |
US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
US10601848B1 (en) | 2017-06-29 | 2020-03-24 | Fireeye, Inc. | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
US10893068B1 (en) | 2017-06-30 | 2021-01-12 | Fireeye, Inc. | Ransomware file modification prevention technique |
US10530794B2 (en) | 2017-06-30 | 2020-01-07 | Sap Se | Pattern creation in enterprise threat detection |
US10409582B1 (en) * | 2017-07-21 | 2019-09-10 | Jpmorgan Chase Bank, N.A. | Method and system for implementing a retail event management tool |
US10747872B1 (en) | 2017-09-27 | 2020-08-18 | Fireeye, Inc. | System and method for preventing malware evasion |
US10805346B2 (en) | 2017-10-01 | 2020-10-13 | Fireeye, Inc. | Phishing attack detection |
US11108809B2 (en) | 2017-10-27 | 2021-08-31 | Fireeye, Inc. | System and method for analyzing binary code for malware classification using artificial neural network techniques |
US10986111B2 (en) | 2017-12-19 | 2021-04-20 | Sap Se | Displaying a series of events along a time axis in enterprise threat detection |
US10681064B2 (en) | 2017-12-19 | 2020-06-09 | Sap Se | Analysis of complex relationships among information technology security-relevant entities using a network graph |
US11271955B2 (en) | 2017-12-28 | 2022-03-08 | Fireeye Security Holdings Us Llc | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US11240275B1 (en) | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US11005860B1 (en) | 2017-12-28 | 2021-05-11 | Fireeye, Inc. | Method and system for efficient cybersecurity analysis of endpoint events |
US10826931B1 (en) | 2018-03-29 | 2020-11-03 | Fireeye, Inc. | System and method for predicting and mitigating cybersecurity system misconfigurations |
US11558401B1 (en) | 2018-03-30 | 2023-01-17 | Fireeye Security Holdings Us Llc | Multi-vector malware detection data sharing system for improved detection |
US10956477B1 (en) | 2018-03-30 | 2021-03-23 | Fireeye, Inc. | System and method for detecting malicious scripts through natural language processing modeling |
US11003773B1 (en) | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
US11075930B1 (en) | 2018-06-27 | 2021-07-27 | Fireeye, Inc. | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
US11314859B1 (en) | 2018-06-27 | 2022-04-26 | FireEye Security Holdings, Inc. | Cyber-security system and method for detecting escalation of privileges within an access token |
US11228491B1 (en) | 2018-06-28 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for distributed cluster configuration monitoring and management |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
CN110874472B (zh) * | 2018-09-04 | 2024-02-13 | 中国信息安全测评中心 | 一种pe病毒逃逸样本的生成方法和系统 |
US11182473B1 (en) | 2018-09-13 | 2021-11-23 | Fireeye Security Holdings Us Llc | System and method for mitigating cyberattacks against processor operability by a guest process |
US11763004B1 (en) | 2018-09-27 | 2023-09-19 | Fireeye Security Holdings Us Llc | System and method for bootkit detection |
US11368475B1 (en) | 2018-12-21 | 2022-06-21 | Fireeye Security Holdings Us Llc | System and method for scanning remote services to locate stored objects with malware |
US11100064B2 (en) | 2019-04-30 | 2021-08-24 | Commvault Systems, Inc. | Automated log-based remediation of an information management system |
US11258806B1 (en) | 2019-06-24 | 2022-02-22 | Mandiant, Inc. | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
US11556640B1 (en) | 2019-06-27 | 2023-01-17 | Mandiant, Inc. | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
US11392700B1 (en) | 2019-06-28 | 2022-07-19 | Fireeye Security Holdings Us Llc | System and method for supporting cross-platform data verification |
