JP2018506808A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2018506808A5 JP2018506808A5 JP2017545854A JP2017545854A JP2018506808A5 JP 2018506808 A5 JP2018506808 A5 JP 2018506808A5 JP 2017545854 A JP2017545854 A JP 2017545854A JP 2017545854 A JP2017545854 A JP 2017545854A JP 2018506808 A5 JP2018506808 A5 JP 2018506808A5
- Authority
- JP
- Japan
- Prior art keywords
- content
- characterization
- network
- analyzers
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 21
- 238000012512 characterization method Methods 0.000 claims 19
- 238000010801 machine learning Methods 0.000 claims 6
- 238000012800 visualization Methods 0.000 claims 2
- 238000013468 resource allocation Methods 0.000 claims 1
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2021117274A JP7274535B2 (ja) | 2014-11-21 | 2021-07-15 | ネットワークデータ特性評価のシステムと方法 |
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201462083090P | 2014-11-21 | 2014-11-21 | |
| US62/083,090 | 2014-11-21 | ||
| PCT/US2015/060820 WO2016081346A1 (en) | 2014-11-21 | 2015-11-16 | System and method for network data characterization |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2021117274A Division JP7274535B2 (ja) | 2014-11-21 | 2021-07-15 | ネットワークデータ特性評価のシステムと方法 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2018506808A JP2018506808A (ja) | 2018-03-08 |
| JP2018506808A5 true JP2018506808A5 (enExample) | 2018-09-13 |
| JP6916112B2 JP6916112B2 (ja) | 2021-08-11 |
Family
ID=54754783
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2017545854A Active JP6916112B2 (ja) | 2014-11-21 | 2015-11-16 | ネットワークデータ特性評価のシステムと方法 |
| JP2021117274A Active JP7274535B2 (ja) | 2014-11-21 | 2021-07-15 | ネットワークデータ特性評価のシステムと方法 |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2021117274A Active JP7274535B2 (ja) | 2014-11-21 | 2021-07-15 | ネットワークデータ特性評価のシステムと方法 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US9832216B2 (enExample) |
| EP (1) | EP3222024A1 (enExample) |
| JP (2) | JP6916112B2 (enExample) |
| WO (1) | WO2016081346A1 (enExample) |
Families Citing this family (63)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10902114B1 (en) * | 2015-09-09 | 2021-01-26 | ThreatQuotient, Inc. | Automated cybersecurity threat detection with aggregation and analysis |
| RU2634211C1 (ru) | 2016-07-06 | 2017-10-24 | Общество с ограниченной ответственностью "Траст" | Способ и система анализа протоколов взаимодействия вредоносных программ с центрами управления и выявления компьютерных атак |
| US10701086B1 (en) * | 2016-07-28 | 2020-06-30 | SlashNext, Inc. | Methods and systems for detecting malicious servers |
| RU2649793C2 (ru) | 2016-08-03 | 2018-04-04 | ООО "Группа АйБи" | Способ и система выявления удаленного подключения при работе на страницах веб-ресурса |
| RU2634209C1 (ru) | 2016-09-19 | 2017-10-24 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Система и способ автогенерации решающих правил для систем обнаружения вторжений с обратной связью |
| AU2016427778B2 (en) * | 2016-10-24 | 2022-03-10 | Certis Cisco Security Pte Ltd | Quantitative unified analytic neural networks |
| US10354173B2 (en) * | 2016-11-21 | 2019-07-16 | Cylance Inc. | Icon based malware detection |
| US10367703B2 (en) * | 2016-12-01 | 2019-07-30 | Gigamon Inc. | Analysis of network traffic rules at a network visibility node |
| RU2637477C1 (ru) | 2016-12-29 | 2017-12-04 | Общество с ограниченной ответственностью "Траст" | Система и способ обнаружения фишинговых веб-страниц |
