JP5610451B2 - コンピュータファイルの評判スコアの個別有効期間 - Google Patents

コンピュータファイルの評判スコアの個別有効期間 Download PDF

Info

Publication number
JP5610451B2
JP5610451B2 JP2012528934A JP2012528934A JP5610451B2 JP 5610451 B2 JP5610451 B2 JP 5610451B2 JP 2012528934 A JP2012528934 A JP 2012528934A JP 2012528934 A JP2012528934 A JP 2012528934A JP 5610451 B2 JP5610451 B2 JP 5610451B2
Authority
JP
Japan
Prior art keywords
file
score
reputation
reputation score
ttl
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2012528934A
Other languages
English (en)
Japanese (ja)
Other versions
JP2013504824A (ja
JP2013504824A5 (enExample
Inventor
ヴィジェイ・セシャドリ
ズルフィカール・ラムザン
ジェームズ・ホーグランド
アダム・エル・グリック
アダム・ライト
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gen Digital Inc
Original Assignee
Symantec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symantec Corp filed Critical Symantec Corp
Publication of JP2013504824A publication Critical patent/JP2013504824A/ja
Publication of JP2013504824A5 publication Critical patent/JP2013504824A5/ja
Application granted granted Critical
Publication of JP5610451B2 publication Critical patent/JP5610451B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
JP2012528934A 2009-09-15 2010-09-10 コンピュータファイルの評判スコアの個別有効期間 Expired - Fee Related JP5610451B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/560,261 US8800030B2 (en) 2009-09-15 2009-09-15 Individualized time-to-live for reputation scores of computer files
US12/560,261 2009-09-15
PCT/US2010/048475 WO2011034792A1 (en) 2009-09-15 2010-09-10 Individualized time-to-live for reputation scores of computer files

Publications (3)

Publication Number Publication Date
JP2013504824A JP2013504824A (ja) 2013-02-07
JP2013504824A5 JP2013504824A5 (enExample) 2013-10-17
JP5610451B2 true JP5610451B2 (ja) 2014-10-22

Family

ID=43064680

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2012528934A Expired - Fee Related JP5610451B2 (ja) 2009-09-15 2010-09-10 コンピュータファイルの評判スコアの個別有効期間

Country Status (5)

Country Link
US (1) US8800030B2 (enExample)
EP (1) EP2478460B1 (enExample)
JP (1) JP5610451B2 (enExample)
CA (1) CA2770265C (enExample)
WO (1) WO2011034792A1 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2653834B2 (ja) 1988-06-07 1997-09-17 マツダ株式会社 過給機付エンジンの吸気装置
US10227156B2 (en) 2013-02-28 2019-03-12 Jfe Steel Corporation Laminated metal sheet for two-piece can and two-piece laminated can body

