JP2014519113A - マルウェア解析システム - Google Patents
マルウェア解析システム Download PDFInfo
- Publication number
- JP2014519113A JP2014519113A JP2014512893A JP2014512893A JP2014519113A JP 2014519113 A JP2014519113 A JP 2014519113A JP 2014512893 A JP2014512893 A JP 2014512893A JP 2014512893 A JP2014512893 A JP 2014512893A JP 2014519113 A JP2014519113 A JP 2014519113A
- Authority
- JP
- Japan
- Prior art keywords
- malware
- firewall
- signature
- virtual machine
- candidate sample
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/115,032 | 2011-05-24 | ||
| US13/115,032 US9047441B2 (en) | 2011-05-24 | 2011-05-24 | Malware analysis system |
| PCT/US2012/038439 WO2012162102A1 (en) | 2011-05-24 | 2012-05-17 | Malware analysis system |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2016045104A Division JP6106780B2 (ja) | 2011-05-24 | 2016-03-09 | マルウェア解析システム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| JP2014519113A true JP2014519113A (ja) | 2014-08-07 |
Family
ID=47217632
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2014512893A Pending JP2014519113A (ja) | 2011-05-24 | 2012-05-17 | マルウェア解析システム |
| JP2016045104A Active JP6106780B2 (ja) | 2011-05-24 | 2016-03-09 | マルウェア解析システム |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2016045104A Active JP6106780B2 (ja) | 2011-05-24 | 2016-03-09 | マルウェア解析システム |
Country Status (8)
| Country | Link |
|---|---|
| US (2) | US9047441B2 (enExample) |
| EP (1) | EP2715540B1 (enExample) |
| JP (2) | JP2014519113A (enExample) |
| CN (2) | CN103842965B (enExample) |
| AU (1) | AU2012259113B2 (enExample) |
| CA (1) | CA2835954C (enExample) |
| IL (2) | IL229531A (enExample) |
| WO (1) | WO2012162102A1 (enExample) |
Cited By (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2016220213A (ja) * | 2015-05-22 | 2016-12-22 | フィッシャー−ローズマウント システムズ,インコーポレイテッド | プラントセキュリティシステムにおける構成可能なロバスト性エージェント |
| JP2016224506A (ja) * | 2015-05-27 | 2016-12-28 | 西日本電信電話株式会社 | 情報流出検出装置、情報流出検出システム、及び情報流出検出プログラム |
| JP2017016631A (ja) * | 2015-07-06 | 2017-01-19 | エーオー カスペルスキー ラボAO Kaspersky Lab | 脆弱なアプリケーションによるファイルのオープンを制御するシステム及び方法。 |
| JP2017021773A (ja) * | 2015-06-30 | 2017-01-26 | エーオー カスペルスキー ラボAO Kaspersky Lab | 望ましくないプログラムのインストール及び実行を予防するシステム及び方法 |
| JP2017033531A (ja) * | 2015-08-04 | 2017-02-09 | エーオー カスペルスキー ラボAO Kaspersky Lab | 専用のコンピュータセキュリティサービスを利用するシステムおよび方法 |
| WO2018079424A1 (ja) * | 2016-10-24 | 2018-05-03 | パナソニックIpマネジメント株式会社 | 製品の製造システム、マルウェア検知システム、製品の製造方法及びマルウェア検知方法 |
| JP2018533793A (ja) * | 2015-11-04 | 2018-11-15 | ビットディフェンダー アイピーアール マネジメント リミテッド | ドメイン生成アルゴリズム(dga)のマルウェアを検出するためのシステムおよび方法 |
| DE112017001052T5 (de) | 2016-02-29 | 2018-11-29 | Panasonic Intellectual Property Management Co., Ltd. | Erkennungssystem, Webanwendungsvorrichtung, Webanwendungs-Firewallvorrichtung, Erkennungsverfahren für Erkennungssystem, Erkennungsverfahren für Webanwendungsvorrichtung und Erkennungsverfahren für Webanwendungs-Firewallvorrichtung |
| US10482240B2 (en) | 2015-01-29 | 2019-11-19 | Nec Corporation | Anti-malware device, anti-malware system, anti-malware method, and recording medium in which anti-malware program is stored |
| US10761840B2 (en) | 2015-11-30 | 2020-09-01 | Nec Corporation | Software analysis device, software analysis method, and recording medium |
| US10891379B2 (en) | 2016-04-26 | 2021-01-12 | Nec Corporation | Program analysis system, program analysis method and storage medium |
| JP2023524619A (ja) * | 2020-02-28 | 2023-06-13 | ダークトレース ホールディングス リミテッド | 関心度に基づいてデータ・フローを異なって取り扱うこと |
| JPWO2023112376A1 (enExample) * | 2021-12-17 | 2023-06-22 |
Families Citing this family (333)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8515912B2 (en) | 2010-07-15 | 2013-08-20 | Palantir Technologies, Inc. | Sharing and deconflicting data changes in a multimaster database system |
| US8856782B2 (en) | 2007-03-01 | 2014-10-07 | George Mason Research Foundation, Inc. | On-demand disposable virtual work system |
| US9264441B2 (en) * | 2008-03-24 | 2016-02-16 | Hewlett Packard Enterprise Development Lp | System and method for securing a network from zero-day vulnerability exploits |
| US9152789B2 (en) | 2008-05-28 | 2015-10-06 | Zscaler, Inc. | Systems and methods for dynamic cloud-based malware behavior analysis |
| US9609015B2 (en) | 2008-05-28 | 2017-03-28 | Zscaler, Inc. | Systems and methods for dynamic cloud-based malware behavior analysis |
| US9098698B2 (en) | 2008-09-12 | 2015-08-04 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
| US9383911B2 (en) | 2008-09-15 | 2016-07-05 | Palantir Technologies, Inc. | Modal-less interface enhancements |
| US9501644B2 (en) * | 2010-03-15 | 2016-11-22 | F-Secure Oyj | Malware protection |
| US8832835B1 (en) * | 2010-10-28 | 2014-09-09 | Symantec Corporation | Detecting and remediating malware dropped by files |
| CN102204168B (zh) * | 2011-04-26 | 2013-12-04 | 华为技术有限公司 | 网络流量模拟方法及装置 |
| US8997220B2 (en) * | 2011-05-26 | 2015-03-31 | Microsoft Technology Licensing, Llc | Automatic detection of search results poisoning attacks |
| US9547693B1 (en) | 2011-06-23 | 2017-01-17 | Palantir Technologies Inc. | Periodic database search manager for multiple data sources |
| US10742591B2 (en) * | 2011-07-06 | 2020-08-11 | Akamai Technologies Inc. | System for domain reputation scoring |
| US9843601B2 (en) | 2011-07-06 | 2017-12-12 | Nominum, Inc. | Analyzing DNS requests for anomaly detection |
| US11201848B2 (en) | 2011-07-06 | 2021-12-14 | Akamai Technologies, Inc. | DNS-based ranking of domain names |
| US8843915B2 (en) * | 2011-07-28 | 2014-09-23 | Hewlett-Packard Development Company, L.P. | Signature-based update management |
| US8887263B2 (en) * | 2011-09-08 | 2014-11-11 | Mcafee, Inc. | Authentication sharing in a firewall cluster |
| US8516586B1 (en) * | 2011-09-20 | 2013-08-20 | Trend Micro Incorporated | Classification of unknown computer network traffic |
| US10025928B2 (en) * | 2011-10-03 | 2018-07-17 | Webroot Inc. | Proactive browser content analysis |
| US9215245B1 (en) * | 2011-11-10 | 2015-12-15 | Google Inc. | Exploration system and method for analyzing behavior of binary executable programs |
| US9081959B2 (en) | 2011-12-02 | 2015-07-14 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
| CN103975331B (zh) * | 2011-12-06 | 2017-06-13 | 阿沃森特亨茨维尔有限责任公司 | 并入了被管理基础设施设备的安全的数据中心基础设施管理系统 |
| US9213837B2 (en) * | 2011-12-06 | 2015-12-15 | Raytheon Cyber Products, Llc | System and method for detecting malware in documents |
| KR101296716B1 (ko) * | 2011-12-14 | 2013-08-20 | 한국인터넷진흥원 | 피디에프 문서형 악성코드 탐지 시스템 및 방법 |
| US9367687B1 (en) * | 2011-12-22 | 2016-06-14 | Emc Corporation | Method for malware detection using deep inspection and data discovery agents |
| US8949982B2 (en) * | 2011-12-30 | 2015-02-03 | Verisign, Inc. | Method for administering a top-level domain |
| US9053348B2 (en) * | 2012-03-26 | 2015-06-09 | Microsoft Technology Licensing, Llc | Secure cloud computing platform |
| IL219499B (en) | 2012-04-30 | 2019-02-28 | Verint Systems Ltd | A system and method for detecting malicious software |
| US9548962B2 (en) * | 2012-05-11 | 2017-01-17 | Alcatel Lucent | Apparatus and method for providing a fluid security layer |
| US8925074B1 (en) * | 2012-05-22 | 2014-12-30 | Trend Micro Incorporated | Methods and apparatus for detecting abnormal computer files |
| CN102694820B (zh) * | 2012-06-13 | 2015-01-21 | 华为技术有限公司 | 签名规则的处理方法、服务器及入侵防御系统 |
| US9027138B2 (en) | 2012-06-29 | 2015-05-05 | Centurylink Intellectual Property Llc | Identification of infected devices in broadband environments |
| US10332005B1 (en) * | 2012-09-25 | 2019-06-25 | Narus, Inc. | System and method for extracting signatures from controlled execution of applications and using them on traffic traces |
| US9081975B2 (en) | 2012-10-22 | 2015-07-14 | Palantir Technologies, Inc. | Sharing information between nexuses that use different classification schemes for information access control |
| US9565213B2 (en) | 2012-10-22 | 2017-02-07 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
| US9501761B2 (en) | 2012-11-05 | 2016-11-22 | Palantir Technologies, Inc. | System and method for sharing investigation results |
| CN103810424B (zh) * | 2012-11-05 | 2017-02-08 | 腾讯科技(深圳)有限公司 | 一种异常应用程序的识别方法及装置 |
| IL224482B (en) | 2013-01-29 | 2018-08-30 | Verint Systems Ltd | System and method for keyword spotting using representative dictionary |
| US9165142B1 (en) * | 2013-01-30 | 2015-10-20 | Palo Alto Networks, Inc. | Malware family identification using profile signatures |
| US8935782B2 (en) * | 2013-02-04 | 2015-01-13 | International Business Machines Corporation | Malware detection via network information flow theories |
| US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
| US10152591B2 (en) | 2013-02-10 | 2018-12-11 | Paypal, Inc. | Protecting against malware variants using reconstructed code of malware |