| RU2671991C2 (ru) | 2016-12-29 | 2018-11-08 | Общество с ограниченной ответственностью "Траст" | Система и способ сбора информации для обнаружения фишинга |
| US20180205611A1 (en) * | 2017-01-13 | 2018-07-19 | Gigamon Inc. | Network enumeration at a network visibility node |
| US10764313B1 (en) * | 2017-01-24 | 2020-09-01 | SlashNext, Inc. | Method and system for protection against network-based cyber threats |
| US20180255099A1 (en) * | 2017-03-02 | 2018-09-06 | Microsoft Technology Licensing, Llc | Security and compliance alerts based on content, activities, and metadata in cloud |
| US11615326B2 (en) | 2017-03-05 | 2023-03-28 | Cyberint Technologies Ltd. | Digital MDR (managed detection and response) analysis |
| US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
| EP3602377A1 (en) | 2017-03-30 | 2020-02-05 | McAfee, LLC | Secure software defined storage |
| US10848397B1 (en) * | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
| US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
| US10419377B2 (en) * | 2017-05-31 | 2019-09-17 | Apple Inc. | Method and system for categorizing instant messages |
| EP3477522B1 (en) * | 2017-10-30 | 2020-12-09 | VirusTotal SLU | Scanning files using antivirus software |
| RU2689816C2 (ru) | 2017-11-21 | 2019-05-29 | ООО "Группа АйБи" | Способ для классифицирования последовательности действий пользователя (варианты) |
| US10567156B2 (en) | 2017-11-30 | 2020-02-18 | Bank Of America Corporation | Blockchain-based unexpected data detection |
| US10735272B1 (en) | 2017-12-08 | 2020-08-04 | Logichub, Inc. | Graphical user interface for security intelligence automation platform using flows |
| US10666666B1 (en) * | 2017-12-08 | 2020-05-26 | Logichub, Inc. | Security intelligence automation platform using flows |
| RU2677361C1 (ru) | 2018-01-17 | 2019-01-16 | Общество с ограниченной ответственностью "Траст" | Способ и система децентрализованной идентификации вредоносных программ |
| RU2677368C1 (ru) | 2018-01-17 | 2019-01-16 | Общество С Ограниченной Ответственностью "Группа Айби" | Способ и система для автоматического определения нечетких дубликатов видеоконтента |
| RU2676247C1 (ru) | 2018-01-17 | 2018-12-26 | Общество С Ограниченной Ответственностью "Группа Айби" | Способ и компьютерное устройство для кластеризации веб-ресурсов |
| RU2668710C1 (ru) | 2018-01-17 | 2018-10-02 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Вычислительное устройство и способ для обнаружения вредоносных доменных имен в сетевом трафике |
| RU2680736C1 (ru) | 2018-01-17 | 2019-02-26 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Сервер и способ для определения вредоносных файлов в сетевом трафике |
| US10805341B2 (en) | 2018-02-06 | 2020-10-13 | Cisco Technology, Inc. | Leveraging point inferences on HTTP transactions for HTTPS malware detection |
| RU2681699C1 (ru) | 2018-02-13 | 2019-03-12 | Общество с ограниченной ответственностью "Траст" | Способ и сервер для поиска связанных сетевых ресурсов |
| US11290479B2 (en) * | 2018-08-11 | 2022-03-29 | Rapid7, Inc. | Determining insights in an electronic environment |
| US11641406B2 (en) * | 2018-10-17 | 2023-05-02 | Servicenow, Inc. | Identifying applications with machine learning |
| KR102175950B1 (ko) * | 2018-12-10 | 2020-11-09 | 한국전자통신연구원 | 이기종 시스템의 보안정보 정규화 장치 및 방법 |
| RU2708508C1 (ru) | 2018-12-17 | 2019-12-09 | Общество с ограниченной ответственностью "Траст" | Способ и вычислительное устройство для выявления подозрительных пользователей в системах обмена сообщениями |
