WO2010002638A2 - Simplified communication of a reputation score for an entity - Google Patents

Simplified communication of a reputation score for an entity Download PDF

Info

Publication number
WO2010002638A2
WO2010002638A2 PCT/US2009/048328 US2009048328W WO2010002638A2 WO 2010002638 A2 WO2010002638 A2 WO 2010002638A2 US 2009048328 W US2009048328 W US 2009048328W WO 2010002638 A2 WO2010002638 A2 WO 2010002638A2
Authority
WO
WIPO (PCT)
Prior art keywords
entity
clients
reputation
reputation score
trustworthy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2009/048328
Other languages
English (en)
French (fr)
Other versions
WO2010002638A3 (en
Inventor
Carey S. Nachenberg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gen Digital Inc
Original Assignee
Symantec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symantec Corp filed Critical Symantec Corp
Priority to JP2011516546A priority Critical patent/JP5510937B2/ja
Priority to CN200980123712.XA priority patent/CN102171657B/zh
Publication of WO2010002638A2 publication Critical patent/WO2010002638A2/en
Anticipated expiration legal-status Critical
Publication of WO2010002638A3 publication Critical patent/WO2010002638A3/en
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Definitions

  • This invention relates generally to computer security, and more particularly to providing users with a measure of assessed risks presented by computer files, websites, and/or other entities that can potentially compromise a computer.
  • malware malicious software
  • Malware threats include computer viruses, worms, Trojan horse programs, spyware, adware, crimeware, and phishing websites.
  • Modern malware is often designed to provide financial gain to the attacker. For example, malware can surreptitiously capture important information such as logins, passwords, bank account identifiers, and credit card numbers.
  • the malware can provide hidden interfaces that allow the attacker to access and control the compromised computer.
  • malware While classical malware was usually mass-distributed to many computers, modern malware is often targeted and delivered to only a relative handful of computers.
  • a Trojan horse program can be designed to target computers in a particular department of a particular enterprise.
  • a false email can include a phishing attack that is directed to only customers of a certain bank or other electronic commerce site.
  • Mass-distributed malware can often be detected and disabled by conventional security software.
  • the security software uses techniques such as signature scanning and behavior monitoring heuristics to detect the malware.
  • signature scanning and behavior monitoring heuristics are less effective for detecting targeted threats since there are fewer instances of the same malware, and the security software might not be configured to recognize it.
  • mass-distributed malware is becoming harder to detect.
  • a malicious website might automatically generate new malicious code for every few visitors.
  • the malware is widely-distributed but only a small number of users have the exact same code, and it becomes impractical to generate signatures (and use signature scanning- based techniques) to detect it.
  • malware perform different functions, which also makes the malware difficult to detect through heuristics and other techniques. Therefore, there is a need in the art for new ways to detect malware.
  • security companies that analyze malware in order to develop signatures, heuristics, and other techniques for detecting it receive a large number of malware submissions.
  • the security companies sometimes have no way to effectively measure the threat posed by submitted malware. For example, the security companies might not know whether submitted software is truly malicious or how widely a particular piece of malware is distributed. As a consequence, the security companies have a difficult time ranking or triaging the malware submissions to focus on analyzing the submissions that constitute the greatest threats.
  • embodiments of the invention effectively communicate a reputation of an entity by detailing its association with safe or expert computer users who should be trusted more than average users.
  • the entity may be an application or other file that a user has downloaded or installed, or is attempting to download or install, so that the reputation of the entity is a measure of how well the file is trusted by the other special users.
  • the entity may be a website or any other entity in a computing environment with which a client system can interact and that may pose a malware threat.
  • the communicated reputation allows the user to make a decision about whether to trust the entity on the user's own client.
  • hygiene scores are determined for each of a plurality of clients, where the hygiene scores represent assessments of the trustworthiness of the clients.
  • a reputation score for that entity is calculated and provided to the client.
  • the reputation score may be calculated as a function of only those clients that have a hygiene score above a threshold.
  • the calculated reputation score represents an assessment of whether the entity is malicious in terms of the special users who have clients with high hygiene scores.
  • the client that encountered the entity then presents the reputation score to a user, along with a message indicating that the reputation score is based on other trustworthy clients that have good hygiene scores. In this way, the user is informed of the entity's reputation using information about the extent to which the trustworthy clients with good hygiene have interacted with the entity.
  • the user may be presented with the reputation score for the entity when the user downloads the entity or attempts to install the entity on the user's client.
  • the reputation score may be presented to the user when the user visits the website, or before a browser on the user's client navigates to the website. With the information provided by the reputation score, the user may make a more informed decision about whether to allow interactions with the entity by the user's client.
  • FIG. 1 is a high-level block diagram of a computing environment according to one embodiment.
  • FIG. 2 is a high-level block diagram illustrating a typical computer for use as a reputation server or client.
  • FIG. 3 is a high-level block diagram illustrating a detailed view of the security module of a client according to one embodiment.
  • FIG. 4 is a high-level block diagram illustrating a detailed view of the reputation server according to one embodiment.
  • FIG. 5 is a flowchart illustrating steps performed by a security module to provide security to a client according to one embodiment.
  • FIG. 6 is a flowchart illustrating steps performed by a reputation server according to one embodiment.
  • FIG. 7 is a flowchart illustrating steps performed by a reputation server to prioritize submitted malware according to one embodiment.
  • FIG. 1 is a high-level block diagram of a computing environment 100 according to one embodiment.
  • FIG. 1 illustrates a reputation server 110 and three clients 112 connected by a network 114. Only three clients 112 are shown in FIG. 1 to simplify and clarify the description.
  • Embodiments of the computing environment 100 can have thousands or millions of clients 112 connected to the network 114.
  • FIG. 1 and the other figures use like reference numerals to identify like elements.
  • the reputation server 110 interacts with the clients 112 via the network 114.
  • the reputation server 110 receives hygiene scores for the clients 112.
  • a client's hygiene score represents an assessment of the trustworthiness of the client 112.
  • “Trustworthiness” in this context refers to a measure of the client's propensity for getting infected by malware and other computer related threats, where a client 112 that is infected more often is less trustworthy. "Trustworthiness" may also correspond to the ability of the user to avoid the threats.
  • the reputation server 110 computes the hygiene scores itself based on the data received from the clients 112. Further, the reputation server 110 receives data describing the state of the client 112, such as files present, downloaded, installed, or executed on the clients, websites visited by the clients, and malware detected on the clients 110.
  • the reputation server 110 analyzes the collective states of the clients 112 in view of the clients' hygiene scores, and computes reputation scores for particular programs, files, websites, and other computer-related entities encountered by the clients.
  • a reputation score is an assessment of the likelihood that an entity is malicious (e.g., is a computer-related threat). For example, if a particular file is predominantly encountered by clients 112 with low hygiene scores, there is an elevated risk that the file is malicious because most users that use the file are poor at avoiding computer threats. Therefore, the file is likely to receive a low reputation score. Similarly, a website that is frequently visited by clients 112 having high hygiene scores is likely to receive a high reputation score because the website is frequented by users that are good at avoiding computer threats.
  • the reputation server 110 provides the reputation scores to the clients 112, and the clients (and users of the clients) use the scores to guide behaviors with respect to whether to perform certain activities.
  • a client 112 can be configured to block downloading of files that have reputation scores below a threshold.
  • a user can decline to install or execute a file upon viewing that file's low reputation score.
  • a client 112 is a computer used by one or more users to perform activities including downloading, installing, and/or executing files and browsing websites on the network 114.
  • the client 112 for example, can be a personal computer executing a web browser that allows the user to retrieve and display content from web servers and other computers on the network 114.
  • the client 112 is a network- capable device other than a computer, such as a personal digital assistant (PDA), a mobile telephone, a pager, a television “set-top box,” etc.
  • PDA personal digital assistant
  • client also includes computers such as servers and gateways that encounter files or other entities that might constitute malware or other threats.
  • a client 112 can be a network gateway located between an enterprise network and the Internet.
  • the client 112 can also be a mail server or web server that stores files that can be accessed by other clients.