| AU2014213584B2 (en) | 2013-02-10 | 2018-01-18 | Paypal, Inc. | Method and product for providing a predictive security product and evaluating existing security products |
| US9930066B2 (en) | 2013-02-12 | 2018-03-27 | Nicira, Inc. | Infrastructure level LAN security |
| CN103150506B (zh) * | 2013-02-17 | 2016-03-30 | 北京奇虎科技有限公司 | 一种恶意程序检测的方法和装置 |
| US9239922B1 (en) * | 2013-03-11 | 2016-01-19 | Trend Micro Inc. | Document exploit detection using baseline comparison |
| KR101400680B1 (ko) * | 2013-03-12 | 2014-05-29 | 주식회사 윈스 | 악성코드 자동 수집 시스템 |
| US9965937B2 (en) | 2013-03-15 | 2018-05-08 | Palantir Technologies Inc. | External malware data item clustering and analysis |
| US8788405B1 (en) | 2013-03-15 | 2014-07-22 | Palantir Technologies, Inc. | Generating data clusters with customizable analysis strategies |
| CN104123494B (zh) * | 2013-04-24 | 2017-12-29 | 贝壳网际(北京)安全技术有限公司 | 恶意软件动态行为分析系统的预警方法及装置 |
| IL226747B (en) | 2013-06-04 | 2019-01-31 | Verint Systems Ltd | A system and method for studying malware detection |
| WO2015099635A2 (en) | 2013-06-20 | 2015-07-02 | Hewlett-Packard Development Company, L.P. | Resource classification using resource requests |
| US9536091B2 (en) | 2013-06-24 | 2017-01-03 | Fireeye, Inc. | System and method for detecting time-bomb malware |
| US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
| US9336025B2 (en) | 2013-07-12 | 2016-05-10 | The Boeing Company | Systems and methods of analyzing a software component |
| US9396082B2 (en) | 2013-07-12 | 2016-07-19 | The Boeing Company | Systems and methods of analyzing a software component |
| US9852290B1 (en) | 2013-07-12 | 2017-12-26 | The Boeing Company | Systems and methods of analyzing a software component |
| US9280369B1 (en) * | 2013-07-12 | 2016-03-08 | The Boeing Company | Systems and methods of analyzing a software component |
| US9461967B2 (en) | 2013-07-18 | 2016-10-04 | Palo Alto Networks, Inc. | Packet classification for network routing |
| CN103414758B (zh) * | 2013-07-19 | 2017-04-05 | 北京奇虎科技有限公司 | 日志处理方法及装置 |
| EP3028203A4 (en) | 2013-07-31 | 2017-03-29 | Hewlett-Packard Enterprise Development LP | Signal tokens indicative of malware |
| US9565152B2 (en) | 2013-08-08 | 2017-02-07 | Palantir Technologies Inc. | Cable reader labeling |
| US9335897B2 (en) | 2013-08-08 | 2016-05-10 | Palantir Technologies Inc. | Long click display of a context menu |
| US8959643B1 (en) * | 2013-08-09 | 2015-02-17 | Narus, Inc. | Detecting malware infestations in large-scale networks |
| US9058488B2 (en) | 2013-08-14 | 2015-06-16 | Bank Of America Corporation | Malware detection and computer monitoring methods |
| US9185128B2 (en) * | 2013-08-30 | 2015-11-10 | Bank Of America Corporation | Malware analysis methods and systems |
| US10084817B2 (en) * | 2013-09-11 | 2018-09-25 | NSS Labs, Inc. | Malware and exploit campaign detection system and method |
| US20150089655A1 (en) * | 2013-09-23 | 2015-03-26 | Electronics And Telecommunications Research Institute | System and method for detecting malware based on virtual host |
| US9690936B1 (en) * | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
| US9479521B2 (en) | 2013-09-30 | 2016-10-25 | The Boeing Company | Software network behavior analysis and identification system |
| US9563672B2 (en) | 2013-09-30 | 2017-02-07 | Verisign, Inc. | NXD query monitor |
| US9460405B2 (en) * | 2013-10-03 | 2016-10-04 | Paypal, Inc. | Systems and methods for cloud data loss prevention integration |
| US9386103B2 (en) | 2013-10-04 | 2016-07-05 | Breakingpoint Systems, Inc. | Application identification and dynamic signature generation for managing network communications |
| US9116975B2 (en) | 2013-10-18 | 2015-08-25 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores |
| CN103581185B (zh) * | 2013-11-01 | 2016-12-07 | 北京奇虎科技有限公司 | 对抗免杀测试的云查杀方法、装置及系统 |
| CN104380686B (zh) * | 2013-11-07 | 2018-08-21 | 华为技术有限公司 | 用于实施ng防火墙的方法和系统、ng防火墙客户端和ng防火墙服务器 |
| US9355246B1 (en) * | 2013-12-05 | 2016-05-31 | Trend Micro Inc. | Tuning sandbox behavior based on static characteristics of malware |
| US10579647B1 (en) | 2013-12-16 | 2020-03-03 | Palantir Technologies Inc. | Methods and systems for analyzing entity performance |
| KR101877655B1 (ko) | 2013-12-20 | 2018-07-11 | 맥아피, 엘엘씨 | 지능적 방화벽 액세스 규칙 |
| US9756074B2 (en) * | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
| US20150188893A1 (en) * | 2013-12-30 | 2015-07-02 | Arun Sood | Secure Gateway |
| US8832832B1 (en) | 2014-01-03 | 2014-09-09 | Palantir Technologies Inc. | IP reputation |
| US9740759B1 (en) * | 2014-01-24 | 2017-08-22 | EMC IP Holding Company LLC | Cloud migrator |
| US9363282B1 (en) * | 2014-01-28 | 2016-06-07 | Infoblox Inc. | Platforms for implementing an analytics framework for DNS security |
| US10469510B2 (en) * | 2014-01-31 | 2019-11-05 | Juniper Networks, Inc. | Intermediate responses for non-html downloads |
| US9009827B1 (en) | 2014-02-20 | 2015-04-14 | Palantir Technologies Inc. | Security sharing system |
| US11405410B2 (en) | 2014-02-24 | 2022-08-02 | Cyphort Inc. | System and method for detecting lateral movement and data exfiltration |
| US10360271B2 (en) | 2014-02-25 | 2019-07-23 | Sap Se | Mining security vulnerabilities available from social media |
| US9241010B1 (en) * | 2014-03-20 | 2016-01-19 | Fireeye, Inc. | System and method for network behavior detection |
| US9591015B1 (en) * | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
| CN103942076B (zh) * | 2014-04-11 | 2017-05-24 | 珠海市君天电子科技有限公司 | 积分墙信息的获取方法及装置 |
| KR101535502B1 (ko) * | 2014-04-22 | 2015-07-09 | 한국인터넷진흥원 | 보안 내재형 가상 네트워크 제어 시스템 및 방법 |
| US10122753B2 (en) | 2014-04-28 | 2018-11-06 | Sophos Limited | Using reputation to avoid false malware detections |
| US9917851B2 (en) | 2014-04-28 | 2018-03-13 | Sophos Limited | Intrusion detection using a heartbeat |
| KR101534566B1 (ko) * | 2014-05-09 | 2015-07-24 | 한국전자통신연구원 | 클라우드 가상 데스크탑 보안 통제 장치 및 방법 |
| WO2015195093A1 (en) | 2014-06-17 | 2015-12-23 | Hewlett-Packard Development Company, L. P. | Dns based infection scores |
| KR101624326B1 (ko) | 2014-06-24 | 2016-05-26 | 주식회사 안랩 | 악성 파일 진단 시스템 및 악성 파일 진단 방법 |
| US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
| US9535974B1 (en) | 2014-06-30 | 2017-01-03 | Palantir Technologies Inc. | Systems and methods for identifying key phrase clusters within documents |
| US9619557B2 (en) | 2014-06-30 | 2017-04-11 | Palantir Technologies, Inc. | Systems and methods for key phrase characterization of documents |
| US9613218B2 (en) | 2014-06-30 | 2017-04-04 | Nicira, Inc. | Encryption system in a virtualized environment |
| US10572496B1 (en) | 2014-07-03 | 2020-02-25 | Palantir Technologies Inc. | Distributed workflow system and database with access controls for city resiliency |
| US9785773B2 (en) * | 2014-07-03 | 2017-10-10 | Palantir Technologies Inc. | Malware data item analysis |
| US9202249B1 (en) | 2014-07-03 | 2015-12-01 | Palantir Technologies Inc. | Data item clustering and analysis |
| CN104091124A (zh) * | 2014-07-03 | 2014-10-08 | 利诚服装集团股份有限公司 | 一种数据安全处理方法 |
| US9021260B1 (en) * | 2014-07-03 | 2015-04-28 | Palantir Technologies Inc. | Malware data item analysis |
| CN106471510B (zh) * | 2014-07-08 | 2019-08-23 | 惠普发展公司有限责任合伙企业 | 复合文档访问 |
| US9659176B1 (en) * | 2014-07-17 | 2017-05-23 | Symantec Corporation | Systems and methods for generating repair scripts that facilitate remediation of malware side-effects |
| US10652263B2 (en) * | 2014-07-21 | 2020-05-12 | David Paul Heilig | Identifying malware-infected network devices through traffic monitoring |
| US9596266B1 (en) * | 2014-07-23 | 2017-03-14 | Lookingglass Cyber Solutions, Inc. | Apparatuses, methods and systems for a real-time cyber threat indicator verification mechanism |
| IL233776B (en) | 2014-07-24 | 2019-02-28 | Verint Systems Ltd | A system and method for adjusting domains |
| US9419992B2 (en) | 2014-08-13 | 2016-08-16 | Palantir Technologies Inc. | Unwanted tunneling alert system |
| US9332023B1 (en) * | 2014-08-25 | 2016-05-03 | Symantec Corporation | Uploading signatures to gateway level unified threat management devices after endpoint level behavior based detection of zero day threats |
| US9454281B2 (en) | 2014-09-03 | 2016-09-27 | Palantir Technologies Inc. | System for providing dynamic linked panels in user interface |
| US10044675B1 (en) | 2014-09-30 | 2018-08-07 | Palo Alto Networks, Inc. | Integrating a honey network with a target network to counter IP and peer-checking evasion techniques |
| US9495188B1 (en) * | 2014-09-30 | 2016-11-15 | Palo Alto Networks, Inc. | Synchronizing a honey network configuration to reflect a target network environment |
| US9860208B1 (en) | 2014-09-30 | 2018-01-02 | Palo Alto Networks, Inc. | Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network |
| US9882929B1 (en) | 2014-09-30 | 2018-01-30 | Palo Alto Networks, Inc. | Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network |