US11886585B1 (en) | 2019-09-27 | 2024-01-30 | Musarubra Us Llc | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
US11637862B1 (en) | 2019-09-30 | 2023-04-25 | Mandiant, Inc. | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
JP2022065703A (ja) * | 2020-10-16 | 2022-04-28 | 富士通株式会社 | 情報処理プログラム、情報処理方法、および情報処理装置 |
US11222112B1 (en) * | 2021-02-24 | 2022-01-11 | Netskope, Inc. | Signatureless detection of malicious MS office documents containing advanced threats in macros |
US11349865B1 (en) | 2021-02-24 | 2022-05-31 | Netskope, Inc. | Signatureless detection of malicious MS Office documents containing embedded OLE objects |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5159685A (en) * | 1989-12-06 | 1992-10-27 | Racal Data Communications Inc. | Expert system for communications network |
US5319776A (en) * | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
US5475625A (en) * | 1991-01-16 | 1995-12-12 | Siemens Nixdorf Informationssysteme Aktiengesellschaft | Method and arrangement for monitoring computer manipulations |
US5473769A (en) * | 1992-03-30 | 1995-12-05 | Cozza; Paul D. | Method and apparatus for increasing the speed of the detecting of computer viruses |
WO1993025024A1 (en) * | 1992-05-26 | 1993-12-09 | Cyberlock Data Intelligence, Inc. | Computer virus monitoring system |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US5544308A (en) * | 1994-08-02 | 1996-08-06 | Giordano Automation Corp. | Method for automating the development and execution of diagnostic reasoning software in products and processes |
US5485575A (en) * | 1994-11-21 | 1996-01-16 | International Business Machines Corporation | Automatic analysis of a computer virus structure and means of attachment to its hosts |
US5491791A (en) * | 1995-01-13 | 1996-02-13 | International Business Machines Corporation | System and method for remote workstation monitoring within a distributed computing environment |
US5696822A (en) * | 1995-09-28 | 1997-12-09 | Symantec Corporation | Polymorphic virus detection module |
US5696701A (en) * | 1996-07-12 | 1997-12-09 | Electronic Data Systems Corporation | Method and system for monitoring the performance of computers in computer networks using modular extensions |
-
1997
- 1997-03-18 US US08/820,649 patent/US5960170A/en not_active Expired - Lifetime
-
1998
- 1998-03-13 EP EP98911421A patent/EP0968466A1/en not_active Withdrawn
- 1998-03-13 WO PCT/US1998/003796 patent/WO1998041919A1/en not_active Application Discontinuation
- 1998-03-13 AU AU65376/98A patent/AU6537698A/en not_active Abandoned
- 1998-03-13 JP JP54052798A patent/JP4052604B2/ja not_active Expired - Lifetime
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012234579A (ja) * | 1999-12-31 | 2012-11-29 | Inca Internet Co Ltd | オンライン上での有害情報を遮断するためのシステム及び方法 |
JP2012069143A (ja) * | 1999-12-31 | 2012-04-05 | Inca Internet Co Ltd | オンライン上での有害情報を遮断するためのシステム及び方法 |
JP2005532606A (ja) * | 2001-12-31 | 2005-10-27 | シタデル セキュリティ ソフトウェア インコーポレイテッド | コンピュータの脆弱性を解決する自動化されたシステム |
US7778660B2 (en) | 2002-01-17 | 2010-08-17 | Ntt Docomo, Inc. | Mobile communications terminal, information transmitting system and information receiving method |
US7299035B2 (en) | 2002-01-17 | 2007-11-20 | Ntt Docomo, Inc. | Server device, mobile communications terminal, information transmitting system and information transmitting method |
US8156558B2 (en) | 2003-05-17 | 2012-04-10 | Microsoft Corporation | Mechanism for evaluating security risks |
JP2006526193A (ja) * | 2003-05-17 | 2006-11-16 | マイクロソフト コーポレーション | セキュリティリスクを評価するための機構 |
JP2005229611A (ja) * | 2004-02-10 | 2005-08-25 | Ricoh Co Ltd | 複合機用のウィルス保護 |