  • the client 112 executes a security module 116 that monitors the state of the client.
  • the state includes activities performed on the client, such as files installed, executed, and downloaded, websites visited, etc.
  • an embodiment of the security module 116 also monitors malware detections on the client 112.
  • the security module 116 provides data describing the state to the reputation server 110.
  • an embodiment of the security module 116 computes the client's hygiene score based on its state and provides this score to the reputation server 110.
  • the security module 116 receives reputation scores 116 from the reputation server 110.
  • the security module 116 evaluates the reputation score for an entity by, for example, comparing it to a threshold or displaying a message based on it to the user.
  • the security module 116 optionally cancels an activity or performs another operation involving the entity in response to a result of the evaluation.
  • the security module 116 provides a description of the operation performed as a result of the evaluation to the reputation sever 110.
  • Using hygiene and reputation scores in this manner associates the users' abilities to avoid threats with their decisions to engage in certain activities involving computer-related entities they encounter.
  • This approach leverages the collective intelligence of the users to assign reputation scores to files, websites, and other entities that accurately measures the risks associated with the entities.
  • the reputation scores are computed without requiring the users to explicitly evaluate or judge the entity. Further, the reputation scores are computed without requiring a sophisticated analysis of the files, websites, or other potentially-malicious entities.
  • the approach is well-suited to a computing environment where there are significant amounts of malware or other threats that might not be identified using conventional signature scanning and/or heuristic techniques.
  • the network 114 represents the communication pathways between the reputation server 110 and clients 112.
  • the network 114 is the Internet.
  • the network 114 can also use dedicated or private communications links that are not necessarily part of the Internet.
  • the network 114 uses standard communications technologies and/or protocols.
  • the network 114 can include links using technologies such as Ethernet, 802.11, integrated services digital network (ISDN), digital subscriber line (DSL), asynchronous transfer mode (ATM), etc.
  • the networking protocols used on the network 114 can include the transmission control protocol/Internet protocol (TCP/IP), the hypertext transport protocol (HTTP), the simple mail transfer protocol (SMTP), the file transfer protocol (FTP), etc.
  • the data exchanged over the network 114 can be represented using technologies and/or formats including the hypertext markup language (HTML), the extensible markup language (XML), etc.
  • HTML hypertext markup language
  • XML extensible markup language
  • all or some of links can be encrypted using conventional encryption technologies such as the secure sockets layer (SSL), Secure HTTP and/or virtual private networks (VPNs).
  • SSL secure sockets layer
  • VPNs virtual private networks
  • the entities can use custom and/or dedicated data communications technologies instead of, or in addition to, the ones described above.
  • FIG. 2 is a high-level block diagram illustrating a typical computer 200 for use as a reputation server 110 or client 112. Illustrated are a processor 202 coupled to a bus 204. Also coupled to the bus 204 are a memory 206, a storage device 208, a keyboard 210, a graphics adapter 212, a pointing device 214, and a network adapter 216. A display 218 is coupled to the graphics adapter 212.
  • the processor 202 may be any general-purpose processor such as an INTEL x86 compatible-CPU.
  • the storage device 208 is, in one embodiment, a hard disk drive but can also be any other device capable of storing data, such as a writeable compact disk (CD) or DVD, or a solid-state memory device.
  • the memory 206 may be, for example, firmware, read-only memory (ROM), non-volatile random access memory (NVRAM), and/or RAM, and holds instructions and data used by the processor 202.
  • the pointing device 214 may be a mouse, track ball, or other type of pointing device, and is used in combination with the keyboard 210 to input data into the computer 200.
  • the graphics adapter 212 displays images and other information on the display 218.
  • the network adapter 216 couples the computer 200 to the network 114.
  • the computer 200 is adapted to execute computer program modules.
  • module refers to computer program logic and/or data for providing the specified functionality.
  • a module can be implemented in hardware, firmware, and/or software.
  • the modules are stored on the storage device 208, loaded into the memory 206, and executed by the processor 202.
  • the types of computer systems 200 used by the entities of FIG. 1 can vary depending upon the embodiment and the processing power used by the entity. For example, a client 112 that is a mobile telephone typically has limited processing power, a small display 218, and might lack a pointing device 214.
  • the reputation server 110 may comprise multiple blade servers working together to provide the functionality described herein.
  • FIG. 3 is a high-level block diagram illustrating a detailed view of the security module 116 of a client 112 according to one embodiment.
  • the security module 116 is incorporated into an operating system executing on the client 112 while in other embodiments the security module is a standalone application or part of another product.
  • the security module 116 itself includes multiple modules. Those of skill in the art will recognize that other embodiments of the security module 116 can have different and/or other modules than the ones described here, and that the functionalities can be distributed among the modules in a different manner.
  • a malware detection module 310 detects the presence of malware on the client 112.
  • malware includes software such as computer viruses, worms, Trojan horse programs, and the like.
  • malware also includes malicious websites such as "phishing" sites that attempt to trick users into revealing confidential information.
  • the malware detection module 310 includes a signature database that describes known types of malware. The malware detection module 310 uses techniques such as emulation and signature scanning to match signatures in the database with files and/or other data on the client 112. If a match occurs, the matching data are assumed to be malware.
  • embodiments of the malware detection module 310 use heuristics and other techniques to detect previously-unknown malware.
  • the malware detection module 310 includes additional functionality for performing tasks such as preventing the malware from damaging the client 112 and removing the malware.
  • an embodiment of the malware detection module 310 submits detected files or other entities to the reputation server 110 for subsequent analysis.
  • the malware detection module 310 will identify previously-unknown malware through heuristic or other techniques. In these situations, it is often desirable to submit the malware to the reputation server 110 to enable specialists associated with the reputation server 110 to analyze it. This analysis can lead to improved techniques for detecting and disabling the malware, repairing clients 112 infected by it, and reducing the amount of false positive detections.
  • a state monitoring module 312 monitors the state of the client 112 to detect encounters between the client 112 and entities such as files and websites that are relevant to the client's hygiene score or an entity's reputation score. To this end, an embodiment of the state monitoring module 312 identifies files that are resident on the client's storage device 208 and processes that are resident in the client's memory 206. In addition, the state monitoring module 312 monitors activities performed on the client 112 that are relevant to the client's hygiene score or an entity's reputation score. In one embodiment, the types of monitoring performed by the state monitoring module 312 are limited based on user- configurable parameters. For example, the user can disable certain types of monitoring due to privacy or other types of concerns.
  • an embodiment of the state monitoring module 312 can temporarily suspend an activity to provide an opportunity to cancel it.
  • the state monitoring module 312 monitors activities involving files that are introduced to, or executed on, the client 112.
  • the monitored activities include downloading files from websites and/or other locations on the network 114, loading files onto the client 112 via removable media, installing files onto the client, and executing files on the client.
  • the state monitoring module 312 records the activity performed, and the identities of the one or more files involved in the activity.
  • the state monitoring module 312 identifies a file by generating a hash that uniquely identifies it. Further, some embodiments of the state monitoring module 312 monitor, and identify, only executable files or other file types in which malware might reside.
  • An embodiment of the state monitoring module 312 monitors activities involving web browsing and/or other activities conducted via the network 114.
  • One embodiment of the state monitoring module 312 monitors network communications to determine the websites and/or types of websites (e.g., sex or gambling websites) browsed by the client 112.
  • the state monitoring module 312 also identifies entities present on websites browsed by the client 112, such as particular programs and other code embedded into the websites.
  • the state monitoring module 312 monitors characteristics of the visited websites, such as whether the websites generate pop-up windows in the client browser.
  • Another embodiment of the state monitoring module 312 examines a file cache maintained by a client- side web browser to determine the sites that were visited using the browser.
  • a hygiene computation module 314 calculates a hygiene score for the client 112 in response to a set of metrics.
  • the metrics include malware detections by the malware detection module 310 and client state monitored by the state monitoring module 312.
  • the hygiene computation module 314 sends the data constituting the metrics to the reputation server 110, and the server calculates the hygiene score for the client.