| US9716727B1 (en) | 2014-09-30 | 2017-07-25 | Palo Alto Networks, Inc. | Generating a honey network configuration to emulate a target network environment |
| US9767172B2 (en) | 2014-10-03 | 2017-09-19 | Palantir Technologies Inc. | Data aggregation and analysis system |
| US9501851B2 (en) | 2014-10-03 | 2016-11-22 | Palantir Technologies Inc. | Time-series analysis system |
| US9984133B2 (en) | 2014-10-16 | 2018-05-29 | Palantir Technologies Inc. | Schematic and database linking system |
| US20160164886A1 (en) * | 2014-10-17 | 2016-06-09 | Computer Sciences Corporation | Systems and methods for threat analysis of computer data |
| US9413774B1 (en) * | 2014-10-27 | 2016-08-09 | Palo Alto Networks, Inc. | Dynamic malware analysis of a URL using a browser executed in an instrumented virtual machine environment |
| US9043894B1 (en) | 2014-11-06 | 2015-05-26 | Palantir Technologies Inc. | Malicious software detection in a computing system |
| WO2016097757A1 (en) | 2014-12-18 | 2016-06-23 | Sophos Limited | A method and system for network access control based on traffic monitoring and vulnerability detection using process related information |
| US9348920B1 (en) | 2014-12-22 | 2016-05-24 | Palantir Technologies Inc. | Concept indexing among database of documents using machine learning techniques |
| US10552994B2 (en) | 2014-12-22 | 2020-02-04 | Palantir Technologies Inc. | Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items |
| US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
| US9367872B1 (en) | 2014-12-22 | 2016-06-14 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures |
| US10075455B2 (en) * | 2014-12-26 | 2018-09-11 | Fireeye, Inc. | Zero-day rotating guest image profile |
| US9467455B2 (en) | 2014-12-29 | 2016-10-11 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
| US9335911B1 (en) | 2014-12-29 | 2016-05-10 | Palantir Technologies Inc. | Interactive user interface for dynamic data analysis exploration and query processing |
| US9817563B1 (en) | 2014-12-29 | 2017-11-14 | Palantir Technologies Inc. | System and method of generating data points from one or more data stores of data items for chart creation and manipulation |
| US12443336B2 (en) | 2014-12-29 | 2025-10-14 | Palantir Technologies Inc. | Interactive user interface for dynamically updating data and data analysis and query processing |
| US9648036B2 (en) | 2014-12-29 | 2017-05-09 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
| US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
| US10560842B2 (en) | 2015-01-28 | 2020-02-11 | Verint Systems Ltd. | System and method for combined network-side and off-air monitoring of wireless networks |
| JP6174826B2 (ja) * | 2015-01-28 | 2017-08-02 | 日本電信電話株式会社 | マルウェア解析システム、マルウェア解析方法およびマルウェア解析プログラム |
| US9560078B2 (en) * | 2015-02-04 | 2017-01-31 | Intel Corporation | Technologies for scalable security architecture of virtualized networks |
| TWI553502B (zh) * | 2015-03-05 | 2016-10-11 | 緯創資通股份有限公司 | 用於應用程式層之防火牆裝置的保護方法與其電腦系統 |
| US10116688B1 (en) | 2015-03-24 | 2018-10-30 | Symantec Corporation | Systems and methods for detecting potentially malicious files |
| US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
| IL238001B (en) | 2015-03-29 | 2020-05-31 | Verint Systems Ltd | System and method for identifying communication conversation participants based on communication traffic patterns |
| US9798878B1 (en) | 2015-03-31 | 2017-10-24 | Symantec Corporation | Systems and methods for detecting text display manipulation attacks |
| US9781131B2 (en) * | 2015-04-22 | 2017-10-03 | Aktiebolaget Skf | Systems and methods for securing remote configuration |
| WO2016169623A1 (en) * | 2015-04-24 | 2016-10-27 | Nokia Solutions And Networks Oy | Mitigation of malicious software in a mobile communications network |
| WO2016186902A1 (en) * | 2015-05-20 | 2016-11-24 | Alibaba Group Holding Limited | Detecting malicious files |
| CN106295328B (zh) | 2015-05-20 | 2019-06-18 | 阿里巴巴集团控股有限公司 | 文件检测方法、装置及系统 |
| US10701037B2 (en) | 2015-05-27 | 2020-06-30 | Ping Identity Corporation | Scalable proxy clusters |
| US9703956B1 (en) * | 2015-06-08 | 2017-07-11 | Symantec Corporation | Systems and methods for categorizing virtual-machine-aware applications for further analysis |
| US10176438B2 (en) * | 2015-06-19 | 2019-01-08 | Arizona Board Of Regents On Behalf Of Arizona State University | Systems and methods for data driven malware task identification |
| US9407652B1 (en) | 2015-06-26 | 2016-08-02 | Palantir Technologies Inc. | Network anomaly detection |
| US9686240B1 (en) | 2015-07-07 | 2017-06-20 | Sprint Communications Company L.P. | IPv6 to IPv4 data packet migration in a trusted security zone |
| CN106341377A (zh) * | 2015-07-15 | 2017-01-18 | 威海捷讯通信技术有限公司 | 一种Web服务器免受攻击的方法及装置 |
| US10607011B1 (en) * | 2015-07-21 | 2020-03-31 | Fatih Orhan | Method to detect zero-day malware applications using dynamic behaviors |
| US9705909B2 (en) * | 2015-07-29 | 2017-07-11 | Verizon Digital Media Services Inc. | Automatic detection and mitigation of security weaknesses with a self-configuring firewall |
| US9456000B1 (en) | 2015-08-06 | 2016-09-27 | Palantir Technologies Inc. | Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications |
| US10489391B1 (en) | 2015-08-17 | 2019-11-26 | Palantir Technologies Inc. | Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface |
| US10102369B2 (en) | 2015-08-19 | 2018-10-16 | Palantir Technologies Inc. | Checkout system executable code monitoring, and user account compromise determination system |
| US9537880B1 (en) | 2015-08-19 | 2017-01-03 | Palantir Technologies Inc. | Anomalous network monitoring, user behavior detection and database system |
| US10127385B2 (en) | 2015-09-02 | 2018-11-13 | Sap Se | Automated security vulnerability exploit tracking on social media |
| US20170068712A1 (en) | 2015-09-04 | 2017-03-09 | Palantir Technologies Inc. | Systems and methods for database investigation tool |
| US9749294B1 (en) | 2015-09-08 | 2017-08-29 | Sprint Communications Company L.P. | System and method of establishing trusted operability between networks in a network functions virtualization environment |
| US9742796B1 (en) | 2015-09-18 | 2017-08-22 | Palo Alto Networks, Inc. | Automatic repair of corrupt files for a detonation engine |
| US9853940B2 (en) | 2015-09-24 | 2017-12-26 | Microsoft Technology Licensing, Llc | Passive web application firewall |
| US10277612B2 (en) * | 2015-09-28 | 2019-04-30 | International Business Machines Corporation | Autonomic exclusion in a tiered delivery network |
| US10542115B1 (en) | 2015-10-01 | 2020-01-21 | Sprint Communications Company L.P. | Securing communications in a network function virtualization (NFV) core network |
| US9811686B1 (en) * | 2015-10-09 | 2017-11-07 | Sprint Communications Company L.P. | Support systems interactions with virtual network functions in a trusted security zone |
| US10044745B1 (en) | 2015-10-12 | 2018-08-07 | Palantir Technologies, Inc. | Systems for computer network security risk assessment including user compromise analysis associated with a network of devices |
| IL242219B (en) | 2015-10-22 | 2020-11-30 | Verint Systems Ltd | System and method for keyword searching using both static and dynamic dictionaries |
| IL242218B (en) | 2015-10-22 | 2020-11-30 | Verint Systems Ltd | A system and method for maintaining a dynamic dictionary |
| US10963565B1 (en) * | 2015-10-29 | 2021-03-30 | Palo Alto Networks, Inc. | Integrated application analysis and endpoint protection |
| US9781016B1 (en) | 2015-11-02 | 2017-10-03 | Sprint Communications Company L.P. | Dynamic addition of network function services |
| US10015192B1 (en) * | 2015-11-06 | 2018-07-03 | Cisco Technology, Inc. | Sample selection for data analysis for use in malware detection |
| CN108369542A (zh) * | 2015-11-09 | 2018-08-03 | 西普霍特公司 | 用于检测横向运动和数据泄漏的系统和方法 |
| US10594656B2 (en) * | 2015-11-17 | 2020-03-17 | Zscaler, Inc. | Multi-tenant cloud-based firewall systems and methods |
| US11277383B2 (en) | 2015-11-17 | 2022-03-15 | Zscaler, Inc. | Cloud-based intrusion prevention system |
| US11159486B2 (en) | 2015-11-17 | 2021-10-26 | Zscaler, Inc. | Stream scanner for identifying signature matches |
| US9760556B1 (en) | 2015-12-11 | 2017-09-12 | Palantir Technologies Inc. | Systems and methods for annotating and linking electronic documents |
| US10089289B2 (en) | 2015-12-29 | 2018-10-02 | Palantir Technologies Inc. | Real-time document annotation |
| US9916465B1 (en) | 2015-12-29 | 2018-03-13 | Palantir Technologies Inc. | Systems and methods for automatic and customizable data minimization of electronic data stores |
| US9996236B1 (en) | 2015-12-29 | 2018-06-12 | Palantir Technologies Inc. | Simplified frontend processing and visualization of large datasets |
| US9992217B2 (en) * | 2015-12-31 | 2018-06-05 | The University Of North Carolina At Chapel Hill | Methods, systems, and computer readable media for detecting malicious network traffic |