| US20220035910A1 (en) * | 2018-12-19 | 2022-02-03 | Hewlett-Packard Development Company, L.P. | Security detection analytics |
| RU2701040C1 (ru) | 2018-12-28 | 2019-09-24 | Общество с ограниченной ответственностью "Траст" | Способ и вычислительное устройство для информирования о вредоносных веб-ресурсах |
| SG11202101624WA (en) | 2019-02-27 | 2021-03-30 | Group Ib Ltd | Method and system for user identification by keystroke dynamics |
| SG11202101658UA (en) | 2019-04-10 | 2021-03-30 | Group Ib Ltd | Method and system of user identification by a sequence of opened user interface windows |
| US11418524B2 (en) * | 2019-05-07 | 2022-08-16 | SecureworksCorp. | Systems and methods of hierarchical behavior activity modeling and detection for systems-level security |
| US10623423B1 (en) * | 2019-06-06 | 2020-04-14 | Sift Science, Inc. | Systems and methods for intelligently implementing a machine learning-based digital threat mitigation service |
| CN110460611B (zh) * | 2019-08-16 | 2022-01-11 | 国家计算机网络与信息安全管理中心 | 基于机器学习的全流量攻击检测技术 |
| RU2728497C1 (ru) | 2019-12-05 | 2020-07-29 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Способ и система определения принадлежности программного обеспечения по его машинному коду |
| RU2728498C1 (ru) | 2019-12-05 | 2020-07-29 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Способ и система определения принадлежности программного обеспечения по его исходному коду |
| RU2743974C1 (ru) | 2019-12-19 | 2021-03-01 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Система и способ сканирования защищенности элементов сетевой архитектуры |
| US11838300B1 (en) * | 2019-12-24 | 2023-12-05 | Musarubra Us Llc | Run-time configurable cybersecurity system |
| RU2722693C1 (ru) | 2020-01-27 | 2020-06-03 | Общество с ограниченной ответственностью «Группа АйБи ТДС» | Способ и система выявления инфраструктуры вредоносной программы или киберзлоумышленника |
| RU2722692C1 (ru) | 2020-02-21 | 2020-06-03 | Общество с ограниченной ответственностью «Группа АйБи ТДС» | Способ и система выявления вредоносных файлов в неизолированной среде |
| SG10202001963TA (en) | 2020-03-04 | 2021-10-28 | Group Ib Global Private Ltd | System and method for brand protection based on the search results |
| RU2738344C1 (ru) | 2020-03-10 | 2020-12-11 | Общество с ограниченной ответственностью «Группа АйБи ТДС» | Способ и система поиска схожих вредоносных программ по результатам их динамического анализа |
| US11461679B2 (en) | 2020-03-27 | 2022-10-04 | EMC IP Holding Company LLC | Message management using machine learning techniques |
| US11475090B2 (en) | 2020-07-15 | 2022-10-18 | Group-Ib Global Private Limited | Method and system for identifying clusters of affiliated web resources |
| RU2743619C1 (ru) | 2020-08-06 | 2021-02-20 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Способ и система генерации списка индикаторов компрометации |
| US11799904B2 (en) * | 2020-12-10 | 2023-10-24 | Cisco Technology, Inc. | Malware detection using inverse imbalance subspace searching |
| US12273374B2 (en) * | 2021-03-24 | 2025-04-08 | Mayachitra, Inc. | Malware detection using frequency domain-based image visualization and deep learning |
| US11947572B2 (en) | 2021-03-29 | 2024-04-02 | Group IB TDS, Ltd | Method and system for clustering executable files |
| NL2030861B1 (en) | 2021-06-01 | 2023-03-14 | Trust Ltd | System and method for external monitoring a cyberattack surface |
| RU2769075C1 (ru) | 2021-06-10 | 2022-03-28 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Система и способ активного обнаружения вредоносных сетевых ресурсов |