  • the hygiene computation module 314 uses metrics based on the frequency of occurrence of certain events, such as malware detections.
  • the metrics can include the number of malware detections observed during a time period such as a week, month, or three-month interval.
  • the metrics can include the number of malware detections measured relative to a number of files downloaded and/or installed on the client 112.
  • the activities on which the metrics are based can include the frequency that the user browses known malicious or unsavory websites (such as sex/gambling sites, sites with many pop-up windows, or sites known to host phishing attacks) as measured over a time interval or relative to the total number of visited websites.
  • the hygiene score for a client 112 can change over time if the frequency of events measured by the metrics also changes.
  • the hygiene score is a numeric value normalized within a given range, such as zero and one, to allow direct comparisons between hygiene scores of multiple clients. For example, a score of zero can represent the poorest hygiene while a score of one can represent the best hygiene. In other embodiments, the hygiene score is quantized into one of a limited set of values, e.g., the only possible hygiene scores are zero and one.
  • a reputation evaluation module 316 receives reputation scores for files, programs, websites, and/or other entities from the reputation server 110. In one embodiment, the reputation evaluation module 316 works with the state monitoring module 312 to detect when the client 112 encounters an entity having a reputation score.
  • the module 316 detects when the client web browser attempts to download a file from a web server, when there is an attempt to install a file on the client 112, and when the user attempts to execute a file.
  • the reputation evaluation module 316 sends the identity of the entity (e.g., a hash of an executable file or a URL of a website) to the reputation server 110 and receives a reputation score in return.
  • the reputation evaluation module 316 maintains a cache of reputation scores for certain programs, and consults the cache before (or instead of) contacting the reputation server 110 to determine whether the score is contained therein. Further, an embodiment of the reputation evaluation module 316 maintains an exclusion set that identifies files or other entities the reputation evaluation module need not evaluate. These excluded entities are identified using digitally- signed hashes of the files and/or via other techniques.
  • the state monitoring module 312 suspends the activity involving the entity while the reputation evaluation module 316 obtains the entity's reputation score.
  • the reputation evaluation module 316 evaluates the reputation score and, depending upon the score, cancels the suspended activity.
  • the reputation evaluation module 316 evaluates the reputation score against a reputation threshold and cancels the activity if the score is below the threshold (and/or allows the activity if the score is above the threshold). For example, the reputation module 316 can determine that a file that the browser is attempting to download from a mail server or website has a reputation score below the threshold, and therefore cancel the downloading because the file is likely malicious.
  • the threshold is set by the user.
  • the threshold is set by an administrator of the client 112 or by the reputation server 110.
  • the reputation evaluation module 316 displays a message describing the reputation score to the user, and thereby provides the user with an opportunity to cancel the activity in response to the score. This display can occur if the reputation score is below the reputation threshold (or below a different threshold). For example, the reputation evaluation module 316 can detect that a file the user is attempting to execute has a low reputation score, and display the reputation score or a warning message to the user to let the user evaluate the potential threat.
  • the reputation score displayed to the user is represented as a numeric value, while in other embodiments it is represented using other techniques such as a textual description or graphical icon (e.g., four out of five stars).
  • an embodiment of reputation evaluation module 316 displays a reputation score for a file in a dialog box or other user interface (UI) element when the user attempts to execute the file.
  • an embodiment of the reputation evaluation module 316 provides a graphical icon describing the reputation score of a website when the user attempts to browse the site.
  • the display presented by the reputation evaluation module 316 can include, for example, a dialog box with a message like: "This program has a bad reputation. Are you sure you want to install it?"; "Many people with good hygiene have installed this program, so it should be safe to use”; or "This program has been tried by very few users and its reputation is unknown, would you like to test it?"
  • the reputation evaluation module 316 may convert the reputation score into a format that the user is more likely to understand.
  • the reputation score is based on a set of "trustworthy" clients, where the trustworthy clients are identified based on the hygiene scores of the clients.
  • the trustworthy clients are defined as the set of clients that have a hygiene score above a predetermined threshold value. Accordingly, the reputation score may be calculated for a particular entity as a function of the trustworthy clients that have used the entity. In this way, this reputation score represents an assessment of whether the entity is malicious in terms of the trustworthy clients that may have encountered the entity.
  • the client also presents a message to the user indicating that the reputation score is based on other clients deemed trustworthy.
  • the reputation score and the accompanying message can take various forms.
  • the reputation score is computed as the fraction of trustworthy clients that have used the entity versus all of the clients, or the percentage of clients that have used the entity that are defined as trustworthy clients.
  • This reputation score and accompanying message thus informs a new user who is encountering a new entity about the general trustworthiness of other clients that have encountered that same entity.
  • the accompanying message may be something like: "Of the 945 other users who have installed this application, 64% of them are power users.”
  • the message may refer to the trustworthy users in various ways that effectively convey that the users are more trustworthy than the average user. These may include “power users,” “geeks,” “trustworthy users,” or any other term that conveys the same or similar meaning.
  • the reputation score is computed as a number of trustworthy clients that use the entity.
  • This reputation score and accompanying message thus informs a new user who is encountering a new entity about how many trustworthy users have already used the entity.
  • the accompanying message may be something like: "1250 trustworthy users have downloaded and installed this program.” When seeing this message, a user can make an informed decision about whether to follow the precedent of using the entity based on how many trustworthy users have already done so.
  • the reputation score is computed as a direct mathematical transformation of the hygiene scores of the clients that used the entity.
  • the reputation score is the average of the hygiene scores for all of the clients that have encountered and used the entity. This kind of reputation score provides a new user with information about the makeup of the typical client that uses the entity. Since malware is less likely to be found on "good hygiene" clients, a higher score tells a user that the entity can be trusted.
  • the accompanying message may be something like: "This application has a consumer score of 4.3 out of 5 stars.” Even though the user seeing this message may not understand how the message is calculated, the message effectively conveys whether the application should be trusted based on how much the application is trusted by trustworthy users (e.g., "geeks” or "power users").
  • the display presented by the reputation evaluation module 316 also provides the user with the opportunity to cancel the activity.
  • the dialog box presented by the module 316 can include a set of "Yes/No” or "OK/Cancel” buttons that let the user cancel or confirm the installation or execution of a file.
  • the reputation evaluation module 316 remembers the user's response to the displayed reputation score and does not necessarily display the reputation score each time the user performs an action.
  • an embodiment of the state monitoring module 312 monitors the user's response to the reputation score, specifically whether the user chooses to continue or cancel the activity in view of the reputation score. The state monitoring module 312 notifies the reputation server 110 of the user's response.
  • a server communication module 318 communicates with the reputation server 110 via the network 114.
  • the server communication module 318 sends reports providing information about the client 112 to the server 110.
  • the information includes the client's hygiene score, descriptions of all monitored encounters between the client 112 and entities, and submissions of potential malware.
  • the server communication module 318 reports the hygiene score to the reputation server 110 at predetermined times, such as when the hygiene score changes or at regular intervals.
  • the server communication module 318 reports the hygiene score to the reputation server 110 each time the client encounters an entity and/or detects or submits possible malware.
  • the server communication module 318 sends a tuple containing the hygiene score and the identifier of the entity to the reputation server 110 when the reputation evaluation module 316 requests the reputation score for the entity.
  • Some embodiments include a unique client identifier or other data in the reports to allow the reputation server 110 to associate particular reports with the clients that generated them, and to detect duplicate reports.
  • an embodiment of the server communication module 318 receives information from the reputation server 110 that is used to provide security on the client 112. The received information includes reputation scores for entities, malware definitions, and other updates to the security module 116.
  • FIG. 4 is a high-level block diagram illustrating a detailed view of the reputation server 110 according to one embodiment.
  • the reputation server 110 is operating by the same entity that provides the security modules 116 to the clients 112.
  • the reputation server 110 includes several modules. Those of skill in the art will recognize that other embodiments of the reputation server 110 can have different and/or other modules than the ones described here, and that the functionalities can be distributed among the modules in a different manner.
  • the functions ascribed to the reputation server 110 can be performed by multiple servers.
