SG10201901110RA - Method and system for detecting and preventing malware execution in a target system - Google Patents
Method and system for detecting and preventing malware execution in a target systemInfo
- Publication number
- SG10201901110RA SG10201901110RA SG10201901110RA SG10201901110RA SG10201901110RA SG 10201901110R A SG10201901110R A SG 10201901110RA SG 10201901110R A SG10201901110R A SG 10201901110RA SG 10201901110R A SG10201901110R A SG 10201901110RA SG 10201901110R A SG10201901110R A SG 10201901110RA
- Authority
- SG
- Singapore
- Prior art keywords
- detecting
- malware execution
- preventing malware
- target system
- target
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/084—Backpropagation, e.g. using gradient descent
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/088—Non-supervised learning, e.g. competitive learning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/30—Types of network names
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201901110RA SG10201901110RA (en) | 2019-02-08 | 2019-02-08 | Method and system for detecting and preventing malware execution in a target system |
US16/782,817 US11368478B2 (en) | 2019-02-08 | 2020-02-05 | System for detecting and preventing malware execution in a target system |
EP20155946.5A EP3694177B1 (en) | 2019-02-08 | 2020-02-06 | System for detecting and preventing malware execution in a target system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201901110RA SG10201901110RA (en) | 2019-02-08 | 2019-02-08 | Method and system for detecting and preventing malware execution in a target system |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201901110RA true SG10201901110RA (en) | 2020-09-29 |
Family
ID=71945539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201901110RA SG10201901110RA (en) | 2019-02-08 | 2019-02-08 | Method and system for detecting and preventing malware execution in a target system |
Country Status (2)
Country | Link |
---|---|
US (1) | US11368478B2 (en) |
SG (1) | SG10201901110RA (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3694177A1 (en) | 2019-02-08 | 2020-08-12 | Accenture Global Solutions Limited | System for detecting and preventing malware execution in a target system |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200349430A1 (en) * | 2019-05-03 | 2020-11-05 | Webroot Inc. | System and method for predicting domain reputation |
US11595357B2 (en) * | 2019-10-23 | 2023-02-28 | Cisco Technology, Inc. | Identifying DNS tunneling domain names by aggregating features per subdomain |
US11586881B2 (en) * | 2020-02-24 | 2023-02-21 | AVAST Software s.r.o. | Machine learning-based generation of similar domain names |
US11501212B2 (en) * | 2020-04-21 | 2022-11-15 | Nxp B.V. | Method for protecting a machine learning model against extraction |
US20230054575A1 (en) * | 2021-08-17 | 2023-02-23 | Red Bend Ltd. | Detecting vehicle malfunctions and cyber attacks using machine learning |
CN112329624A (en) * | 2020-11-05 | 2021-02-05 | 北京地平线信息技术有限公司 | Living body detection method and apparatus, storage medium, and electronic device |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10742591B2 (en) * | 2011-07-06 | 2020-08-11 | Akamai Technologies Inc. | System for domain reputation scoring |
US9578048B1 (en) * | 2015-09-16 | 2017-02-21 | RiskIQ Inc. | Identifying phishing websites using DOM characteristics |
US10154051B2 (en) * | 2016-08-31 | 2018-12-11 | Cisco Technology, Inc. | Automatic detection of network threats based on modeling sequential behavior in network traffic |
US10574681B2 (en) * | 2016-09-04 | 2020-02-25 | Palo Alto Networks (Israel Analytics) Ltd. | Detection of known and unknown malicious domains |
US10397258B2 (en) * | 2017-01-30 | 2019-08-27 | Microsoft Technology Licensing, Llc | Continuous learning for intrusion detection |
CN110431817B (en) * | 2017-03-10 | 2022-05-03 | 维萨国际服务协会 | Identifying malicious network devices |
US11005865B2 (en) * | 2017-08-31 | 2021-05-11 | Charter Communications Operating, Llc | Distributed denial-of-service attack detection and mitigation based on autonomous system number |
US10965697B2 (en) * | 2018-01-31 | 2021-03-30 | Micro Focus Llc | Indicating malware generated domain names using digits |
US11539745B2 (en) * | 2019-03-22 | 2022-12-27 | Proofpoint, Inc. | Identifying legitimate websites to remove false positives from domain discovery analysis |
-
2019
- 2019-02-08 SG SG10201901110RA patent/SG10201901110RA/en unknown
-
2020
- 2020-02-05 US US16/782,817 patent/US11368478B2/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3694177A1 (en) | 2019-02-08 | 2020-08-12 | Accenture Global Solutions Limited | System for detecting and preventing malware execution in a target system |
Also Published As
Publication number | Publication date |
---|---|
US11368478B2 (en) | 2022-06-21 |
US20200259851A1 (en) | 2020-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201901110RA (en) | Method and system for detecting and preventing malware execution in a target system | |
EP3574461A4 (en) | System and method for detecting replay attack | |
EP3545665A4 (en) | System and method for detecting replay attack | |
SG11202110410UA (en) | Detection method and detection system | |
EP3268189A4 (en) | System and method for object and operator profiling in an object detection system in a saw | |
EP3910368A4 (en) | Target object detection method and corresponding detection device | |
EP3905084A4 (en) | Method and device for detecting malware | |
HUE054146T2 (en) | System and method for interfering with a detection of a target | |
IL285920A (en) | System, apparatus and method for sensing, detecting and effecting in a micro-to-nano environment | |
EP3821386A4 (en) | System and method for secure transactions with a trusted execution environment (tee) | |
EP3961149A4 (en) | Device, method, and program for detecting position and orientation of object | |
IL274250A (en) | Computer implemented method and system for detecting a set of relevant communities | |
EP3652667A4 (en) | System and method for detecting malware injected into memory of a computing device | |
EP3819770C0 (en) | System and method for software verification | |
EP4005785A4 (en) | Abnormality detecting device, abnormality detecting method, and abnormality detecting program | |
IL289742A (en) | Method and system for determining information about a target structure | |
SG10201906721SA (en) | Method and system for chrominance-based face liveness detection | |
SG11202108166WA (en) | Computer implemented system and method for determining or verifying location | |
EP3397576A4 (en) | Control system for detecting and correcting an imbalance in a conveyor system | |
EP3998577A4 (en) | Object detection device, object detection method, and program | |
PL3803677T3 (en) | Card-marking system and method for the automated detection of an optimized setting of a card-marking system | |
GB2575695B (en) | Method and system for detecting a material response | |
SG11202011515UA (en) | Method and system for improved malware detection | |
GB202104068D0 (en) | Detection system and method for a crane | |
EP4025875C0 (en) | Method and system for determining position displacments |