| US20230169072A1 (en) * | 2021-11-30 | 2023-06-01 | Sap Se | Augmented query validation and realization |
| IL315091A (en) * | 2022-03-07 | 2024-10-01 | Darktrace Holdings Ltd | Automatic analysis of vulnerability and threat to the space |
| CN114615260B (zh) * | 2022-05-12 | 2022-09-16 | 广州市保伦电子有限公司 | 一种面向云服务资源传输的方法 |
| US12244553B2 (en) * | 2022-06-13 | 2025-03-04 | Bank Of America Corporation | System for identifying and blocking suspect electronic communications based on Artificial Intelligence |
| EP4555432A1 (en) * | 2022-07-15 | 2025-05-21 | Bluevoyant LLC | Devices, systems, and methods for utilizing a networked, computer-assisted, threat hunting platform to enhance network security |
Family Cites Families (108)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5675711A (en) | 1994-05-13 | 1997-10-07 | International Business Machines Corporation | Adaptive statistical regression and classification of data strings, with application to the generic detection of computer viruses |
| US5730525A (en) | 1996-05-24 | 1998-03-24 | Browne & Co. Ltd. | Milk shake machine |
| US6141241A (en) | 1998-06-23 | 2000-10-31 | Energy Conversion Devices, Inc. | Universal memory element with systems employing same and apparatus and method for reading, writing and programming same |
| US7065657B1 (en) | 1999-08-30 | 2006-06-20 | Symantec Corporation | Extensible intrusion detection system |
| US7072876B1 (en) | 2000-09-19 | 2006-07-04 | Cigital | System and method for mining execution traces with finite automata |
| US7487544B2 (en) | 2001-07-30 | 2009-02-03 | The Trustees Of Columbia University In The City Of New York | System and methods for detection of new malicious executables |
| US7295977B2 (en) * | 2001-08-27 | 2007-11-13 | Nec Laboratories America, Inc. | Extracting classifying data in music from an audio bitstream |
| US7107617B2 (en) | 2001-10-15 | 2006-09-12 | Mcafee, Inc. | Malware scanning of compressed computer files |
| US7269851B2 (en) | 2002-01-07 | 2007-09-11 | Mcafee, Inc. | Managing malware protection upon a computer network |
| US7448084B1 (en) | 2002-01-25 | 2008-11-04 | The Trustees Of Columbia University In The City Of New York | System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses |
| US7454499B2 (en) * | 2002-11-07 | 2008-11-18 | Tippingpoint Technologies, Inc. | Active network defense system and method |
| US8171551B2 (en) | 2003-04-01 | 2012-05-01 | Mcafee, Inc. | Malware detection using external call characteristics |
| GB2400933B (en) | 2003-04-25 | 2006-11-22 | Messagelabs Ltd | A method of, and system for, heuristically detecting viruses in executable code by detecting files which have been maliciously altered |
| US20050015606A1 (en) | 2003-07-17 | 2005-01-20 | Blamires Colin John | Malware scanning using a boot with a non-installed operating system and download of malware detection files |
| US7257842B2 (en) | 2003-07-21 | 2007-08-14 | Mcafee, Inc. | Pre-approval of computer files during a malware detection |
| US20050262567A1 (en) | 2004-05-19 | 2005-11-24 | Itshak Carmona | Systems and methods for computer security |
| US7519998B2 (en) | 2004-07-28 | 2009-04-14 | Los Alamos National Security, Llc | Detection of malicious computer executables |
| US7484247B2 (en) | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
| US8037535B2 (en) | 2004-08-13 | 2011-10-11 | Georgetown University | System and method for detecting malicious executable code |