| CN105511944B (zh) * | 2016-01-07 | 2018-09-28 | 上海海事大学 | 一种云系统内部虚拟机的异常检测方法 |
| WO2017120512A1 (en) * | 2016-01-08 | 2017-07-13 | Belden, Inc. | Method and protection apparatus to prevent malicious information communication in ip networks by exploiting benign networking protocols |
| US10237286B2 (en) * | 2016-01-29 | 2019-03-19 | Zscaler, Inc. | Content delivery network protection from malware and data leakage |
| US9928363B2 (en) * | 2016-02-26 | 2018-03-27 | Cylance Inc. | Isolating data for analysis to avoid malicious attacks |
| US10200389B2 (en) * | 2016-02-29 | 2019-02-05 | Palo Alto Networks, Inc. | Malware analysis platform for threat intelligence made actionable |
| US10333948B2 (en) | 2016-02-29 | 2019-06-25 | Palo Alto Networks, Inc. | Alerting and tagging using a malware analysis platform for threat intelligence made actionable |
| US10230749B1 (en) * | 2016-02-29 | 2019-03-12 | Palo Alto Networks, Inc. | Automatically grouping malware based on artifacts |
| US10200390B2 (en) * | 2016-02-29 | 2019-02-05 | Palo Alto Networks, Inc. | Automatically determining whether malware samples are similar |
| US9984234B2 (en) * | 2016-03-11 | 2018-05-29 | Hrb Innovations, Inc. | Secure document importation via portable media |
| US10826933B1 (en) * | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
| US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
| CN107306255A (zh) * | 2016-04-21 | 2017-10-31 | 阿里巴巴集团控股有限公司 | 防御流量攻击方法、预设列表生成方法、装置及清洗设备 |
| IL245299B (en) | 2016-04-25 | 2021-05-31 | Verint Systems Ltd | A system and method for decoding communication transmitted in a wireless local communication network |
| CN105791323B (zh) * | 2016-05-09 | 2019-02-26 | 国家电网公司 | 未知恶意软件的防御方法和设备 |
| CN106682507B (zh) * | 2016-05-19 | 2019-05-14 | 腾讯科技(深圳)有限公司 | 病毒库的获取方法及装置、设备、服务器、系统 |
| RU2628923C1 (ru) * | 2016-05-20 | 2017-08-22 | Акционерное общество "Лаборатория Касперского" | Система и способ распределения файлов между виртуальными машинами, входящими в распределённую систему виртуальных машин, для выполнения антивирусной проверки |
| WO2017216774A1 (en) * | 2016-06-16 | 2017-12-21 | Beestripe Llc | Method for identifying and removing malicious software |
| US10896254B2 (en) | 2016-06-29 | 2021-01-19 | Sophos Limited | Sandbox environment for document preview and analysis |
| US10482239B1 (en) * | 2016-06-30 | 2019-11-19 | Palo Alto Networks, Inc. | Rendering an object using muliple versions of an application in a single process for dynamic malware analysis |
| US10187414B2 (en) * | 2016-07-20 | 2019-01-22 | Cisco Technology, Inc. | Differential malware detection using network and endpoint sensors |
| US12204845B2 (en) | 2016-07-21 | 2025-01-21 | Palantir Technologies Inc. | Cached database and synchronization system for providing dynamic linked panels in user interface |
| US10324609B2 (en) | 2016-07-21 | 2019-06-18 | Palantir Technologies Inc. | System for providing dynamic linked panels in user interface |
| US10719188B2 (en) | 2016-07-21 | 2020-07-21 | Palantir Technologies Inc. | Cached database and synchronization system for providing dynamic linked panels in user interface |
| US10798073B2 (en) | 2016-08-26 | 2020-10-06 | Nicira, Inc. | Secure key management protocol for distributed network encryption |
| WO2018039792A1 (en) * | 2016-08-31 | 2018-03-08 | Wedge Networks Inc. | Apparatus and methods for network-based line-rate detection of unknown malware |
| CN106503552A (zh) * | 2016-09-19 | 2017-03-15 | 南京邮电大学 | 基于签名与数据流模式挖掘的Android恶意软件检测系统及方法 |
| US11522901B2 (en) * | 2016-09-23 | 2022-12-06 | OPSWAT, Inc. | Computer security vulnerability assessment |
| US10313366B1 (en) * | 2016-09-23 | 2019-06-04 | EMC IP Holding Company LLC | Retroactive identification of previously unknown malware based on network traffic analysis from a sandbox environment |
| US10379894B1 (en) * | 2016-09-27 | 2019-08-13 | Amazon Technologies, Inc. | Lineage-based trust for virtual machine images |
| US10250498B1 (en) | 2016-10-03 | 2019-04-02 | Sprint Communications Company L.P. | Session aggregator brokering of data stream communication |
| US10505970B2 (en) | 2016-10-05 | 2019-12-10 | Cisco Technology, Inc. | Identifying and using DNS contextual flows |
| IL248306B (en) | 2016-10-10 | 2019-12-31 | Verint Systems Ltd | System and method for creating data sets for learning to recognize user actions |
| US10133588B1 (en) | 2016-10-20 | 2018-11-20 | Palantir Technologies Inc. | Transforming instructions for collaborative updates |
| US10587580B2 (en) | 2016-10-26 | 2020-03-10 | Ping Identity Corporation | Methods and systems for API deception environment and API traffic control and security |
| US11811623B2 (en) | 2016-10-26 | 2023-11-07 | Zscaler, Inc. | Deep tracing of user experience |
| US10728113B2 (en) | 2016-10-26 | 2020-07-28 | Zscaler, Inc. | Systems and methods for troubleshooting and performance analysis of cloud based services |
| US10318630B1 (en) | 2016-11-21 | 2019-06-11 | Palantir Technologies Inc. | Analysis of large bodies of textual data |
| US10268825B2 (en) * | 2016-12-01 | 2019-04-23 | International Business Machines Corporation | Amalgamating code vulnerabilities across projects |
| US10484332B2 (en) * | 2016-12-02 | 2019-11-19 | Vmware, Inc. | Application based network traffic management |
| US10044836B2 (en) | 2016-12-19 | 2018-08-07 | Palantir Technologies Inc. | Conducting investigations under limited connectivity |
| US11658996B2 (en) * | 2016-12-30 | 2023-05-23 | British Telecommunications Public Limited Company | Historic data breach detection |
| WO2018122049A1 (en) | 2016-12-30 | 2018-07-05 | British Telecommunications Public Limited Company | Data breach detection |
| WO2018122051A1 (en) * | 2016-12-30 | 2018-07-05 | British Telecommunications Public Limited Company | Attack signature generation |
| US10216811B1 (en) | 2017-01-05 | 2019-02-26 | Palantir Technologies Inc. | Collaborating using different object models |
| US10623358B2 (en) * | 2017-02-14 | 2020-04-14 | International Business Machines Corporation | Facilitating message processing at a target endpoint |
| IL252041B (en) | 2017-04-30 | 2020-09-30 | Verint Systems Ltd | System and method for tracking computer application users |
| IL252037B (en) | 2017-04-30 | 2021-12-01 | Verint Systems Ltd | System and method for identifying relationships between computer application users |
| US11074277B1 (en) | 2017-05-01 | 2021-07-27 | Palantir Technologies Inc. | Secure resolution of canonical entities |
| US10855694B2 (en) * | 2017-05-30 | 2020-12-01 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Methods, systems, and computer readable media for monitoring encrypted packet flows within a virtual network environment |
| US10942947B2 (en) | 2017-07-17 | 2021-03-09 | Palantir Technologies Inc. | Systems and methods for determining relationships between datasets |
| US10783239B2 (en) * | 2017-08-01 | 2020-09-22 | Pc Matic, Inc. | System, method, and apparatus for computer security |
| US20220159036A1 (en) * | 2017-08-25 | 2022-05-19 | Red Hat, Inc. | Malicious packet filtering in a virtualization system |
| US10903985B2 (en) | 2017-08-25 | 2021-01-26 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques |
| US10992652B2 (en) | 2017-08-25 | 2021-04-27 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Methods, systems, and computer readable media for monitoring encrypted network traffic flows |
| US10348488B1 (en) | 2017-08-25 | 2019-07-09 | Sprint Communications Company L.P. | Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network |
| US10432648B1 (en) | 2017-08-28 | 2019-10-01 | Palo Alto Networks, Inc. | Automated malware family signature generation |
| US10645099B1 (en) * | 2017-09-01 | 2020-05-05 | Ca, Inc. | Malware detection facilitated by copying a memory range from an emulator for analysis and signature generation |
| EP3471007B1 (en) | 2017-10-13 | 2022-02-23 | Ping Identity Corporation | Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions |
| US10530788B1 (en) * | 2017-11-01 | 2020-01-07 | Trend Micro Incorporated | Detection and prevention of malicious remote file operations |
| US10956508B2 (en) | 2017-11-10 | 2021-03-23 | Palantir Technologies Inc. | Systems and methods for creating and managing a data integration workspace containing automatically updated data models |
| US10965654B2 (en) * | 2017-11-28 | 2021-03-30 | Viavi Solutions Inc. | Cross-interface correlation of traffic |
| US10693891B2 (en) | 2017-12-06 | 2020-06-23 | Chicago Mercantile Exchange Inc. | Electronic mail security system |
| US11061874B1 (en) | 2017-12-14 | 2021-07-13 | Palantir Technologies Inc. | Systems and methods for resolving entity data across various data structures |
| US10958668B1 (en) | 2017-12-21 | 2021-03-23 | Palo Alto Networks, Inc. | Finding malicious domains with DNS query pattern analysis |