  • a client communication module 410 communicates with the clients 112 via the network 114.
  • the client communication module 410 receives data describing hygiene scores, monitored state, malware submissions, and other information from the clients 112. Further, an embodiment of the client communication module 410 provides reputation scores for files, websites, and other entities to the clients 112.
  • a hygiene cache module 412 stores hygiene scores received from the clients 112. In an embodiment where hygiene scores are received in (hygiene score, entity identifier) tuples, the hygiene cache module 412 stores the scores in a table or other data structure that associates the scores with the entities to which they pertain.
  • the hygiene cache module 412 stores the scores in a table or other data structure that associates the scores and clients. In embodiments where the reputation server 110 calculates the hygiene score, the hygiene cache module 412 performs the functions attributed to the hygiene computation module 314 described above.
  • a state information module 414 stores data describing activities and other state information monitored by the state monitoring modules 312 in the clients 112.
  • the stored data describes encounters between the clients 112 and entities. These encounters include files present on, downloaded, installed, and/or executed by the clients 112, websites visited by the clients, and the like, including any attempts to perform these actions.
  • the state information module 414 also stores data describing operations performed in response to reputation score evaluations performed at the clients 112, such as whether a user executed a particular file after viewing a message describing the program's reputation score.
  • the state information module 414 associates the activities with the hygiene scores of the clients on which the activities (and encounters) occurred.
  • the state information module 414 associates the activities with the identifiers of the clients 112 on which the activities occurred.
  • the functions of the hygiene cache 412 and state information modules 414 are performed by a combined module that stores entity identifiers and hygiene scores of clients 112 that encountered the entity.
  • the hygiene scores furthermore, are represented as a histogram or in another efficient manner. For example, for a particular entity the combined module records that the entity was encountered by 5 clients having high hygiene scores and 25 clients having low hygiene scores. The module does not necessarily store the identities of the particular clients 112 that encountered the entity.
  • a reputation computation module 416 calculates reputation scores for files, websites, and/or other entities based on the data in the hygiene cache 412 and/or state information 414 modules. In one embodiment, the reputation score is a numeric value similar to the hygiene score.
  • the reputation score is normalized within a given range, such as zero and one, to allow direct comparisons across reputation scores of different entities. For example, a score of zero can represent the lowest reputation while a score of one can represent the highest reputation. In other embodiments, the reputation score is quantized into one of a limited set of values. [0059]
  • the reputation score of a file or other entity is based primarily on the hygiene scores of the clients 112 that encounter the entity. For example, a file that is frequently installed and/or executed by clients 112 having high hygiene scores is likely to receive a high reputation score. In contrast, a file that is frequently installed or executed by only clients 112 having low hygiene scores is likely to receive a low reputation score.
  • One embodiment of the reputation computation module 416 calculates reputation scores based on cross-mixing of data. For example, assume that a set of clients 112 receives low hygiene scores because malware is frequently detected on the clients. The reputation computation module 416 can assign a low reputation score to a website that clients in the set frequently visit. The module 416 thus leverages malware detections to assign a reputation score to a website, even though the website might not be directly associated with the malware.
  • the reputation computation module 416 calculates a reputation score by assigning weights to certain clients, and then using the weights to influence the reputation scores for files, websites, and other entities encountered by the clients. Certain clients having very high hygiene scores, enrolled in a special program, and/or meeting other criteria are designed as "super clients" and the data from those clients exert significant influence over the reputation scores of entities they encounter. For example, if one or more super clients execute particular files or visit particular websites, the reputation computation module 416 assigns a high reputation score to the files or websites because they are very likely legitimate (i.e., not malicious).
  • the reputation score assigned to an entity can evolve over time.
  • One embodiment initially assigns a previously-unknown file, website, or other entity a low reputation score.
  • This initial low score represents a "probation period" where the entity is treated as potentially-malicious until it is encountered by enough clients to assess its true reputation.
  • the initial reputation score is likely to change as the entity is encountered by an increasing number of clients 112.
  • a file with an initially- low reputation score can receive a higher reputation score as it is installed and executed by clients having high hygiene scores. Indeed, if the user of a client 112 having a high hygiene score chooses to install a file after viewing a dialog box indicating that it has a low reputation score, then this is a strong signal that the file deserves a higher reputation score.
  • a malware receipt module 418 stores potential malware submitted by the malware detection modules 310 in the clients 112. In some embodiments, the malware receipt module 418 receives a large number of submissions from the clients 112 on the network 114. Given the many submissions, it is desirable to rank the submissions by the approximate amount of risk each one represents. This ranking allows the security specialists to prioritize the submissions and analyze the most dangerous ones first.
  • an embodiment of the malware receipt module 418 ranks the submissions based at least in part on the malware 's reputation scores and/or usage frequency.
  • a submitted file that has a low reputation score and is encountered by many clients 112 is prioritized over files that are encountered on relatively few clients.
  • Submitted files having good reputation scores are assigned low rankings and/or are effectively ignored.
  • FIG. 5 is a flowchart illustrating steps performed by a security module 116 to provide security to a client 112 according to one embodiment. Other embodiments perform the illustrated steps in different orders, and/or perform different or additional steps. Moreover, some or all of the steps can be performed by modules other than the security module 116.
  • the security module 116 monitors 510 the state of the client 112 for malware detections, files resident on the storage device 208, and/or activities such as browsing certain unsavory websites.
  • the security module 116 calculates 512 a hygiene score for the client 112 based on the monitored state. For example, if many malware detections occur within a given time period, the client 112 is likely to receive a low hygiene score.
  • the security module 116 provides the hygiene score to the reputation server 110, either as a discrete report or part of another report to the server.
  • the security module 116 obtains 514 a reputation score for an entity encountered by the client 112. For example, the security module 116 might identify a particular file stored on the storage device 208 or the client browser might attempt to download a file from a website. The security module 116 identifies the encountered entity using an identifier, such as a hash of the file, sends the identifier to the reputation server 110, and receives a reputation score for the entity in response. The security module 116 evaluates 516 the reputation score by, for example, comparing it to a threshold and/or displaying a message about it to the user. In some embodiments, the security module 116 optionally suspends an activity involving the entity while obtaining and evaluating its reputation score.
  • an identifier such as a hash of the file
  • the security module 116 evaluates 516 the reputation score by, for example, comparing it to a threshold and/or displaying a message about it to the user.
  • the security module 116 optionally suspends an activity involving the entity while obtaining
  • the security module 116 or user optionally cancels the activity and/or performs another operation based on the result of the evaluation.
  • the security module 116 reports 518 the encounter with the entity, the entity identifier, and the result of the evaluation (e.g., whether the user canceled the activity involving the entity) to the reputation server 110.
  • the report includes the hygiene score of the client 112 to allow the server 110 to further refine the entity's reputation score based on any actions performed as a result of the evaluation.
  • the security module 116 reports an encounter with an entity to the reputation server 110 but does not necessarily receive a reputation score in response.
  • the security module 116 can report entities encountered on the client 112, such as static files on the storage device 208, to the reputation server 110 to create associations between the client 112 (and its hygiene score) and the entities encountered on it. This technique can be used to seed the environment 100 and create initial reputation scores for entities.
  • FIG. 6 is a flowchart illustrating steps performed by a reputation server 110 according to one embodiment.
  • the reputation server 110 simultaneously communicate with multiple clients 112 and compute reputation scores for multiple entities. Therefore, embodiments of the reputation server 110 may perform multiple instances of the steps of FIG. 6 simultaneously. Other embodiments perform the illustrated steps in different orders, and/or perform different or additional steps. Moreover, some or all of the steps can be performed by servers other than the reputation server 110.
  • the reputation server 110 receives 610 hygiene scores from the clients 112. As described above, the hygiene scores represent assessments of the trustworthiness of the clients.
  • the reputation server 110 also receives 612 data describing monitored client state. These data describe encounters with entities such as files, programs, and websites. For example, the data can describe files downloaded, installed and/or executed, and websites visited by the client.
  • the reputation server 110 computes 614 reputation scores for the entities encountered at the clients 112.