| US10043008B2 (en) | 2004-10-29 | 2018-08-07 | Microsoft Technology Licensing, Llc | Efficient white listing of user-modifiable files |
| US7574409B2 (en) * | 2004-11-04 | 2009-08-11 | Vericept Corporation | Method, apparatus, and system for clustering and classification |
| WO2006071985A2 (en) * | 2004-12-29 | 2006-07-06 | Alert Logic, Inc. | Threat scoring system and method for intrusion detection security networks |
| US8719924B1 (en) | 2005-03-04 | 2014-05-06 | AVG Technologies N.V. | Method and apparatus for detecting harmful software |
| US8453242B2 (en) | 2005-08-12 | 2013-05-28 | Ca, Inc. | System and method for scanning handles |
| US8161548B1 (en) | 2005-08-15 | 2012-04-17 | Trend Micro, Inc. | Malware detection using pattern classification |
| US7756834B2 (en) | 2005-11-03 | 2010-07-13 | I365 Inc. | Malware and spyware attack recovery system and method |
| US8234361B2 (en) | 2006-01-13 | 2012-07-31 | Fortinet, Inc. | Computerized system and method for handling network traffic |
| US7450005B2 (en) | 2006-01-18 | 2008-11-11 | International Business Machines Corporation | System and method of dynamically weighted analysis for intrusion decision-making |
| US7937758B2 (en) | 2006-01-25 | 2011-05-03 | Symantec Corporation | File origin determination |
| US7657546B2 (en) | 2006-01-26 | 2010-02-02 | International Business Machines Corporation | Knowledge management system, program product and method |
| US9009818B2 (en) | 2006-04-06 | 2015-04-14 | Pulse Secure, Llc | Malware detection system and method for compressed data on mobile platforms |
| US20070266421A1 (en) | 2006-05-12 | 2007-11-15 | Redcannon, Inc. | System, method and computer program product for centrally managing policies assignable to a plurality of portable end-point security devices over a network |
| US20140373144A9 (en) | 2006-05-22 | 2014-12-18 | Alen Capalik | System and method for analyzing unauthorized intrusion into a computer network |
| US7870394B2 (en) | 2006-05-26 | 2011-01-11 | Symantec Corporation | Method and system to scan firmware for malware |
| US8220048B2 (en) | 2006-08-21 | 2012-07-10 | Wisconsin Alumni Research Foundation | Network intrusion detector with combined protocol analyses, normalization and matching |
| US8789172B2 (en) | 2006-09-18 | 2014-07-22 | The Trustees Of Columbia University In The City Of New York | Methods, media, and systems for detecting attack on a digital processing device |
| US8201244B2 (en) | 2006-09-19 | 2012-06-12 | Microsoft Corporation | Automated malware signature generation |
| GB2444514A (en) | 2006-12-04 | 2008-06-11 | Glasswall | Electronic file re-generation |
| US8091127B2 (en) | 2006-12-11 | 2012-01-03 | International Business Machines Corporation | Heuristic malware detection |
| US8250655B1 (en) | 2007-01-12 | 2012-08-21 | Kaspersky Lab, Zao | Rapid heuristic method and system for recognition of similarity between malware variants |
| US8364617B2 (en) | 2007-01-19 | 2013-01-29 | Microsoft Corporation | Resilient classification of data |
| US7873583B2 (en) | 2007-01-19 | 2011-01-18 | Microsoft Corporation | Combining resilient classifiers |
| IL181426A (en) | 2007-02-19 | 2011-06-30 | Deutsche Telekom Ag | Automatic removal of signatures for malware |
| US20080201778A1 (en) | 2007-02-21 | 2008-08-21 | Matsushita Electric Industrial Co., Ltd. | Intrusion detection using system call monitors on a bayesian network |
| US8312546B2 (en) | 2007-04-23 | 2012-11-13 | Mcafee, Inc. | Systems, apparatus, and methods for detecting malware |