JP2008152769A (ja) * | 2006-11-28 | 2008-07-03 | Avaya Technology Llc | 自動セキュリティ・プラットフォーム |
JP2010517170A (ja) * | 2007-01-26 | 2010-05-20 | ヴァーダシス・インコーポレーテッド | 不正侵入された顧客マシンとの信頼された取引の保証 |
JP4536750B2 (ja) * | 2007-05-30 | 2010-09-01 | 株式会社エヌ・ティ・ティ・ドコモ | サーバ装置、情報送信システム及び情報送信方法 |
JP2007293887A (ja) * | 2007-05-30 | 2007-11-08 | Ntt Docomo Inc | サーバ装置、移動通信端末、情報送信システム及び情報送信方法 |
JP2011523482A (ja) * | 2008-05-21 | 2011-08-11 | シマンテック コーポレーション | ネットワーク照会を利用した最適定義配信による集中型スキャナデータベース |
JP2012501504A (ja) * | 2008-08-29 | 2012-01-19 | エーブイジー テクノロジーズ シーゼット、エス.アール.オー. | マルウェア検知のシステムおよび方法 |
JP2015535115A (ja) * | 2012-11-20 | 2015-12-07 | シマンテック コーポレーションSymantec Corporation | マルウェア定義パッケージサイズを縮小するためのテレメトリの使用 |
JP2018538633A (ja) * | 2015-12-19 | 2018-12-27 | ビットディフェンダー アイピーアール マネジメント リミテッド | 複数のネットワークエンドポイントをセキュアにするためのデュアルメモリイントロスペクション |
Also Published As
Publication number | Publication date |
---|---|
US5960170A (en) | 1999-09-28 |
EP0968466A1 (en) | 2000-01-05 |
AU6537698A (en) | 1998-10-12 |
WO1998041919A1 (en) | 1998-09-24 |
JP4052604B2 (ja) | 2008-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2001515625A (ja) | クライアント・サーバシステムにおけるウイルス検出 | |
USRE45326E1 (en) | Systems and methods for securing computers | |
EP2566130B1 (en) | Automatic analysis of security related incidents in computer networks | |
US7904518B2 (en) | Apparatus and method for analyzing and filtering email and for providing web related services | |
US7062552B2 (en) | System and method for blocking harmful information online, and computer readable medium therefor | |
Ning et al. | Analyzing intensive intrusion alerts via correlation | |
EP1417603B1 (en) | Automated computer system security compromise | |
US7093292B1 (en) | System, method and computer program product for monitoring hacker activities | |
RU2444056C1 (ru) | Система и способ ускорения решения проблем за счет накопления статистической информации | |
US6944775B2 (en) | Scanner API for executing multiple scanning engines | |
US7836506B2 (en) | Threat protection network | |
US7383578B2 (en) | Method and system for morphing honeypot | |
US6963978B1 (en) | Distributed system and method for conducting a comprehensive search for malicious code in software | |
US20030233447A1 (en) | Apparatus and methods for monitoring content requested by a client device | |
Mokhov et al. | Automating MAC spoofer evidence gathering and encoding for investigations | |
KR20090054822A (ko) | 악성코드 수집 방법 및 장치 | |
JP2002259149A (ja) | ネットワークを通した遠隔コンピュータウイルス防疫システム及びその方法 | |
CN116841912B (zh) | 应用测试方法、装置、电子设备及计算机可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20050309 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20070522 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20070817 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20070921 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20070921 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20071113 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20071203 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20101214 Year of fee payment: 3 |
|
R150 | Certificate of patent or registration of utility model |
Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20101214 Year of fee payment: 3 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20111214 Year of fee payment: 4 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20111214 Year of fee payment: 4 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20121214 Year of fee payment: 5 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20131214 Year of fee payment: 6 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
EXPY | Cancellation because of completion of term |