  • the reputation scores are based on the hygiene scores of the clients 112.
  • the server 110 may compute a high reputation score for a file that is frequently encountered by clients 112 having high hygiene scores.
  • the server 110 may compute a low reputation score for a file most frequently encountered on clients 112 having low hygiene scores.
  • the reputation server 110 provides 616 an entity's reputation score to a client 112.
  • the reputation server 110 may receive a request for the reputation score of a file identified by a hash, and provide the score in response.
  • the clients 112 and/or users of the clients evaluate the scores to determine whether the entities are legitimate.
  • reputation server 110 continually updates the reputation scores based on the encounters and resulting evaluations.
  • FIG. 7 is a flowchart illustrating steps performed by a reputation server 110 to prioritize submitted entities according to one embodiment. Other embodiments perform the illustrated steps in different orders, and/or perform different or additional steps. Moreover, some or all of the steps can be performed by servers other than the reputation server 110.
  • the reputation server 110 receives 710 submissions from the clients 112 with files in which malware was detected or suspected. These submissions may include files with malicious software and files containing legitimate software that were detected due to false positives or for other reasons.
  • the reputation server 712 prioritizes the submissions based on reputation scores. Submitted files having low reputation scores and/or frequently encountered on clients 112 generally receive a high priority. In contrast, submitted files having high reputation scores and/or infrequently encountered on clients 112 generally receives a lower priority. Security specialists use the priorities to rank the submitted files to determine which submissions to analyze.
  • a software module is implemented with a computer program product comprising a computer-readable medium containing computer program code, which can be executed by a computer processor for performing any or all of the steps, operations, or processes described.
  • Embodiments of the invention may also relate to an apparatus for performing the operations herein.
  • This apparatus may be specially constructed for the required purposes, and/or it may comprise a general-purpose computing device selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a tangible computer readable storage medium or any type of media suitable for storing electronic instructions, and coupled to a computer system bus.
  • any computing systems referred to in the specification may include a single processor or may be architectures employing multiple processor designs for increased computing capability.
  • Embodiments of the invention may also relate to a computer data signal embodied in a carrier wave, where the computer data signal includes any embodiment of a computer program product or other data combination described herein.
  • the computer data signal is a product that is presented in a tangible medium or carrier wave and modulated or otherwise encoded in the carrier wave, which is tangible, and transmitted according to any suitable transmission method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Signal Processing (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
PCT/US2009/048328 2008-06-30 2009-06-23 Simplified communication of a reputation score for an entity Ceased WO2010002638A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2011516546A JP5510937B2 (ja) 2008-06-30 2009-06-23 エンティティのレピュテーションスコアの簡易化された伝達
CN200980123712.XA CN102171657B (zh) 2008-06-30 2009-06-23 实体信誉评分的简化传送

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/165,599 US8595282B2 (en) 2008-06-30 2008-06-30 Simplified communication of a reputation score for an entity
US12/165,599 2008-06-30

Publications (2)

Publication Number Publication Date
WO2010002638A2 true WO2010002638A2 (en) 2010-01-07
WO2010002638A3 WO2010002638A3 (en) 2011-02-24

Family

ID=41449346

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2009/048328 Ceased WO2010002638A2 (en) 2008-06-30 2009-06-23 Simplified communication of a reputation score for an entity

Country Status (4)

Country Link
US (1) US8595282B2 (enExample)
JP (1) JP5510937B2 (enExample)
CN (1) CN102171657B (enExample)
WO (1) WO2010002638A2 (enExample)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011227884A (ja) * 2010-03-31 2011-11-10 Broadband Security Inc ファイルのアップロード遮断システム及びファイルのアップロード遮断方法
WO2012003050A1 (en) * 2010-07-02 2012-01-05 Symantec Corporation Systems and methods for creating customized confidence bands for use in malware detection
CN102682235A (zh) * 2011-01-20 2012-09-19 微软公司 可执行程序的信誉检查
JP2012227873A (ja) * 2011-04-22 2012-11-15 Dowango:Kk コメント配信システム、コメント配信システムの動作方法、プログラム
US9652614B2 (en) 2008-04-16 2017-05-16 Microsoft Technology Licensing, Llc Application reputation service
US20230147408A1 (en) * 2014-07-29 2023-05-11 Hewlett Packard Enterprise Development Lp Client reputation driven role-based access control

Families Citing this family (144)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8250657B1 (en) 2006-12-29 2012-08-21 Symantec Corporation Web site hygiene-based computer security
US8312536B2 (en) * 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
US8205239B1 (en) * 2007-09-29 2012-06-19 Symantec Corporation Methods and systems for adaptively setting network security policies
US8959624B2 (en) * 2007-10-31 2015-02-17 Bank Of America Corporation Executable download tracking system
US8312537B1 (en) * 2008-03-28 2012-11-13 Symantec Corporation Reputation based identification of false positive malware detections
US8499063B1 (en) 2008-03-31 2013-07-30 Symantec Corporation Uninstall and system performance based software application reputation
US8595282B2 (en) 2008-06-30 2013-11-26 Symantec Corporation Simplified communication of a reputation score for an entity
US8312539B1 (en) 2008-07-11 2012-11-13 Symantec Corporation User-assisted security system
US9495538B2 (en) * 2008-09-25 2016-11-15 Symantec Corporation Graduated enforcement of restrictions according to an application's reputation
US8353021B1 (en) * 2008-09-30 2013-01-08 Symantec Corporation Determining firewall rules for an application on a client based on firewall rules and reputations of other clients
US8413251B1 (en) * 2008-09-30 2013-04-02 Symantec Corporation Using disposable data misuse to determine reputation
US8726391B1 (en) * 2008-10-10 2014-05-13 Symantec Corporation Scheduling malware signature updates in relation to threat awareness and environmental safety
US8484739B1 (en) * 2008-12-15 2013-07-09 Symantec Corporation Techniques for securely performing reputation based analysis using virtualization
US8448245B2 (en) * 2009-01-17 2013-05-21 Stopthehacker.com, Jaal LLC Automated identification of phishing, phony and malicious web sites
US8904520B1 (en) 2009-03-19 2014-12-02 Symantec Corporation Communication-based reputation system
US8239953B1 (en) 2009-03-26 2012-08-07 Symantec Corporation Applying differing security policies for users who contribute differently to machine hygiene
US8381289B1 (en) 2009-03-31 2013-02-19 Symantec Corporation Communication-based host reputation system
US8312543B1 (en) 2009-06-30 2012-11-13 Symantec Corporation Using URL reputation data to selectively block cookies
US8201255B1 (en) 2009-06-30 2012-06-12 Symantec Corporation Hygiene-based discovery of exploited portals
US8566932B1 (en) 2009-07-31 2013-10-22 Symantec Corporation Enforcing good network hygiene using reputation-based automatic remediation