| US8099785B1 (en) | 2007-05-03 | 2012-01-17 | Kaspersky Lab, Zao | Method and system for treatment of cure-resistant computer malware |
| US20090013405A1 (en) | 2007-07-06 | 2009-01-08 | Messagelabs Limited | Heuristic detection of malicious code |
| US8019700B2 (en) | 2007-10-05 | 2011-09-13 | Google Inc. | Detecting an intrusive landing page |
| US20090172979A1 (en) | 2008-01-06 | 2009-07-09 | Andy Kaoh | Displaying gain structure for an electornic nameplate |
| US8448218B2 (en) | 2008-01-17 | 2013-05-21 | Josep Bori | Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability |
| US8719936B2 (en) | 2008-02-01 | 2014-05-06 | Northeastern University | VMM-based intrusion detection system |
| US20090241194A1 (en) | 2008-03-21 | 2009-09-24 | Andrew James Thomas | Virtual machine configuration sharing between host and virtual machines and between virtual machines |
| US7472420B1 (en) | 2008-04-23 | 2008-12-30 | Kaspersky Lab, Zao | Method and system for detection of previously unknown malware components |
| IL191744A0 (en) | 2008-05-27 | 2009-02-11 | Yuval Elovici | Unknown malcode detection using classifiers with optimal training sets |
| US20090313700A1 (en) | 2008-06-11 | 2009-12-17 | Jefferson Horne | Method and system for generating malware definitions using a comparison of normalized assembly code |
| US8234709B2 (en) | 2008-06-20 | 2012-07-31 | Symantec Operating Corporation | Streaming malware definition updates |
| US8196203B2 (en) | 2008-09-25 | 2012-06-05 | Symantec Corporation | Method and apparatus for determining software trustworthiness |
| US8561180B1 (en) | 2008-10-29 | 2013-10-15 | Symantec Corporation | Systems and methods for aiding in the elimination of false-positive malware detections within enterprises |
| US8181251B2 (en) | 2008-12-18 | 2012-05-15 | Symantec Corporation | Methods and systems for detecting malware |
| US8635694B2 (en) | 2009-01-10 | 2014-01-21 | Kaspersky Lab Zao | Systems and methods for malware classification |
| US20100192222A1 (en) | 2009-01-23 | 2010-07-29 | Microsoft Corporation | Malware detection using multiple classifiers |
| IL197477A0 (en) | 2009-03-08 | 2009-12-24 | Univ Ben Gurion | System and method for detecting new malicious executables, based on discovering and monitoring of characteristic system call sequences |
| JP2010287135A (ja) * | 2009-06-12 | 2010-12-24 | Usho Mo | データ分類装置、データ分類方法およびその方法をコンピュータに実行させるプログラム |
| US8276202B1 (en) | 2009-06-30 | 2012-09-25 | Aleksandr Dubrovsky | Cloud-based gateway security scanning |
| US8015284B1 (en) | 2009-07-28 | 2011-09-06 | Symantec Corporation | Discerning use of signatures by third party vendors |
| US8478708B1 (en) | 2009-07-30 | 2013-07-02 | Zscaler, Inc. | System and method for determining risk posed by a web user |
| US8635171B1 (en) | 2009-08-17 | 2014-01-21 | Symantec Corporation | Systems and methods for reducing false positives produced by heuristics |
| JP2011044064A (ja) * | 2009-08-24 | 2011-03-03 | Nikon Corp | 画像処理装置、および画像処理プログラム |
| US8190647B1 (en) | 2009-09-15 | 2012-05-29 | Symantec Corporation | Decision tree induction that is sensitive to attribute computational complexity |
| US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
| US8590045B2 (en) | 2009-10-07 | 2013-11-19 | F-Secure Oyj | Malware detection by application monitoring |
| US8719939B2 (en) | 2009-12-31 | 2014-05-06 | Mcafee, Inc. | Malware detection via reputation system |
| US8578497B2 (en) | 2010-01-06 | 2013-11-05 | Damballa, Inc. | Method and system for detecting malware |