Families Citing this family (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0513375D0 (en) 2005-06-30 2005-08-03 Retento Ltd Computer security
US8312536B2 (en) 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
US8250657B1 (en) 2006-12-29 2012-08-21 Symantec Corporation Web site hygiene-based computer security
US8499063B1 (en) 2008-03-31 2013-07-30 Symantec Corporation Uninstall and system performance based software application reputation
US8769702B2 (en) 2008-04-16 2014-07-01 Micosoft Corporation Application reputation service
US8595282B2 (en) 2008-06-30 2013-11-26 Symantec Corporation Simplified communication of a reputation score for an entity
US8413251B1 (en) 2008-09-30 2013-04-02 Symantec Corporation Using disposable data misuse to determine reputation
US8904520B1 (en) 2009-03-19 2014-12-02 Symantec Corporation Communication-based reputation system
US8381289B1 (en) 2009-03-31 2013-02-19 Symantec Corporation Communication-based host reputation system
US8341745B1 (en) 2010-02-22 2012-12-25 Symantec Corporation Inferring file and website reputations by belief propagation leveraging machine reputation
US10210162B1 (en) 2010-03-29 2019-02-19 Carbonite, Inc. Log file management
US9390263B2 (en) 2010-03-31 2016-07-12 Sophos Limited Use of an application controller to monitor and control software file and application environments
US8839432B1 (en) * 2010-04-01 2014-09-16 Symantec Corporation Method and apparatus for performing a reputation based analysis on a malicious infection to secure a computer
US8510836B1 (en) * 2010-07-06 2013-08-13 Symantec Corporation Lineage-based reputation system
US9235586B2 (en) * 2010-09-13 2016-01-12 Microsoft Technology Licensing, Llc Reputation checking obtained files
US8782149B2 (en) 2010-11-09 2014-07-15 Comcast Interactive Media, Llc Smart address book
US8863291B2 (en) 2011-01-20 2014-10-14 Microsoft Corporation Reputation checking of executable programs
US8732587B2 (en) * 2011-03-21 2014-05-20 Symantec Corporation Systems and methods for displaying trustworthiness classifications for files as visually overlaid icons
US9319420B1 (en) 2011-06-08 2016-04-19 United Services Automobile Association (Usaa) Cyber intelligence clearinghouse
US9824198B2 (en) * 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
TWI543011B (zh) * 2012-01-10 2016-07-21 Verint Systems Ltd Method and system for extracting digital fingerprints of malicious files
US9715325B1 (en) 2012-06-21 2017-07-25 Open Text Corporation Activity stream based interaction
US9124472B1 (en) 2012-07-25 2015-09-01 Symantec Corporation Providing file information to a client responsive to a file download stability prediction
GB2506605A (en) * 2012-10-02 2014-04-09 F Secure Corp Identifying computer file based security threats by analysis of communication requests from files to recognise requests sent to untrustworthy domains
US9311480B2 (en) 2013-03-15 2016-04-12 Mcafee, Inc. Server-assisted anti-malware client
WO2014142986A1 (en) * 2013-03-15 2014-09-18 Mcafee, Inc. Server-assisted anti-malware client
WO2014143012A1 (en) 2013-03-15 2014-09-18 Mcafee, Inc. Remote malware remediation
US9432437B1 (en) * 2013-08-15 2016-08-30 Sprint Communications Company L.P. Dynamic telemetry client message routing
US9065849B1 (en) * 2013-09-18 2015-06-23 Symantec Corporation Systems and methods for determining trustworthiness of software programs
US9607086B2 (en) * 2014-03-27 2017-03-28 Mcafee, Inc. Providing prevalence information using query data
US10735550B2 (en) 2014-04-30 2020-08-04 Webroot Inc. Smart caching based on reputation information
US9323924B1 (en) * 2014-05-09 2016-04-26 Symantec Corporation Systems and methods for establishing reputations of files
WO2015200211A1 (en) 2014-06-22 2015-12-30 Webroot Inc. Network threat prediction and blocking
US9774613B2 (en) 2014-12-15 2017-09-26 Sophos Limited Server drift monitoring
GB2584585B8 (en) * 2014-12-15 2021-11-03 Sophos Ltd Monitoring variations in observable events for threat detection
US9419989B2 (en) * 2014-12-15 2016-08-16 Sophos Limited Threat detection using URL cache hits
US9571512B2 (en) 2014-12-15 2017-02-14 Sophos Limited Threat detection using endpoint variance
US9736349B2 (en) 2014-12-24 2017-08-15 Intel Corporation Adaptive video end-to-end network with local abstraction
US10592673B2 (en) * 2015-05-03 2020-03-17 Arm Limited System, device, and method of managing trustworthiness of electronic devices
US10395133B1 (en) 2015-05-08 2019-08-27 Open Text Corporation Image box filtering for optical character recognition
US10599844B2 (en) 2015-05-12 2020-03-24 Webroot, Inc. Automatic threat detection of executable files based on static data analysis
US10050980B2 (en) * 2015-06-27 2018-08-14 Mcafee, Llc Enterprise reputations for uniform resource locators
US10289686B1 (en) 2015-06-30 2019-05-14 Open Text Corporation Method and system for using dynamic content types
US10606844B1 (en) * 2015-12-04 2020-03-31 Ca, Inc. Method and apparatus for identifying legitimate files using partial hash based cloud reputation
US11122063B2 (en) * 2017-11-17 2021-09-14 Accenture Global Solutions Limited Malicious domain scoping recommendation system
US10728034B2 (en) 2018-02-23 2020-07-28 Webroot Inc. Security privilege escalation exploit detection and mitigation
US20200004839A1 (en) * 2018-06-29 2020-01-02 Microsoft Technology Licensing, Llc Download management
US11314863B2 (en) 2019-03-27 2022-04-26 Webroot, Inc. Behavioral threat detection definition and compilation