US9081958B2 (en) * 2009-08-13 2015-07-14 Symantec Corporation Using confidence about user intent in a reputation system
US9277021B2 (en) * 2009-08-21 2016-03-01 Avaya Inc. Sending a user associated telecommunication address
US9734037B1 (en) 2009-09-15 2017-08-15 Symantec Corporation Mobile application sampling for performance and network behavior profiling
US8621654B2 (en) 2009-09-15 2013-12-31 Symantec Corporation Using metadata in security tokens to prevent coordinated gaming in a reputation system
US8528080B2 (en) 2009-09-15 2013-09-03 Reefedge Networks, Llc Short-range mobile honeypot for sampling and tracking threats
US8776168B1 (en) 2009-10-29 2014-07-08 Symantec Corporation Applying security policy based on behaviorally-derived user risk profiles
US8782209B2 (en) 2010-01-26 2014-07-15 Bank Of America Corporation Insider threat correlation tool
US9038187B2 (en) * 2010-01-26 2015-05-19 Bank Of America Corporation Insider threat correlation tool
US8793789B2 (en) 2010-07-22 2014-07-29 Bank Of America Corporation Insider threat correlation tool
US8800034B2 (en) * 2010-01-26 2014-08-05 Bank Of America Corporation Insider threat correlation tool
US8443452B2 (en) * 2010-01-28 2013-05-14 Microsoft Corporation URL filtering based on user browser history
US8341745B1 (en) 2010-02-22 2012-12-25 Symantec Corporation Inferring file and website reputations by belief propagation leveraging machine reputation
US8782794B2 (en) 2010-04-16 2014-07-15 Bank Of America Corporation Detecting secure or encrypted tunneling in a computer network
US8544100B2 (en) 2010-04-16 2013-09-24 Bank Of America Corporation Detecting secure or encrypted tunneling in a computer network
US8510836B1 (en) 2010-07-06 2013-08-13 Symantec Corporation Lineage-based reputation system
US8627463B1 (en) * 2010-09-13 2014-01-07 Symantec Corporation Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions
US9235586B2 (en) * 2010-09-13 2016-01-12 Microsoft Technology Licensing, Llc Reputation checking obtained files
EP2712145A1 (en) * 2010-09-24 2014-03-26 VeriSign, Inc. IP prioritization and scoring system for DDOS detection and mitigation
US20120179541A1 (en) * 2011-01-12 2012-07-12 Scentara Oy Ab System and method for providing advertisement in web sites
US9894082B2 (en) 2011-01-18 2018-02-13 Nokia Technologies Oy Method, apparatus, and computer program product for managing unwanted traffic in a wireless network
US9009819B1 (en) * 2011-01-20 2015-04-14 Symantec Corporation Method and system for detecting rogue security software that displays frequent misleading warnings
US8484730B1 (en) * 2011-03-10 2013-07-09 Symantec Corporation Systems and methods for reporting online behavior
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
US9202200B2 (en) * 2011-04-27 2015-12-01 Credibility Corp. Indices for credibility trending, monitoring, and lead generation
US8826426B1 (en) * 2011-05-05 2014-09-02 Symantec Corporation Systems and methods for generating reputation-based ratings for uniform resource locators
US9117074B2 (en) 2011-05-18 2015-08-25 Microsoft Technology Licensing, Llc Detecting a compromised online user account
US9118702B2 (en) 2011-05-31 2015-08-25 Bce Inc. System and method for generating and refining cyber threat intelligence data
US9158919B2 (en) 2011-06-13 2015-10-13 Microsoft Technology Licensing, Llc Threat level assessment of applications
US9106680B2 (en) 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US9087324B2 (en) 2011-07-12 2015-07-21 Microsoft Technology Licensing, Llc Message categorization
US8392230B2 (en) 2011-07-15 2013-03-05 Credibility Corp. Automated omnipresent real-time credibility management system and methods
US20130036466A1 (en) * 2011-08-01 2013-02-07 Microsoft Corporation Internet infrastructure reputation
US9065826B2 (en) 2011-08-08 2015-06-23 Microsoft Technology Licensing, Llc Identifying application reputation based on resource accesses
US8650637B2 (en) * 2011-08-24 2014-02-11 Hewlett-Packard Development Company, L.P. Network security risk assessment
US8214904B1 (en) * 2011-12-21 2012-07-03 Kaspersky Lab Zao System and method for detecting computer security threats based on verdicts of computer users
US10365911B2 (en) * 2011-12-18 2019-07-30 International Business Machines Corporation Determining optimal update frequency for software application updates
US8214905B1 (en) * 2011-12-21 2012-07-03 Kaspersky Lab Zao System and method for dynamically allocating computing resources for processing security information
US8209758B1 (en) * 2011-12-21 2012-06-26 Kaspersky Lab Zao System and method for classifying users of antivirus software based on their level of expertise in the field of computer security
US9137258B2 (en) * 2012-02-01 2015-09-15 Brightpoint Security, Inc. Techniques for sharing network security event information
US8914406B1 (en) 2012-02-01 2014-12-16 Vorstack, Inc. Scalable network security with fast response protocol
US9710644B2 (en) 2012-02-01 2017-07-18 Servicenow, Inc. Techniques for sharing network security event information
US8683598B1 (en) * 2012-02-02 2014-03-25 Symantec Corporation Mechanism to evaluate the security posture of a computer system
US20130254880A1 (en) 2012-03-21 2013-09-26 Mcafee, Inc. System and method for crowdsourcing of mobile application reputations
US8856930B2 (en) * 2012-03-30 2014-10-07 F-Secure Corporation Download control
US8931043B2 (en) 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US9432401B2 (en) * 2012-07-06 2016-08-30 Microsoft Technology Licensing, Llc Providing consistent security information
US9124472B1 (en) 2012-07-25 2015-09-01 Symantec Corporation Providing file information to a client responsive to a file download stability prediction
US8719934B2 (en) * 2012-09-06 2014-05-06 Dstillery, Inc. Methods, systems and media for detecting non-intended traffic using co-visitation information
CN102982063A (zh) * 2012-09-18 2013-03-20 华东师范大学 一种基于关系关键词扩展的元组精化的控制方法
US9705963B2 (en) * 2012-09-28 2017-07-11 Thomson Reuters Global Resources Unlimited Company Systems, methods and interfaces for evaluating an online entity presence
US8914886B2 (en) * 2012-10-29 2014-12-16 Mcafee, Inc. Dynamic quarantining for malware detection
CN103036896B (zh) * 2012-12-20 2015-07-01 北京奇虎科技有限公司 用于检测恶意链接的方法及系统
CN103023905B (zh) * 2012-12-20 2015-12-02 北京奇虎科技有限公司 一种用于检测恶意链接的设备、方法及系统
RU2536663C2 (ru) * 2012-12-25 2014-12-27 Закрытое акционерное общество "Лаборатория Касперского" Система и способ защиты от нелегального использования облачных инфраструктур
WO2014143012A1 (en) 2013-03-15 2014-09-18 Mcafee, Inc. Remote malware remediation
WO2014143000A1 (en) 2013-03-15 2014-09-18 Mcafee, Inc. Server-assisted anti-malware
US9614865B2 (en) * 2013-03-15 2017-04-04 Mcafee, Inc. Server-assisted anti-malware client
US9519756B2 (en) 2013-03-15 2016-12-13 Microsoft Technology Licensing, Llc Managing policy and permissions profiles
US10320628B2 (en) * 2013-06-19 2019-06-11 Citrix Systems, Inc. Confidence scoring of device reputation based on characteristic network behavior
US9639693B2 (en) * 2013-06-28 2017-05-02 Symantec Corporation Techniques for detecting a security vulnerability
US9622081B1 (en) * 2013-09-12 2017-04-11 Symantec Corporation Systems and methods for evaluating reputations of wireless networks
US20150304343A1 (en) * 2014-04-18 2015-10-22 Intuit Inc. Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment
US8910195B1 (en) * 2014-02-20 2014-12-09 Google Inc. Systems and methods for enhancing audience measurement data
US10289838B2 (en) 2014-02-21 2019-05-14 Entit Software Llc Scoring for threat observables