| US8401982B1 (en) | 2010-01-14 | 2013-03-19 | Symantec Corporation | Using sequencing and timing information of behavior events in machine learning to detect malware |
| US8341745B1 (en) | 2010-02-22 | 2012-12-25 | Symantec Corporation | Inferring file and website reputations by belief propagation leveraging machine reputation |
| US8667593B1 (en) | 2010-05-11 | 2014-03-04 | Re-Sec Technologies Ltd. | Methods and apparatuses for protecting against malicious software |
| US8584241B1 (en) | 2010-08-11 | 2013-11-12 | Lockheed Martin Corporation | Computer forensic system |
| US8413235B1 (en) | 2010-09-10 | 2013-04-02 | Symantec Corporation | Malware detection using file heritage data |
| US8869277B2 (en) | 2010-09-30 | 2014-10-21 | Microsoft Corporation | Realtime multiple engine selection and combining |
| US9032521B2 (en) | 2010-10-13 | 2015-05-12 | International Business Machines Corporation | Adaptive cyber-security analytics |
| US8413244B1 (en) | 2010-11-11 | 2013-04-02 | Symantec Corporation | Using temporal attributes to detect malware |
| JP5607513B2 (ja) * | 2010-11-25 | 2014-10-15 | Kddi株式会社 | 検知装置、検知方法及び検知プログラム |
| WO2012071989A1 (zh) | 2010-11-29 | 2012-06-07 | 北京奇虎科技有限公司 | 基于机器学习的程序识别方法及装置 |
| AU2011336466C1 (en) * | 2010-12-01 | 2017-01-19 | Cisco Technology, Inc. | Detecting malicious software through contextual convictions, generic signatures and machine learning techniques |
| US8521667B2 (en) | 2010-12-15 | 2013-08-27 | Microsoft Corporation | Detection and categorization of malicious URLs |
| US8682812B1 (en) | 2010-12-23 | 2014-03-25 | Narus, Inc. | Machine learning based botnet detection using real-time extracted traffic features |
| IL210900A (en) * | 2011-01-27 | 2015-08-31 | Verint Systems Ltd | System and method for efficient classification and processing of network traffic |
| US8683585B1 (en) | 2011-02-10 | 2014-03-25 | Symantec Corporation | Using file reputations to identify malicious file sources in real time |
| US8756693B2 (en) | 2011-04-05 | 2014-06-17 | The United States Of America As Represented By The Secretary Of The Air Force | Malware target recognition |
| US8838992B1 (en) | 2011-04-28 | 2014-09-16 | Trend Micro Incorporated | Identification of normal scripts in computer systems |
| US8726388B2 (en) | 2011-05-16 | 2014-05-13 | F-Secure Corporation | Look ahead malware scanning |
| US8555388B1 (en) | 2011-05-24 | 2013-10-08 | Palo Alto Networks, Inc. | Heuristic botnet detection |
| CN102194072B (zh) | 2011-06-03 | 2012-11-14 | 奇智软件(北京)有限公司 | 一种处理计算机病毒的方法、装置及系统 |
| US8799190B2 (en) | 2011-06-17 | 2014-08-05 | Microsoft Corporation | Graph-based malware classification based on file relationships |
| CN102930206B (zh) | 2011-08-09 | 2015-02-25 | 腾讯科技(深圳)有限公司 | 病毒文件的聚类划分处理方法和装置 |
| US8181247B1 (en) | 2011-08-29 | 2012-05-15 | Kaspersky Lab Zao | System and method for protecting a computer system from the activity of malicious objects |
| JP5540160B2 (ja) * | 2011-11-15 | 2014-07-02 | 独立行政法人科学技術振興機構 | プログラム解析・検証サービス提供システム、その制御方法、制御プログラム、コンピュータを機能させるための制御プログラム、プログラム解析・検証装置、プログラム解析・検証ツール管理装置 |
| US8561195B1 (en) | 2012-01-09 | 2013-10-15 | Symantec Corporation | Detection of malicious code based on its use of a folder shortcut |
| US8745760B2 (en) | 2012-01-30 | 2014-06-03 | Cisco Technology, Inc. | Malware classification for unknown executable files |
| US8627469B1 (en) | 2012-03-14 | 2014-01-07 | Symantec Corporation | Systems and methods for using acquisitional contexts to prevent false-positive malware classifications |