| US10853352B1 (en) | 2017-12-21 | 2020-12-01 | Palantir Technologies Inc. | Structured data collection, presentation, validation and workflow management |
| IL256690B (en) | 2018-01-01 | 2022-02-01 | Cognyte Tech Israel Ltd | System and method for identifying pairs of related application users |
| GB201800595D0 (en) | 2018-01-15 | 2018-02-28 | Palantir Technologies Inc | Management of software bugs in a data processing system |
| EP3746926B1 (en) * | 2018-01-31 | 2025-12-03 | Palo Alto Networks, Inc. | Context profiling for malware detection |
| US10965697B2 (en) * | 2018-01-31 | 2021-03-30 | Micro Focus Llc | Indicating malware generated domain names using digits |
| US11159538B2 (en) | 2018-01-31 | 2021-10-26 | Palo Alto Networks, Inc. | Context for malware forensics and detection |
| US10764309B2 (en) | 2018-01-31 | 2020-09-01 | Palo Alto Networks, Inc. | Context profiling for malware detection |
| US11190487B2 (en) * | 2018-02-28 | 2021-11-30 | Palo Alto Networks, Inc. | Identifying security risks and enforcing policies on encrypted/encoded network communications |
| US11599369B1 (en) | 2018-03-08 | 2023-03-07 | Palantir Technologies Inc. | Graphical user interface configuration system |
| US11003773B1 (en) * | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
| US10771436B2 (en) | 2018-04-06 | 2020-09-08 | Cisco Technology, Inc. | Dynamic whitelist management |
| US10885021B1 (en) | 2018-05-02 | 2021-01-05 | Palantir Technologies Inc. | Interactive interpreter and graphical user interface |
| US10979326B2 (en) | 2018-05-11 | 2021-04-13 | Viavi Solutions Inc. | Detecting interference of a beam |
| US11061542B1 (en) | 2018-06-01 | 2021-07-13 | Palantir Technologies Inc. | Systems and methods for determining and displaying optimal associations of data items |
| US10445272B2 (en) * | 2018-07-05 | 2019-10-15 | Intel Corporation | Network function virtualization architecture with device isolation |
| US11157571B2 (en) | 2018-07-12 | 2021-10-26 | Bank Of America Corporation | External network system for extracting external website data using generated polymorphic data |
| JP7003864B2 (ja) * | 2018-07-24 | 2022-02-10 | 日本電信電話株式会社 | 振分装置、通信システムおよび振分方法 |
| IL260986B (en) | 2018-08-05 | 2021-09-30 | Verint Systems Ltd | A system and method for using a user action log to study encrypted traffic classification |
| US10893030B2 (en) | 2018-08-10 | 2021-01-12 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element |
| US10631263B2 (en) | 2018-09-14 | 2020-04-21 | Viavi Solutions Inc. | Geolocating a user equipment |
| CN109218315B (zh) * | 2018-09-20 | 2021-06-01 | 华为技术有限公司 | 一种安全管理方法和安全管理装置 |
| US11188622B2 (en) * | 2018-09-28 | 2021-11-30 | Daniel Chien | Systems and methods for computer security |
| CN110968862B (zh) * | 2018-09-29 | 2022-03-29 | 福建省天奕网络科技有限公司 | 一种数据异常检测方法及终端 |
| KR101990022B1 (ko) | 2018-11-28 | 2019-06-17 | 한국인터넷진흥원 | 악성코드에 감염된 디바이스를 포함하는 단말그룹에 대한 가상의 악성 트래픽 템플릿 생성 방법 및 그 장치 |
| CN113015972A (zh) * | 2018-11-29 | 2021-06-22 | 华为技术有限公司 | 恶意软件检测装置和方法 |
| US11070363B1 (en) | 2018-12-21 | 2021-07-20 | Mcafee, Llc | Sharing cryptographic session keys among a cluster of network security platforms monitoring network traffic flows |
| US11496475B2 (en) | 2019-01-04 | 2022-11-08 | Ping Identity Corporation | Methods and systems for data traffic based adaptive security |
| US12137023B2 (en) | 2019-02-25 | 2024-11-05 | Zscaler, Inc. | Automatic analysis of user experience issues to reduce resolution time |
| EP3942740A1 (en) | 2019-03-20 | 2022-01-26 | Verint Systems Ltd. | System and method for de-anonymizing actions and messages on networks |
| US11720291B2 (en) * | 2019-05-07 | 2023-08-08 | Citrix Systems, Inc. | Methods and systems for accessing remotely stored files using virtual applications |
| US11586728B2 (en) | 2019-06-07 | 2023-02-21 | Nxp B.V. | Methods for detecting system-level trojans and an integrated circuit device with system-level trojan detection |
| KR102089417B1 (ko) * | 2019-06-11 | 2020-03-17 | 한국인터넷진흥원 | 악성코드에 감염된 디바이스를 포함하는 단말그룹에 대한 가상의 악성 트래픽 템플릿 생성 방법 및 그 장치 |
| WO2021015941A1 (en) * | 2019-07-19 | 2021-01-28 | Palo Alto Networks, Inc. | Inline malware detection |
| US12353678B2 (en) | 2019-10-17 | 2025-07-08 | Palantir Technologies Inc. | Object-centric data analysis system and associated graphical user interfaces |
| TWI726449B (zh) * | 2019-10-18 | 2021-05-01 | 臺灣銀行股份有限公司 | 網路攻擊分析方法 |
| EP4046337A1 (en) | 2019-11-03 | 2022-08-24 | Cognyte Technologies Israel Ltd | System and method for identifying exchanges of encrypted communication traffic |
| JP7315023B2 (ja) * | 2019-11-28 | 2023-07-26 | 日本電信電話株式会社 | ルール生成装置およびルール生成プログラム |
| US12483565B2 (en) | 2019-12-18 | 2025-11-25 | Zscaler, Inc. | URL risk analysis using heuristics and scanning |
| US11829467B2 (en) | 2019-12-18 | 2023-11-28 | Zscaler, Inc. | Dynamic rules engine in a cloud-based sandbox |
| US11265346B2 (en) | 2019-12-19 | 2022-03-01 | Palo Alto Networks, Inc. | Large scale high-interactive honeypot farm |
| US11271907B2 (en) | 2019-12-19 | 2022-03-08 | Palo Alto Networks, Inc. | Smart proxy for a large scale high-interaction honeypot farm |
| US11190417B2 (en) | 2020-02-04 | 2021-11-30 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for processing network flow metadata at a network packet broker |
| US11698965B2 (en) | 2020-04-09 | 2023-07-11 | International Business Machines Corporation | Detection of encrypting malware attacks |
| US11263109B2 (en) | 2020-04-16 | 2022-03-01 | Bank Of America Corporation | Virtual environment system for validating executable data using accelerated time-based process execution |
| US11425123B2 (en) | 2020-04-16 | 2022-08-23 | Bank Of America Corporation | System for network isolation of affected computing systems using environment hash outputs |
| US11423160B2 (en) | 2020-04-16 | 2022-08-23 | Bank Of America Corporation | System for analysis and authorization for use of executable environment data in a computing system using hash outputs |
| US11481484B2 (en) | 2020-04-16 | 2022-10-25 | Bank Of America Corporation | Virtual environment system for secure execution of program code using cryptographic hashes |
| US11528276B2 (en) | 2020-04-16 | 2022-12-13 | Bank Of America Corporation | System for prevention of unauthorized access using authorized environment hash outputs |
| US11372982B2 (en) | 2020-07-02 | 2022-06-28 | Bank Of America Corporation | Centralized network environment for processing validated executable data based on authorized hash outputs |
| CN112180746A (zh) * | 2020-09-02 | 2021-01-05 | 珠海格力电器股份有限公司 | 基于网关的家居设备控制方法、装置、存储介质及网关 |
| US11847205B1 (en) | 2020-10-26 | 2023-12-19 | T-Mobile Innovations Llc | Trusted 5G network function virtualization of virtual network function elements embedded on a system-on-chip |
| US11785048B2 (en) | 2020-10-30 | 2023-10-10 | Palo Alto Networks, Inc. | Consistent monitoring and analytics for security insights for network and security functions for a security service |
| EP3993331B1 (en) * | 2020-10-30 | 2023-05-03 | Palo Alto Networks, Inc. | Flow metadata exchanges between network and security functions for a security service |
| US11363055B2 (en) | 2020-11-02 | 2022-06-14 | Bank Of America Corporation | System and methods for dynamic controlled evaluation of cloud service vulnerabilities |
| WO2022100889A1 (en) * | 2020-11-11 | 2022-05-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Content filtering support for protocols with encrypted domain name server |
| US12309194B2 (en) * | 2020-12-15 | 2025-05-20 | Nightwing Group, Llc | Systems and methods for evasive resiliency countermeasures |
| US11770319B2 (en) | 2021-01-14 | 2023-09-26 | Zscaler, Inc. | TCP traceroute using RST and SYN-ACK to determine destination reachability |
| US11425015B2 (en) | 2021-01-14 | 2022-08-23 | Zscaler, Inc. | Accurate differential traceroute latency calculation between hops |
| US11637766B2 (en) | 2021-01-14 | 2023-04-25 | Zscaler, Inc. | Detection of network hops and latency through an opaque tunnel and detection misconfiguration of tunnels |
| US11784904B2 (en) | 2021-01-14 | 2023-10-10 | Zscaler, Inc. | Adaptive tracing with a reduced number of probes to avoid firewall issues |
| US11758025B2 (en) | 2021-01-14 | 2023-09-12 | Zscaler, Inc. | Adaptive tracing using one of a plurality of protocols |
| US11949578B2 (en) | 2021-01-14 | 2024-04-02 | Zscaler, Inc. | Adaptive probing to discover a protocol for network tracing |
| US11811633B2 (en) | 2021-01-14 | 2023-11-07 | Zscaler, Inc. | Traceroutes through external proxies |
| US11863415B2 (en) | 2021-01-14 | 2024-01-02 | Zscaler, Inc. | Determining endpoint and application behavior for monitoring user experience |
| US11153190B1 (en) | 2021-01-21 | 2021-10-19 | Zscaler, Inc. | Metric computation for traceroute probes using cached data to prevent a surge on destination servers |