US10121007B2 (en) 2014-02-21 2018-11-06 Intuit Inc. Method and system for providing a robust and efficient virtual asset vulnerability management and verification service
US10757133B2 (en) 2014-02-21 2020-08-25 Intuit Inc. Method and system for creating and deploying virtual assets
US11294700B2 (en) 2014-04-18 2022-04-05 Intuit Inc. Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
US9635049B1 (en) 2014-05-09 2017-04-25 EMC IP Holding Company LLC Detection of suspicious domains through graph inference algorithm processing of host-domain contacts
US9313218B1 (en) * 2014-07-23 2016-04-12 Symantec Corporation Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms
US9118714B1 (en) * 2014-07-23 2015-08-25 Lookingglass Cyber Solutions, Inc. Apparatuses, methods and systems for a cyber threat visualization and editing user interface
EP3153986B1 (en) * 2014-08-11 2018-09-12 Nippon Telegraph and Telephone Corporation Browser-emulator device, construction device, browser emulation method, browser emulation program, construction method, and construction program
US9398036B2 (en) * 2014-09-17 2016-07-19 Microsoft Technology Licensing, Llc Chunk-based file acquisition and file reputation evaluation
CN104318153B (zh) * 2014-09-30 2017-06-23 北京金和软件股份有限公司 一种在线监测移动设备下载移动应用的系统
US9674210B1 (en) * 2014-11-26 2017-06-06 EMC IP Holding Company LLC Determining risk of malware infection in enterprise hosts
US9330264B1 (en) * 2014-11-26 2016-05-03 Glasswall (Ip) Limited Statistical analytic method for the determination of the risk posed by file based content
US9332024B1 (en) 2014-12-02 2016-05-03 Emc Corporation Utilizing digital linear recursive filters to estimate statistics for anomaly detection
US10230742B2 (en) * 2015-01-30 2019-03-12 Anomali Incorporated Space and time efficient threat detection
US10659479B2 (en) 2015-03-27 2020-05-19 Mcafee, Llc Determination of sensor usage
US9798877B2 (en) 2015-06-04 2017-10-24 Accenture Global Services Limited Security risk-based resource allocation
US9767285B2 (en) 2015-06-04 2017-09-19 Accenture Global Services Limited Process categorization using crowdsourcing
US9703961B2 (en) 2015-06-05 2017-07-11 Accenture Global Services Limited Process risk classification
WO2016193831A1 (en) * 2015-06-04 2016-12-08 Accenture Global Services Limited Process categorization for computer security
US10027717B2 (en) * 2015-06-26 2018-07-17 Mcafee, Llc Peer-to-peer group vigilance
US9858410B2 (en) * 2015-10-26 2018-01-02 Symantec Corporation Techniques for automated application analysis
US10181038B2 (en) * 2015-11-17 2019-01-15 Honeywell International Inc. Deployment assurance checks for monitoring industrial control systems
US10367829B2 (en) * 2015-11-19 2019-07-30 Anomali Incorporated Protecting threat indicators from third party abuse
US10366129B2 (en) * 2015-12-04 2019-07-30 Bank Of America Corporation Data security threat control monitoring system
US10686805B2 (en) 2015-12-11 2020-06-16 Servicenow, Inc. Computer network threat assessment
JP6759610B2 (ja) * 2016-02-04 2020-09-23 富士通株式会社 安全性判定装置、安全性判定プログラムおよび安全性判定方法
US9872072B2 (en) 2016-03-21 2018-01-16 Google Llc Systems and methods for identifying non-canonical sessions
US10291584B2 (en) * 2016-03-28 2019-05-14 Juniper Networks, Inc. Dynamic prioritization of network traffic based on reputation
US10237293B2 (en) * 2016-10-27 2019-03-19 Bitdefender IPR Management Ltd. Dynamic reputation indicator for optimizing computer security operations
US10318741B2 (en) 2016-11-21 2019-06-11 Bank Of America Corporation Data security and risk ranking tool
US10069823B1 (en) * 2016-12-27 2018-09-04 Symantec Corporation Indirect access control
US10581896B2 (en) * 2016-12-30 2020-03-03 Chronicle Llc Remedial actions based on user risk assessments
US10839703B2 (en) * 2016-12-30 2020-11-17 Fortinet, Inc. Proactive network security assessment based on benign variants of known threats
US10673870B2 (en) 2017-01-27 2020-06-02 Splunk Inc. Security monitoring of network connections using metrics data
US10333960B2 (en) 2017-05-03 2019-06-25 Servicenow, Inc. Aggregating network security data for export
US20180324207A1 (en) 2017-05-05 2018-11-08 Servicenow, Inc. Network security threat intelligence sharing
US10929539B2 (en) 2017-08-11 2021-02-23 Nec Corporation Automated software safeness categorization with installation lineage and hybrid information sources
JP6933112B2 (ja) * 2017-11-30 2021-09-08 富士通株式会社 サイバー攻撃情報処理プログラム、サイバー攻撃情報処理方法および情報処理装置
US11005882B1 (en) * 2018-12-17 2021-05-11 NortonLifeLock Inc. Reputation-based transaction security
WO2020154421A1 (en) * 2019-01-22 2020-07-30 Recorded Future, Inc. Automated organizational security scoring system
EP3861456A4 (en) * 2019-02-01 2022-05-25 Hewlett-Packard Development Company, L.P. DEVICE UPGRADE POLICY BASED ON TELEMETRY DATA
WO2020191110A1 (en) 2019-03-18 2020-09-24 Recorded Future, Inc. Cross-network security evaluation
RU2747474C2 (ru) * 2019-03-29 2021-05-05 Акционерное общество "Лаборатория Касперского" Способ асинхронного выбора совместимых продуктов
US11176249B2 (en) 2019-03-28 2021-11-16 Mcafee, Llc Cached file reputations
DE102020212405A1 (de) * 2020-09-30 2022-03-31 Siemens Aktiengesellschaft Verfahren zum Betreiben eines Netzwerks und Computerprogrammprodukt
US20220232038A1 (en) * 2021-01-21 2022-07-21 Mcafee, Llc Web Conference Security
US12057969B1 (en) 2021-06-24 2024-08-06 Airgap Networks, Inc. System and method for load balancing endpoint traffic to multiple security appliances acting as default gateways with point-to-point links between endpoints
US12074906B1 (en) 2021-06-24 2024-08-27 Airgap Networks Inc. System and method for ransomware early detection using a security appliance as default gateway with point-to-point links between endpoints
US12483589B1 (en) 2021-06-24 2025-11-25 Zscaler, Inc. System and method for utilizing DHCP relay to accomplish quarantining client endpoints in a ransomware protected network
US11711396B1 (en) * 2021-06-24 2023-07-25 Airgap Networks Inc. Extended enterprise browser blocking spread of ransomware from alternate browsers in a system providing agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US12058171B1 (en) 2021-06-24 2024-08-06 Airgap Networks, Inc. System and method to create disposable jump boxes to securely access private applications
US11757934B1 (en) 2021-06-24 2023-09-12 Airgap Networks Inc. Extended browser monitoring inbound connection requests for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11736520B1 (en) 2021-06-24 2023-08-22 Airgap Networks Inc. Rapid incidence agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11916957B1 (en) 2021-06-24 2024-02-27 Airgap Networks Inc. System and method for utilizing DHCP relay to police DHCP address assignment in ransomware protected network
US11722519B1 (en) 2021-06-24 2023-08-08 Airgap Networks Inc. System and method for dynamically avoiding double encryption of already encrypted traffic over point-to-point virtual private networks for lateral movement protection from ransomware
US11757933B1 (en) 2021-06-24 2023-09-12 Airgap Networks Inc. System and method for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11695799B1 (en) 2021-06-24 2023-07-04 Airgap Networks Inc. System and method for secure user access and agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
CN113282929B (zh) * 2021-06-29 2024-08-20 北京安天网络安全技术有限公司 移动存储设备的行为处理方法、装置、设备及存储介质
CN113282922B (zh) * 2021-06-29 2024-08-20 北京安天网络安全技术有限公司 对移动存储设备进行防护控制的方法、装置、设备及介质
US12170670B2 (en) * 2021-12-15 2024-12-17 Juniper Networks, Inc. Use of sentiment analysis to assess trust in a network
CN116010927B (zh) * 2022-12-28 2025-09-05 北京安天网络安全技术有限公司 一种数字签名证书检测方法及装置