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020078382A1 (en) * 2000-11-29 2002-06-20 Ali Sheikh Scalable system for monitoring network system and components and methodology therefore
US7748038B2 (en) * 2004-06-16 2010-06-29 Ironport Systems, Inc. Method and apparatus for managing computer virus outbreaks
US7953814B1 (en) * 2005-02-28 2011-05-31 Mcafee, Inc. Stopping and remediating outbound messaging abuse
US7908653B2 (en) 2004-06-29 2011-03-15 Intel Corporation Method of improving computer security through sandboxing
US10043008B2 (en) * 2004-10-29 2018-08-07 Microsoft Technology Licensing, Llc Efficient white listing of user-modifiable files
US20060253584A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Reputation of an entity associated with a content item
WO2006119508A2 (en) * 2005-05-05 2006-11-09 Ironport Systems, Inc. Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources
US8528089B2 (en) * 2006-12-19 2013-09-03 Mcafee, Inc. Known files database for malware elimination
US8312536B2 (en) * 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
US8959568B2 (en) 2007-03-14 2015-02-17 Microsoft Corporation Enterprise security assessment sharing
US7953969B2 (en) * 2007-04-16 2011-05-31 Microsoft Corporation Reduction of false positive reputations through collection of overrides from customer deployments
US8312546B2 (en) * 2007-04-23 2012-11-13 Mcafee, Inc. Systems, apparatus, and methods for detecting malware
WO2009032770A2 (en) * 2007-08-29 2009-03-12 Partnet, Inc. Systems and methods for providing a confidence-based ranking algorithm
US20090187442A1 (en) * 2008-01-23 2009-07-23 Microsoft Corporation Feedback augmented object reputation service
US8931086B2 (en) * 2008-09-26 2015-01-06 Symantec Corporation Method and apparatus for reducing false positive detection of malware
US9081958B2 (en) * 2009-08-13 2015-07-14 Symantec Corporation Using confidence about user intent in a reputation system
US8621630B2 (en) * 2011-06-17 2013-12-31 Microsoft Corporation System, method and device for cloud-based content inspection for mobile devices

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2653834B2 (ja) 1988-06-07 1997-09-17 マツダ株式会社 過給機付エンジンの吸気装置
US10227156B2 (en) 2013-02-28 2019-03-12 Jfe Steel Corporation Laminated metal sheet for two-piece can and two-piece laminated can body

Also Published As

Publication number Publication date
US8800030B2 (en) 2014-08-05
WO2011034792A1 (en) 2011-03-24
CA2770265C (en) 2016-10-11
JP2013504824A (ja) 2013-02-07
US20110067101A1 (en) 2011-03-17
EP2478460A1 (en) 2012-07-25
CA2770265A1 (en) 2011-03-24
EP2478460B1 (en) 2015-04-22

Similar Documents

Publication Publication Date Title
JP5610451B2 (ja) コンピュータファイルの評判スコアの個別有効期間
US8756691B2 (en) IP-based blocking of malware
AU2018217323B2 (en) Methods and systems for identifying potential enterprise software threats based on visual and non-visual data
US8904520B1 (en) Communication-based reputation system
US8701190B1 (en) Inferring file and website reputations by belief propagation leveraging machine reputation
US8312537B1 (en) Reputation based identification of false positive malware detections
US8239944B1 (en) Reducing malware signature set size through server-side processing
US8413235B1 (en) Malware detection using file heritage data
JP5599884B2 (ja) 評価システムでのクライアント装置の信頼度メトリクスの使用
US8782790B1 (en) Signature creation for malicious network traffic
US8381289B1 (en) Communication-based host reputation system
US8510836B1 (en) Lineage-based reputation system
US8646072B1 (en) Detecting misuse of trusted seals
US8850570B1 (en) Filter-based identification of malicious websites
US8095964B1 (en) Peer computer based threat detection
US8516587B1 (en) Using temporal attributes to detect malware
US8015284B1 (en) Discerning use of signatures by third party vendors
US8499150B1 (en) Selectively trusting signed files
US9124472B1 (en) Providing file information to a client responsive to a file download stability prediction
US9276947B2 (en) Identifying misuse of legitimate objects
Mishra Controlling Virus Infections in Internet and Web Servers-A TRIZ Based Analysis

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20130829

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20130829

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20140328

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20140415

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20140702

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20140805

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20140826

R150 Certificate of patent or registration of utility model

Ref document number: 5610451

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

S111 Request for change of ownership or part of ownership

Free format text: JAPANESE INTERMEDIATE CODE: R313113

S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

S533 Written request for registration of change of name

Free format text: JAPANESE INTERMEDIATE CODE: R313533

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

LAPS Cancellation because of no payment of annual fees