| US11671438B2 (en) | 2021-01-14 | 2023-06-06 | Zscaler, Inc. | Detection of latency, packet drops, and network hops through a tunnel by tracing hops therein |
| US11546240B2 (en) | 2021-03-01 | 2023-01-03 | Zscaler, Inc. | Proactively detecting failure points in a network |
| US11563665B2 (en) | 2021-03-05 | 2023-01-24 | Zscaler, Inc. | Detecting web probes versus regular traffic through a proxy including encrypted traffic |
| US11956212B2 (en) | 2021-03-31 | 2024-04-09 | Palo Alto Networks, Inc. | IoT device application workload capture |
| EP4315750A1 (en) * | 2021-04-09 | 2024-02-07 | Palo Alto Networks, Inc. | Increased coverage of application-based traffic classification with local and cloud classification services |
| US20220353279A1 (en) * | 2021-04-29 | 2022-11-03 | KnowBe4, Inc. | Systems and methods for determination of indicators of malicious elements within messages |
| US11895129B2 (en) * | 2021-06-29 | 2024-02-06 | Juniper Networks, Inc. | Detecting and blocking a malicious file early in transit on a network |
| US12430434B2 (en) * | 2021-07-30 | 2025-09-30 | Cloud Linux Software Inc. | Systems and methods for blocking malicious script execution based on generalized rules |
| US20230079612A1 (en) * | 2021-09-13 | 2023-03-16 | Paul Maszy | System and Method for Computer Security |
| US12212583B2 (en) | 2021-09-30 | 2025-01-28 | Palo Alto Networks, Inc. | IoT security event correlation |
| US12153676B2 (en) * | 2021-12-21 | 2024-11-26 | Palo Alto Networks, Inc. | Identification of .NET malware with “unmanaged imphash” |
| US12316651B2 (en) | 2022-04-26 | 2025-05-27 | Palo Alto Networks, Inc. | Detecting Microsoft .NET malware using machine learning on .NET structure |
| US12438785B2 (en) | 2022-06-01 | 2025-10-07 | Zscaler, Inc. | Advanced machine learning techniques for internet outage detection |
| US12028237B2 (en) | 2022-06-28 | 2024-07-02 | Zscaler, Inc. | Egress handling for networks with public internet protocol (IP) address |
| CN115146259A (zh) * | 2022-07-08 | 2022-10-04 | 北京安天网络安全技术有限公司 | 一种沙箱文件分析方法及装置 |
| CN115412472B (zh) * | 2022-08-30 | 2024-04-30 | 中国联合网络通信集团有限公司 | 网络故障的排查方法、装置及设备 |
| US12333008B2 (en) * | 2022-08-31 | 2025-06-17 | Crowdstrike, Inc. | Emulation-based malware detection |
| US20240195830A1 (en) * | 2022-12-09 | 2024-06-13 | Sophos Limited | Malicious application detection |
| US12493693B2 (en) | 2022-12-29 | 2025-12-09 | Acronis International Gmbh | Systems and methods for selecting client backup files for maliciousness analysis |
| US20240396910A1 (en) * | 2023-05-26 | 2024-11-28 | Palo Alto Networks, Inc. | Inline exploit detection via loose condition forwarding and cloud analysis |
Citations (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2002342106A (ja) * | 2001-04-29 | 2002-11-29 | Beijing Rising Technology Corp Ltd | 既知や未知のコンピュータウィルスの検索・駆除方法 |
| JP2003241989A (ja) * | 2002-02-15 | 2003-08-29 | Toshiba Corp | コンピュータウイルス発生検出装置、方法、およびプログラム |
| JP2004531780A (ja) * | 2000-06-22 | 2004-10-14 | マイクロソフト コーポレーション | 分散型コンピューティングサービスプラットフォーム |
| JP2004302538A (ja) * | 2003-03-28 | 2004-10-28 | Meiji Univ | ネットワークセキュリティシステム及びネットワークセキュリティ管理方法 |
| US20080133540A1 (en) * | 2006-12-01 | 2008-06-05 | Websense, Inc. | System and method of analyzing web addresses |
| US20090282483A1 (en) * | 2008-05-12 | 2009-11-12 | Bennett James D | Server based malware screening |
| WO2009158239A1 (en) * | 2008-06-23 | 2009-12-30 | Symantec Corporation | Methods and systems for determining file classifications |
| US20100077481A1 (en) * | 2008-09-22 | 2010-03-25 | Microsoft Corporation | Collecting and analyzing malware data |
| JP2010198054A (ja) * | 2009-02-23 | 2010-09-09 | National Institute Of Information & Communication Technology | コンピュータ検査システム、コンピュータ検査方法 |
| JP2011013917A (ja) * | 2009-07-01 | 2011-01-20 | Nippon Telegr & Teleph Corp <Ntt> | 解析システム、解析方法、及び解析プログラム |
| US20110078794A1 (en) * | 2009-09-30 | 2011-03-31 | Jayaraman Manni | Network-Based Binary File Extraction and Analysis for Malware Detection |
Family Cites Families (105)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5440719A (en) | 1992-10-27 | 1995-08-08 | Cadence Design Systems, Inc. | Method simulating data traffic on network in accordance with a client/sewer paradigm |
| US6147993A (en) | 1997-10-14 | 2000-11-14 | Cisco Technology, Inc. | Method and apparatus for implementing forwarding decision shortcuts at a network switch |
| US6728885B1 (en) | 1998-10-09 | 2004-04-27 | Networks Associates Technology, Inc. | System and method for network access control using adaptive proxies |
| US7107612B1 (en) | 1999-04-01 | 2006-09-12 | Juniper Networks, Inc. | Method, apparatus and computer program product for a network firewall |
| US6701432B1 (en) | 1999-04-01 | 2004-03-02 | Netscreen Technologies, Inc. | Firewall including local bus |
| US6553028B1 (en) | 1999-04-30 | 2003-04-22 | Cisco Technology, Inc. | Method and apparatus for multicast switching using a centralized switching engine |
| US6944774B2 (en) | 1999-06-18 | 2005-09-13 | Zoom Telephonics, Inc. | Data flow control unit |
| US7436830B2 (en) | 2000-04-03 | 2008-10-14 | P-Cube Ltd. | Method and apparatus for wire-speed application layer classification of upstream and downstream data packets |
| US7716367B1 (en) * | 2000-07-20 | 2010-05-11 | Akamai Technologies, Inc. | Network performance monitoring in a content delivery service |
| JP3739260B2 (ja) | 2000-08-24 | 2006-01-25 | 株式会社日立製作所 | 情報配信システムおよびゲートウェイ装置 |
| US7089294B1 (en) | 2000-08-24 | 2006-08-08 | International Business Machines Corporation | Methods, systems and computer program products for server based type of service classification of a communication request |
| US20020120720A1 (en) * | 2000-09-01 | 2002-08-29 | Ian Moir | Method and system to pre-compile configuration information for a data communications device |
| US7277950B1 (en) * | 2000-12-29 | 2007-10-02 | Swarmcast, Inc. | Packet transfer mechanism over a peer to peer network |
| US6912592B2 (en) | 2001-01-05 | 2005-06-28 | Extreme Networks, Inc. | Method and system of aggregate multiple VLANs in a metropolitan area network |
| US7093280B2 (en) | 2001-03-30 | 2006-08-15 | Juniper Networks, Inc. | Internet security system |
| US7657419B2 (en) * | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
| US7747943B2 (en) | 2001-09-07 | 2010-06-29 | Microsoft Corporation | Robust anchoring of annotations to content |
| US7302700B2 (en) | 2001-09-28 | 2007-11-27 | Juniper Networks, Inc. | Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device |
| US7123581B2 (en) | 2001-10-09 | 2006-10-17 | Tellabs Operations, Inc. | Method and apparatus to switch data flows using parallel switch fabrics |
| DE60222581T2 (de) * | 2001-11-30 | 2008-06-19 | British Telecommunications Public Ltd. Co. | Datenübertragung |
| US7650634B2 (en) | 2002-02-08 | 2010-01-19 | Juniper Networks, Inc. | Intelligent integrated network security device |
| US7734752B2 (en) | 2002-02-08 | 2010-06-08 | Juniper Networks, Inc. | Intelligent integrated network security device for high-availability applications |
| US7376125B1 (en) | 2002-06-04 | 2008-05-20 | Fortinet, Inc. | Service processing switch |
| US7177311B1 (en) | 2002-06-04 | 2007-02-13 | Fortinet, Inc. | System and method for routing traffic through a virtual router-based network switch |
| US8788650B1 (en) | 2002-07-19 | 2014-07-22 | Fortinet, Inc. | Hardware based detection devices for detecting network traffic content and methods of using the same |
| US7454499B2 (en) | 2002-11-07 | 2008-11-18 | Tippingpoint Technologies, Inc. | Active network defense system and method |
| US20060098649A1 (en) | 2004-11-10 | 2006-05-11 | Trusted Network Technologies, Inc. | System, apparatuses, methods, and computer-readable media for determining security realm identity before permitting network connection |
| GB0227614D0 (en) | 2002-11-27 | 2002-12-31 | 3Com Corp | Packet-switched network and network switches having a network layer forwarding by data link switching |
| US20050216770A1 (en) | 2003-01-24 | 2005-09-29 | Mistletoe Technologies, Inc. | Intrusion detection system |
| US7155572B2 (en) | 2003-01-27 | 2006-12-26 | Advanced Micro Devices, Inc. | Method and apparatus for injecting write data into a cache |
| US7627817B2 (en) | 2003-02-21 | 2009-12-01 | Motionpoint Corporation | Analyzing web site for translation |
| US7305708B2 (en) | 2003-04-14 | 2007-12-04 | Sourcefire, Inc. | Methods and systems for intrusion detection |
| US7735144B2 (en) | 2003-05-16 | 2010-06-08 | Adobe Systems Incorporated | Document modification detection and prevention |
| JP4020018B2 (ja) | 2003-05-29 | 2007-12-12 | Kddi株式会社 | パケット情報識別方法及びシステム |
| US7272746B2 (en) | 2003-08-29 | 2007-09-18 | Audiocodes Texas, Inc. | Redundancy scheme for network processing systems |