| RU2485577C1 (ru) | 2012-05-11 | 2013-06-20 | Закрытое акционерное общество "Лаборатория Касперского" | Способ увеличения надежности определения вредоносного программного обеспечения |
| US9021589B2 (en) | 2012-06-05 | 2015-04-28 | Los Alamos National Security, Llc | Integrating multiple data sources for malware classification |
| US9292688B2 (en) * | 2012-09-26 | 2016-03-22 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
| US8826431B2 (en) | 2012-11-20 | 2014-09-02 | Symantec Corporation | Using telemetry to reduce malware definition package size |
| JP6124566B2 (ja) * | 2012-11-29 | 2017-05-10 | 国立大学法人九州工業大学 | 画像認識方法および画像認識装置 |
| TWI461952B (zh) | 2012-12-26 | 2014-11-21 | Univ Nat Taiwan Science Tech | 惡意程式偵測方法與系統 |
| AU2014213584B2 (en) * | 2013-02-10 | 2018-01-18 | Paypal, Inc. | Method and product for providing a predictive security product and evaluating existing security products |
| US9178901B2 (en) | 2013-03-26 | 2015-11-03 | Microsoft Technology Licensing, Llc | Malicious uniform resource locator detection |
-
2015
- 2015-11-16 WO PCT/US2015/060820 patent/WO2016081346A1/en not_active Ceased
- 2015-11-16 JP JP2017545854A patent/JP6916112B2/ja active Active
- 2015-11-16 EP EP15802279.8A patent/EP3222024A1/en active Pending
- 2015-11-16 US US14/941,999 patent/US9832216B2/en active Active
-
2021
- 2021-07-15 JP JP2021117274A patent/JP7274535B2/ja active Active
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2018506808A5 (enExample) | ||
| JP7274535B2 (ja) | ネットワークデータ特性評価のシステムと方法 | |
| US11546380B2 (en) | System and method for creation and implementation of data processing workflows using a distributed computational graph | |
| US12225049B2 (en) | System and methods for integrating datasets and automating transformation workflows using a distributed computational graph | |
| JP6410547B2 (ja) | ネットワーク動作アーチファクトの順序によるマルウェアの分類 | |
| US8990149B2 (en) | Generating a predictive model from multiple data sources | |
| US20210092160A1 (en) | Data set creation with crowd-based reinforcement | |
| US10572818B2 (en) | Horizontal decision tree learning from very high rate data streams with horizontal parallel conflict resolution | |
| US10642936B2 (en) | Automated message sentiment analysis and aggregation | |
| US20140310517A1 (en) | Identification and classification of web traffic inside encrypted network tunnels | |
| US10437912B2 (en) | Sorting and displaying documents according to sentiment level in an online community | |
| JP2020535555A5 (enExample) | ||
| US10394579B2 (en) | Automatically fixing inaccessible widgets during mobile application execution | |
| US9020785B2 (en) | Identifying and routing poison tuples in a streaming application | |
| US10459832B2 (en) | How to track operator behavior via metadata | |
| JP2018512666A (ja) | 画像検証コードに基づいて画像を検証するための方法及び装置 | |
| RU2013144681A (ru) | Система обработки электронного сообщения для определения его классификации | |
| US8712100B2 (en) | Profiling activity through video surveillance | |
| US20180189416A1 (en) | Method and apparatus for visualizing relations between incident resources | |
| EP3365788A1 (en) | System and method for annotating client-server transactions | |
| JP2016095834A5 (enExample) | ||
| US10671924B2 (en) | Scalable streaming decision tree learning | |
| US9195608B2 (en) | Stored data analysis | |
| US20170155610A1 (en) | Processing messages in a data messaging system | |
| US20200394532A1 (en) | Detaching Social Media Content Creation from Publication |