SG10201901110RA - Method and system for detecting and preventing malware execution in a target system - Google Patents

Method and system for detecting and preventing malware execution in a target system

Info

Publication number
SG10201901110RA
SG10201901110RA SG10201901110RA SG10201901110RA SG10201901110RA SG 10201901110R A SG10201901110R A SG 10201901110RA SG 10201901110R A SG10201901110R A SG 10201901110RA SG 10201901110R A SG10201901110R A SG 10201901110RA SG 10201901110R A SG10201901110R A SG 10201901110RA
Authority
SG
Singapore
Prior art keywords
detecting
malware execution
preventing malware
target system
target
Prior art date
Application number
SG10201901110RA
Inventor
Vicknesh Manoselvam
Original Assignee
Accenture Global Solutions Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Accenture Global Solutions Ltd filed Critical Accenture Global Solutions Ltd
Priority to SG10201901110RA priority Critical patent/SG10201901110RA/en
Priority to US16/782,817 priority patent/US11368478B2/en
Priority to EP20155946.5A priority patent/EP3694177B1/en
Publication of SG10201901110RA publication Critical patent/SG10201901110RA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/044Recurrent networks, e.g. Hopfield networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/088Non-supervised learning, e.g. competitive learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/30Types of network names
SG10201901110RA 2019-02-08 2019-02-08 Method and system for detecting and preventing malware execution in a target system SG10201901110RA (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SG10201901110RA SG10201901110RA (en) 2019-02-08 2019-02-08 Method and system for detecting and preventing malware execution in a target system
US16/782,817 US11368478B2 (en) 2019-02-08 2020-02-05 System for detecting and preventing malware execution in a target system
EP20155946.5A EP3694177B1 (en) 2019-02-08 2020-02-06 System for detecting and preventing malware execution in a target system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201901110RA SG10201901110RA (en) 2019-02-08 2019-02-08 Method and system for detecting and preventing malware execution in a target system

Publications (1)

Publication Number Publication Date
SG10201901110RA true SG10201901110RA (en) 2020-09-29

Family

ID=71945539

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201901110RA SG10201901110RA (en) 2019-02-08 2019-02-08 Method and system for detecting and preventing malware execution in a target system

Country Status (2)

Country Link
US (1) US11368478B2 (en)
SG (1) SG10201901110RA (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3694177A1 (en) 2019-02-08 2020-08-12 Accenture Global Solutions Limited System for detecting and preventing malware execution in a target system

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200349430A1 (en) * 2019-05-03 2020-11-05 Webroot Inc. System and method for predicting domain reputation
US11595357B2 (en) * 2019-10-23 2023-02-28 Cisco Technology, Inc. Identifying DNS tunneling domain names by aggregating features per subdomain
US11586881B2 (en) * 2020-02-24 2023-02-21 AVAST Software s.r.o. Machine learning-based generation of similar domain names
US11501212B2 (en) * 2020-04-21 2022-11-15 Nxp B.V. Method for protecting a machine learning model against extraction
US20230054575A1 (en) * 2021-08-17 2023-02-23 Red Bend Ltd. Detecting vehicle malfunctions and cyber attacks using machine learning
CN112329624A (en) * 2020-11-05 2021-02-05 北京地平线信息技术有限公司 Living body detection method and apparatus, storage medium, and electronic device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10742591B2 (en) * 2011-07-06 2020-08-11 Akamai Technologies Inc. System for domain reputation scoring
US9578048B1 (en) * 2015-09-16 2017-02-21 RiskIQ Inc. Identifying phishing websites using DOM characteristics
US10154051B2 (en) * 2016-08-31 2018-12-11 Cisco Technology, Inc. Automatic detection of network threats based on modeling sequential behavior in network traffic
US10574681B2 (en) * 2016-09-04 2020-02-25 Palo Alto Networks (Israel Analytics) Ltd. Detection of known and unknown malicious domains
US10397258B2 (en) * 2017-01-30 2019-08-27 Microsoft Technology Licensing, Llc Continuous learning for intrusion detection
CN110431817B (en) * 2017-03-10 2022-05-03 维萨国际服务协会 Identifying malicious network devices
US11005865B2 (en) * 2017-08-31 2021-05-11 Charter Communications Operating, Llc Distributed denial-of-service attack detection and mitigation based on autonomous system number
US10965697B2 (en) * 2018-01-31 2021-03-30 Micro Focus Llc Indicating malware generated domain names using digits
US11539745B2 (en) * 2019-03-22 2022-12-27 Proofpoint, Inc. Identifying legitimate websites to remove false positives from domain discovery analysis

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3694177A1 (en) 2019-02-08 2020-08-12 Accenture Global Solutions Limited System for detecting and preventing malware execution in a target system

Also Published As

Publication number Publication date
US11368478B2 (en) 2022-06-21
US20200259851A1 (en) 2020-08-13

Similar Documents

Publication Publication Date Title
SG10201901110RA (en) Method and system for detecting and preventing malware execution in a target system
EP3574461A4 (en) System and method for detecting replay attack
EP3545665A4 (en) System and method for detecting replay attack
SG11202110410UA (en) Detection method and detection system
EP3268189A4 (en) System and method for object and operator profiling in an object detection system in a saw
EP3910368A4 (en) Target object detection method and corresponding detection device
EP3905084A4 (en) Method and device for detecting malware
HUE054146T2 (en) System and method for interfering with a detection of a target
IL285920A (en) System, apparatus and method for sensing, detecting and effecting in a micro-to-nano environment
EP3821386A4 (en) System and method for secure transactions with a trusted execution environment (tee)
EP3961149A4 (en) Device, method, and program for detecting position and orientation of object
IL274250A (en) Computer implemented method and system for detecting a set of relevant communities
EP3652667A4 (en) System and method for detecting malware injected into memory of a computing device
EP3819770C0 (en) System and method for software verification
EP4005785A4 (en) Abnormality detecting device, abnormality detecting method, and abnormality detecting program
IL289742A (en) Method and system for determining information about a target structure
SG10201906721SA (en) Method and system for chrominance-based face liveness detection
SG11202108166WA (en) Computer implemented system and method for determining or verifying location
EP3397576A4 (en) Control system for detecting and correcting an imbalance in a conveyor system
EP3998577A4 (en) Object detection device, object detection method, and program
PL3803677T3 (en) Card-marking system and method for the automated detection of an optimized setting of a card-marking system
GB2575695B (en) Method and system for detecting a material response
SG11202011515UA (en) Method and system for improved malware detection
GB202104068D0 (en) Detection system and method for a crane
EP4025875C0 (en) Method and system for determining position displacments