| US7415719B2 (en) * | 2003-09-26 | 2008-08-19 | Tizor Systems, Inc. | Policy specification framework for insider intrusions |
| US8301702B2 (en) * | 2004-01-20 | 2012-10-30 | Cloudmark, Inc. | Method and an apparatus to screen electronic communications |
| KR100609170B1 (ko) | 2004-02-13 | 2006-08-02 | 엘지엔시스(주) | 네트워크 보안 시스템 및 그 동작 방법 |
| US20050203919A1 (en) | 2004-03-09 | 2005-09-15 | Deutsch L. P. | Method and apparatus for reordering an arbitrary order signal sequence into a streamable signal sequence |
| FR2868230B1 (fr) | 2004-03-25 | 2012-06-08 | Netasq | Dispositif et procede de detection et de prevention d'intrusion dans un reseau informatique |
| US8549638B2 (en) * | 2004-06-14 | 2013-10-01 | Fireeye, Inc. | System and method of containing computer worms |
| US8171553B2 (en) * | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
| US9027135B1 (en) * | 2004-04-01 | 2015-05-05 | Fireeye, Inc. | Prospective client identification using malware attack detection |
| US8566946B1 (en) * | 2006-04-20 | 2013-10-22 | Fireeye, Inc. | Malware containment on connection |
| US8375444B2 (en) * | 2006-04-20 | 2013-02-12 | Fireeye, Inc. | Dynamic signature creation and enforcement |
| US20050257263A1 (en) | 2004-05-13 | 2005-11-17 | International Business Machines Corporation | Andromeda strain hacker analysis system and method |
| EP1630710B1 (en) * | 2004-07-21 | 2019-11-06 | Microsoft Technology Licensing, LLC | Containment of worms |
| GB2418110B (en) | 2004-09-14 | 2006-09-06 | 3Com Corp | Method and apparatus for controlling traffic between different entities on a network |
| DE102004048167B4 (de) | 2004-10-02 | 2007-01-04 | Siemens Ag | Verfahren zur inhaltsbezogenen Handhabung eines Datenstroms |
| WO2006046896A1 (en) | 2004-10-29 | 2006-05-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and nodes in a communication system for controlling the use of access resources |
| US7447796B2 (en) | 2004-12-17 | 2008-11-04 | International Business Machines Corporation | System, method and program product to route message packets |
| US7894432B2 (en) | 2005-04-09 | 2011-02-22 | Audiocodes, Inc. | Apparatus and method creating virtual routing domains in an internet protocol network |
| US7606147B2 (en) | 2005-04-13 | 2009-10-20 | Zeugma Systems Inc. | Application aware traffic shaping service node positioned between the access and core networks |
| GB2427048A (en) | 2005-06-09 | 2006-12-13 | Avecho Group Ltd | Detection of unwanted code or data in electronic mail |
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US7784094B2 (en) | 2005-06-30 | 2010-08-24 | Intel Corporation | Stateful packet content matching mechanisms |
| US7746862B1 (en) | 2005-08-02 | 2010-06-29 | Juniper Networks, Inc. | Packet processing in a multiple processor system |
| US7486673B2 (en) | 2005-08-29 | 2009-02-03 | Connect Technologies Corporation | Method and system for reassembling packets prior to searching |
| US20070056038A1 (en) | 2005-09-06 | 2007-03-08 | Lok Technology, Inc. | Fusion instrusion protection system |
| US8270413B2 (en) | 2005-11-28 | 2012-09-18 | Cisco Technology, Inc. | Method and apparatus for self-learning of VPNS from combination of unidirectional tunnels in MPLS/VPN networks |
| KR100791290B1 (ko) | 2006-02-10 | 2008-01-04 | 삼성전자주식회사 | 디바이스 간에 악성 어플리케이션의 행위 정보를 사용하는장치 및 방법 |
| US7580974B2 (en) | 2006-02-16 | 2009-08-25 | Fortinet, Inc. | Systems and methods for content type classification |
| WO2007100916A2 (en) * | 2006-02-28 | 2007-09-07 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media for outputting a dataset based upon anomaly detection |
| US8763103B2 (en) * | 2006-04-21 | 2014-06-24 | The Trustees Of Columbia University In The City Of New York | Systems and methods for inhibiting attacks on applications |
| US8488136B2 (en) | 2006-05-12 | 2013-07-16 | Kyocera Document Solutions Inc. | Printing system and method, and recording medium |
| US20140373144A9 (en) * | 2006-05-22 | 2014-12-18 | Alen Capalik | System and method for analyzing unauthorized intrusion into a computer network |
| JP4290179B2 (ja) | 2006-06-15 | 2009-07-01 | キヤノン株式会社 | 署名検証装置、及び、その制御方法、プログラム、記憶媒体 |
| US8009566B2 (en) | 2006-06-26 | 2011-08-30 | Palo Alto Networks, Inc. | Packet classification in a network security device |
| US8151352B1 (en) * | 2006-07-14 | 2012-04-03 | Bitdefender IPR Managament Ltd. | Anti-malware emulation systems and methods |
| US20080025307A1 (en) | 2006-07-27 | 2008-01-31 | Research In Motion Limited | System and method for pushing information from a source device to an available destination device |
| US20080183691A1 (en) | 2007-01-30 | 2008-07-31 | International Business Machines Corporation | Method for a networked knowledge based document retrieval and ranking utilizing extracted document metadata and content |
| WO2008098260A1 (en) | 2007-02-09 | 2008-08-14 | Smobile Systems, Inc. | Off-line mms malware scanning system and method |
| US9021590B2 (en) | 2007-02-28 | 2015-04-28 | Microsoft Technology Licensing, Llc | Spyware detection mechanism |
| US20080231885A1 (en) | 2007-03-23 | 2008-09-25 | Konica Minolta Systems Laboratory, Inc. | Direct printing method using ram storage for spooled printer files |
| US20080222729A1 (en) * | 2007-03-05 | 2008-09-11 | Songqing Chen | Containment of Unknown and Polymorphic Fast Spreading Worms |
| US8594085B2 (en) | 2007-04-11 | 2013-11-26 | Palo Alto Networks, Inc. | L2/L3 multi-mode switch including policy processing |
| US8875272B2 (en) | 2007-05-15 | 2014-10-28 | International Business Machines Corporation | Firewall for controlling connections between a client machine and a network |
| US8402529B1 (en) * | 2007-05-30 | 2013-03-19 | M86 Security, Inc. | Preventing propagation of malicious software during execution in a virtual machine |
| US20090238071A1 (en) | 2008-03-20 | 2009-09-24 | Embarq Holdings Company, Llc | System, method and apparatus for prioritizing network traffic using deep packet inspection (DPI) and centralized network controller |
| US20090013405A1 (en) | 2007-07-06 | 2009-01-08 | Messagelabs Limited | Heuristic detection of malicious code |
| US20090031135A1 (en) * | 2007-07-27 | 2009-01-29 | Raghunathan Kothandaraman | Tamper Proof Seal For An Electronic Document |
| US7706291B2 (en) | 2007-08-01 | 2010-04-27 | Zeugma Systems Inc. | Monitoring quality of experience on a per subscriber, per session basis |
| BRPI0815605B1 (pt) * | 2007-08-06 | 2020-09-15 | Bernard De Monseignat | Método para a comunicação de dados usando um dispositivo de computação; método para gerar uma segunda versão de um componente de comunicação de dados usando um dispositivo de computação; método para comunicação de dados usando um dispositivo de computação; método para a criação de um certificado usando um dispositivo de computação; e método para usar um certificado utilizando um dispositivo de computação |
| US20090064337A1 (en) | 2007-09-05 | 2009-03-05 | Shih-Wei Chien | Method and apparatus for preventing web page attacks |
| US8176477B2 (en) * | 2007-09-14 | 2012-05-08 | International Business Machines Corporation | Method, system and program product for optimizing emulation of a suspected malware |
| US7620992B2 (en) * | 2007-10-02 | 2009-11-17 | Kaspersky Lab Zao | System and method for detecting multi-component malware |
| US8019700B2 (en) * | 2007-10-05 | 2011-09-13 | Google Inc. | Detecting an intrusive landing page |
| US9100268B2 (en) | 2008-02-27 | 2015-08-04 | Alcatel Lucent | Application-aware MPLS tunnel selection |
| US8370932B2 (en) * | 2008-09-23 | 2013-02-05 | Webroot Inc. | Method and apparatus for detecting malware in network traffic |
| US8176556B1 (en) | 2008-10-31 | 2012-05-08 | Symantec Corporation | Methods and systems for tracing web-based attacks |
| US8850571B2 (en) * | 2008-11-03 | 2014-09-30 | Fireeye, Inc. | Systems and methods for detecting malicious network content |
| US8997219B2 (en) | 2008-11-03 | 2015-03-31 | Fireeye, Inc. | Systems and methods for detecting malicious PDF network content |
| US8413239B2 (en) | 2009-02-22 | 2013-04-02 | Zscaler, Inc. | Web security via response injection |
| US8307351B2 (en) | 2009-03-18 | 2012-11-06 | Oracle International Corporation | System and method for performing code provenance review in a software due diligence system |
| US20110035804A1 (en) * | 2009-04-07 | 2011-02-10 | Pratyush Moghe | Appliance-based parallelized analytics of data auditing events |
| US8683584B1 (en) * | 2009-04-25 | 2014-03-25 | Dasient, Inc. | Risk assessment |
| US20110041179A1 (en) | 2009-08-11 | 2011-02-17 | F-Secure Oyj | Malware detection |
| US20110154493A1 (en) * | 2009-12-18 | 2011-06-23 | Assured Information Security, Inc. | Methods for inspecting data and devices thereof |
| CN101841523B (zh) * | 2010-02-05 | 2013-05-22 | 中国科学院计算技术研究所 | 检测恶意代码样本的网络行为的方法及系统 |
| US8813232B2 (en) * | 2010-03-04 | 2014-08-19 | Mcafee Inc. | Systems and methods for risk rating and pro-actively detecting malicious online ads |
| US8863279B2 (en) * | 2010-03-08 | 2014-10-14 | Raytheon Company | System and method for malware detection |
| CN102986189B (zh) * | 2010-05-09 | 2016-04-27 | 思杰系统有限公司 | 用于为对应于虚通道的网络连接分配服务等级的系统和方法 |
| US8510829B2 (en) | 2010-06-24 | 2013-08-13 | Mcafee, Inc. | Systems and methods to detect malicious media files |
| US8463797B2 (en) | 2010-07-20 | 2013-06-11 | Barracuda Networks Inc. | Method for measuring similarity of diverse binary objects comprising bit patterns |
| US8621629B2 (en) * | 2010-08-31 | 2013-12-31 | General Electric Company | System, method, and computer software code for detecting a computer network intrusion in an infrastructure element of a high value target |
-
2011
- 2011-05-24 US US13/115,032 patent/US9047441B2/en active Active
-
2012
- 2012-05-17 AU AU2012259113A patent/AU2012259113B2/en active Active
- 2012-05-17 EP EP12789167.9A patent/EP2715540B1/en active Active
- 2012-05-17 CN CN201280036352.1A patent/CN103842965B/zh active Active
- 2012-05-17 CN CN201710778943.0A patent/CN107526965A/zh active Pending
- 2012-05-17 WO PCT/US2012/038439 patent/WO2012162102A1/en not_active Ceased
- 2012-05-17 JP JP2014512893A patent/JP2014519113A/ja active Pending
- 2012-05-17 CA CA2835954A patent/CA2835954C/en active Active
-
2013
- 2013-11-21 IL IL229531A patent/IL229531A/en active IP Right Grant
-
2015
- 2015-04-21 US US14/692,587 patent/US9491142B2/en active Active
-
2016
- 2016-03-09 JP JP2016045104A patent/JP6106780B2/ja active Active
-
2017
- 2017-11-16 IL IL255724A patent/IL255724B/en active IP Right Grant
Patent Citations (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2004531780A (ja) * | 2000-06-22 | 2004-10-14 | マイクロソフト コーポレーション | 分散型コンピューティングサービスプラットフォーム |
| JP2002342106A (ja) * | 2001-04-29 | 2002-11-29 | Beijing Rising Technology Corp Ltd | 既知や未知のコンピュータウィルスの検索・駆除方法 |
| JP2003241989A (ja) * | 2002-02-15 | 2003-08-29 | Toshiba Corp | コンピュータウイルス発生検出装置、方法、およびプログラム |
| JP2004302538A (ja) * | 2003-03-28 | 2004-10-28 | Meiji Univ | ネットワークセキュリティシステム及びネットワークセキュリティ管理方法 |
| US20080133540A1 (en) * | 2006-12-01 | 2008-06-05 | Websense, Inc. | System and method of analyzing web addresses |
| US20090282483A1 (en) * | 2008-05-12 | 2009-11-12 | Bennett James D | Server based malware screening |
| WO2009158239A1 (en) * | 2008-06-23 | 2009-12-30 | Symantec Corporation | Methods and systems for determining file classifications |
| US20100077481A1 (en) * | 2008-09-22 | 2010-03-25 | Microsoft Corporation | Collecting and analyzing malware data |
| JP2010198054A (ja) * | 2009-02-23 | 2010-09-09 | National Institute Of Information & Communication Technology | コンピュータ検査システム、コンピュータ検査方法 |
| JP2011013917A (ja) * | 2009-07-01 | 2011-01-20 | Nippon Telegr & Teleph Corp <Ntt> | 解析システム、解析方法、及び解析プログラム |
| US20110078794A1 (en) * | 2009-09-30 | 2011-03-31 | Jayaraman Manni | Network-Based Binary File Extraction and Analysis for Malware Detection |
Non-Patent Citations (4)
| Title |
|---|
| CSNG200500084016; 神薗 雅紀: '仮想ネットワークを使った未知ウィルス検知システムの考察' コンピュータセキュリティシンポジウム2003 第2003巻, 20031029, 109〜114頁, 社団法人情報処理学会 * |
| JPN6015002693; 神薗 雅紀: '仮想ネットワークを使った未知ウィルス検知システムの考察' コンピュータセキュリティシンポジウム2003 第2003巻, 20031029, 109〜114頁, 社団法人情報処理学会 * |
| JPN6015019418; 宗像 誠之: '徹底取材 企業向けウイルス対策ソフト 仮想化環境での負荷7割減 クラウド連携で新種に強く' 日経コンピュータ no.776 NIKKEI COMPUTER , 20110217, pp.108-111, 日経BP社 Nikkei Business Publications,Inc. * |
| JPN6015019420; 小松 優介 Yusuke KOMATSU: 'マルウェアと戦う技術' 情報処理 第51巻 第3号 , 20100315, pp.261-269, 社団法人情報処理学会 Information Processing Socie * |
Cited By (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10482240B2 (en) | 2015-01-29 | 2019-11-19 | Nec Corporation | Anti-malware device, anti-malware system, anti-malware method, and recording medium in which anti-malware program is stored |
| US11363035B2 (en) | 2015-05-22 | 2022-06-14 | Fisher-Rosemount Systems, Inc. | Configurable robustness agent in a plant security system |
| JP2016220213A (ja) * | 2015-05-22 | 2016-12-22 | フィッシャー−ローズマウント システムズ,インコーポレイテッド | プラントセキュリティシステムにおける構成可能なロバスト性エージェント |
| JP2016224506A (ja) * | 2015-05-27 | 2016-12-28 | 西日本電信電話株式会社 | 情報流出検出装置、情報流出検出システム、及び情報流出検出プログラム |
| JP2017021773A (ja) * | 2015-06-30 | 2017-01-26 | エーオー カスペルスキー ラボAO Kaspersky Lab | 望ましくないプログラムのインストール及び実行を予防するシステム及び方法 |
| JP2017016631A (ja) * | 2015-07-06 | 2017-01-19 | エーオー カスペルスキー ラボAO Kaspersky Lab | 脆弱なアプリケーションによるファイルのオープンを制御するシステム及び方法。 |
| JP2017033531A (ja) * | 2015-08-04 | 2017-02-09 | エーオー カスペルスキー ラボAO Kaspersky Lab | 専用のコンピュータセキュリティサービスを利用するシステムおよび方法 |
| JP2018533793A (ja) * | 2015-11-04 | 2018-11-15 | ビットディフェンダー アイピーアール マネジメント リミテッド | ドメイン生成アルゴリズム(dga)のマルウェアを検出するためのシステムおよび方法 |
| US10761840B2 (en) | 2015-11-30 | 2020-09-01 | Nec Corporation | Software analysis device, software analysis method, and recording medium |
| DE112017001052T5 (de) | 2016-02-29 | 2018-11-29 | Panasonic Intellectual Property Management Co., Ltd. | Erkennungssystem, Webanwendungsvorrichtung, Webanwendungs-Firewallvorrichtung, Erkennungsverfahren für Erkennungssystem, Erkennungsverfahren für Webanwendungsvorrichtung und Erkennungsverfahren für Webanwendungs-Firewallvorrichtung |
| US11494492B2 (en) | 2016-04-26 | 2022-11-08 | Nec Corporation | Program analysis system, program analysis method and storage medium |
| US10891379B2 (en) | 2016-04-26 | 2021-01-12 | Nec Corporation | Program analysis system, program analysis method and storage medium |
| WO2018079424A1 (ja) * | 2016-10-24 | 2018-05-03 | パナソニックIpマネジメント株式会社 | 製品の製造システム、マルウェア検知システム、製品の製造方法及びマルウェア検知方法 |
| JP7054824B2 (ja) | 2016-10-24 | 2022-04-15 | パナソニックIpマネジメント株式会社 | 製品の製造システム、マルウェア検知システム、製品の製造方法及びマルウェア検知方法 |
| JPWO2018079424A1 (ja) * | 2016-10-24 | 2019-09-19 | パナソニックIpマネジメント株式会社 | 製品の製造システム、マルウェア検知システム、製品の製造方法及びマルウェア検知方法 |
| JP2023524619A (ja) * | 2020-02-28 | 2023-06-13 | ダークトレース ホールディングス リミテッド | 関心度に基づいてデータ・フローを異なって取り扱うこと |
| JP7673082B2 (ja) | 2020-02-28 | 2025-05-08 | ダークトレース ホールディングス リミテッド | 関心度に基づいてデータ・フローを異なって取り扱うこと |
| JPWO2023112376A1 (enExample) * | 2021-12-17 | 2023-06-22 | ||
| WO2023112376A1 (ja) * | 2021-12-17 | 2023-06-22 | パナソニックIpマネジメント株式会社 | セキュリティ対策方法、及び、セキュリティ対策システム |
| JP7640746B2 (ja) | 2021-12-17 | 2025-03-05 | パナソニックオートモーティブシステムズ株式会社 | セキュリティ対策方法、及び、セキュリティ対策システム |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2012162102A1 (en) | 2012-11-29 |
| IL255724B (en) | 2019-08-29 |
| JP6106780B2 (ja) | 2017-04-05 |
| US20120304244A1 (en) | 2012-11-29 |
| AU2012259113B2 (en) | 2015-12-03 |
| IL255724A (en) | 2018-01-31 |
| CN103842965B (zh) | 2017-09-08 |
| US20150319136A1 (en) | 2015-11-05 |
| US9047441B2 (en) | 2015-06-02 |
| CN107526965A (zh) | 2017-12-29 |
| EP2715540A4 (en) | 2014-10-01 |
| IL229531A (en) | 2017-11-30 |
| US9491142B2 (en) | 2016-11-08 |
| EP2715540A1 (en) | 2014-04-09 |
| CA2835954C (en) | 2017-09-12 |
| CA2835954A1 (en) | 2012-11-29 |
| CN103842965A (zh) | 2014-06-04 |
| IL229531A0 (en) | 2014-01-30 |
| EP2715540B1 (en) | 2019-01-02 |
| JP2016146192A (ja) | 2016-08-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6106780B2 (ja) | マルウェア解析システム | |
| US12003485B2 (en) | Outbound/inbound lateral traffic punting based on process risk | |
| US10305927B2 (en) | Sinkholing bad network domains by registering the bad network domains on the internet | |
| US11128656B2 (en) | Selective sinkholing of malware domains by a security device via DNS poisoning | |
| US10855656B2 (en) | Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation | |
| AU2012259113A1 (en) | Malware analysis system | |
| US20180352004A1 (en) | Policy enforcement using host information profile | |
| US12323389B2 (en) | Beacon and threat intelligence based APT detection | |
| CN111295640B (zh) | 使用会话app id和端点进程id相关性的精细粒度防火墙策略实施 | |
| US12464012B2 (en) | Cobalt strike beacon https C2 heuristic detection | |
| US12107826B2 (en) | Cobalt Strike Beacon HTTP C2 heuristic detection | |
| US20250039193A1 (en) | Intrusion prevention based on infection chains | |
| US12294609B2 (en) | Probing for Cobalt Strike teamserver detection | |
| EP4562816B1 (en) | Cobalt strike beacon http c2 heuristic detection |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20141226 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150127 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20150324 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20150420 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150519 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20150811 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20151117 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160309 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A821 Effective date: 20160309 |
|
| A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20160331 |
|
| A912 | Re-examination (zenchi) completed and case transferred to appeal board |
Free format text: JAPANESE INTERMEDIATE CODE: A912 Effective date: 20160422 |