Family Cites Families (98)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US82662A (en) * 1868-09-29 John w
US125382A (en) * 1872-04-09 Improvement in switches for the hair
US153354A (en) * 1874-07-21 Improvement in hasp-locks
US5291A (en) * 1847-09-11 Improvement in horse-rakes
US109244A (en) * 1870-11-15 Improvement in cutter-heads
US137864A (en) * 1873-04-15 Improvement in animal cage-traps
US40825A (en) * 1863-12-08 Improved nut-cracker
US67843A (en) * 1867-08-20 Improvement in corn-ploughs
US133540A (en) * 1872-12-03 Improvement in metal tips for shoe and other lacings
US77994A (en) * 1868-05-19 William mantey
US94734A (en) * 1869-09-14 Improved broom or mop-holder
US278264A (en) * 1883-05-22 Pipe-tongs
US133972A (en) * 1872-12-17 Improvement in bolt-trimmers
US16953A (en) * 1857-03-31 As trustee for certain purposes
US82628A (en) * 1868-09-29 Improvement in jbee-eives
US225655A (en) * 1880-03-16 N- peters
US55923A (en) * 1866-06-26 Improved lacing for boots and shoes
US67101A (en) * 1867-07-05 1867-07-23 Charles l
US20040139004A1 (en) * 1999-04-08 2004-07-15 Aceinc Pty Ltd. Secure online commerce transactions
US7020781B1 (en) 2000-05-03 2006-03-28 Hewlett-Packard Development Company, L.P. Digital content distribution systems
US20020046041A1 (en) * 2000-06-23 2002-04-18 Ken Lang Automated reputation/trust service
US7546338B2 (en) 2002-02-25 2009-06-09 Ascentive Llc Method and system for screening remote site connections and filtering data based on a community trust assessment
GB2386802A (en) * 2002-03-18 2003-09-24 Hewlett Packard Co Auditing of secure communication sessions over a communication network
US6970698B2 (en) * 2002-07-23 2005-11-29 Sbc Technology Resources, Inc. System and method for updating data in remote devices
JP4084971B2 (ja) * 2002-08-07 2008-04-30 三菱電機株式会社 電子データ交換システムにおけるデータ保護装置及びデータ保護方法並びにそれに用いるプログラム
US6983280B2 (en) * 2002-09-13 2006-01-03 Overture Services Inc. Automated processing of appropriateness determination of content for search listings in wide area network searches
US6981796B2 (en) * 2002-12-04 2006-01-03 Actherm Inc. Electronic thermometer
JP4472273B2 (ja) * 2003-05-30 2010-06-02 富士通株式会社 クライアント評価方法、クライアント評価装置、サービス提供方法、及び、サービス提供システム
US7565550B2 (en) * 2003-08-29 2009-07-21 Trend Micro, Inc. Automatic registration of a virus/worm monitor in a distributed network
WO2005048544A1 (en) * 2003-11-17 2005-05-26 Hardt Dick C Method and system for pseudonymous email address
US7412516B1 (en) * 2003-12-29 2008-08-12 Aol Llc Using a network bandwidth setting based on determining the network environment
US7870608B2 (en) * 2004-05-02 2011-01-11 Markmonitor, Inc. Early detection and monitoring of online fraud
US20070107053A1 (en) * 2004-05-02 2007-05-10 Markmonitor, Inc. Enhanced responses to online fraud
JP4829223B2 (ja) 2004-05-25 2011-12-07 グーグル インコーポレイテッド 電子メッセージソース評判情報システム
US7748038B2 (en) * 2004-06-16 2010-06-29 Ironport Systems, Inc. Method and apparatus for managing computer virus outbreaks
JP4652737B2 (ja) * 2004-07-14 2011-03-16 インターナショナル・ビジネス・マシーンズ・コーポレーション 単語境界確率推定装置及び方法、確率的言語モデル構築装置及び方法、仮名漢字変換装置及び方法、並びに、未知語モデルの構築方法、
US7310641B2 (en) 2004-07-30 2007-12-18 Microsoft Corporation Multiple redundant services with reputation
US7546349B1 (en) * 2004-11-01 2009-06-09 Symantec Corporation Automatic generation of disposable e-mail addresses
US7197539B1 (en) * 2004-11-01 2007-03-27 Symantec Corporation Automated disablement of disposable e-mail addresses based on user actions
US8266676B2 (en) 2004-11-29 2012-09-11 Harris Corporation Method to verify the integrity of components on a trusted platform using integrity database services
US7587367B2 (en) * 2004-12-31 2009-09-08 Ebay Inc. Method and system to provide feedback data within a distributed e-commerce system
US20060230039A1 (en) 2005-01-25 2006-10-12 Markmonitor, Inc. Online identity tracking
JP2006244007A (ja) * 2005-03-02 2006-09-14 Kddi Corp 信頼性判定・アクセス制御装置およびその方法ならびにプログラム
WO2006094271A2 (en) * 2005-03-02 2006-09-08 Markmonitor, Inc. Distribution of trust data
US8646080B2 (en) 2005-09-16 2014-02-04 Avg Technologies Cy Limited Method and apparatus for removing harmful software
US8566726B2 (en) * 2005-05-03 2013-10-22 Mcafee, Inc. Indicating website reputations based on website handling of personal information
US20060253584A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Reputation of an entity associated with a content item
US8438499B2 (en) * 2005-05-03 2013-05-07 Mcafee, Inc. Indicating website reputations during user interactions
US7562304B2 (en) * 2005-05-03 2009-07-14 Mcafee, Inc. Indicating website reputations during website manipulation of user information
US7822620B2 (en) * 2005-05-03 2010-10-26 Mcafee, Inc. Determining website reputations using automatic testing
JP2006318286A (ja) * 2005-05-13 2006-11-24 Nippon Telegr & Teleph Corp <Ntt> アプリケーション検索方法、アプリケーション検索プログラム、データテーブル生成方法及びデータテーブル生成プログラム
US20070011739A1 (en) * 2005-06-28 2007-01-11 Shay Zamir Method for increasing the security level of a user machine browsing web pages
GB0513375D0 (en) 2005-06-30 2005-08-03 Retento Ltd Computer security
US7774413B2 (en) * 2005-08-30 2010-08-10 Microsoft Corporation Email message hygiene stamp
US20070094734A1 (en) 2005-09-29 2007-04-26 Mangione-Smith William H Malware mutation detector
US20070162349A1 (en) * 2005-10-17 2007-07-12 Markmonitor Inc. Client Side Brand Protection
US8566928B2 (en) 2005-10-27 2013-10-22 Georgia Tech Research Corporation Method and system for detecting and responding to attacking networks
US8108926B2 (en) * 2005-11-28 2012-01-31 Sap Ag Method and system for online trust management using statistical and probability modeling
US8725811B2 (en) 2005-12-29 2014-05-13 Microsoft Corporation Message organization and spam filtering based on user interaction
US8839418B2 (en) * 2006-01-18 2014-09-16 Microsoft Corporation Finding phishing sites
US20070233782A1 (en) * 2006-03-28 2007-10-04 Silentclick, Inc. Method & system for acquiring, storing, & managing software applications via a communications network
US20080082662A1 (en) 2006-05-19 2008-04-03 Richard Dandliker Method and apparatus for controlling access to network resources based on reputation
US20080005223A1 (en) * 2006-06-28 2008-01-03 Microsoft Corporation Reputation data for entities and data processing
CN101513008B (zh) * 2006-07-31 2012-09-19 意大利电信股份公司 在电信终端上实现安全性的系统
US7712143B2 (en) 2006-09-27 2010-05-04 Blue Ridge Networks, Inc. Trusted enclave for a computer system
US8375141B2 (en) 2006-09-29 2013-02-12 Microsoft Corporation Infrastructure to disseminate queries and provide query results
US8527592B2 (en) * 2006-10-31 2013-09-03 Watchguard Technologies, Inc. Reputation-based method and system for determining a likelihood that a message is undesired
US20080109491A1 (en) 2006-11-03 2008-05-08 Sezwho Inc. Method and system for managing reputation profile on online communities
US20080109244A1 (en) 2006-11-03 2008-05-08 Sezwho Inc. Method and system for managing reputation profile on online communities
US9654495B2 (en) 2006-12-01 2017-05-16 Websense, Llc System and method of analyzing web addresses
US7698305B2 (en) 2006-12-01 2010-04-13 Microsoft Corporation Program modification and loading times in computing devices
US7986787B2 (en) 2006-12-08 2011-07-26 International Business Machines Corporation System, method, and service for tracing traitors from content protection circumvention devices
US7991902B2 (en) * 2006-12-08 2011-08-02 Microsoft Corporation Reputation-based authorization decisions
US8220037B2 (en) * 2006-12-12 2012-07-10 Oracle International Corporation Centralized browser management
JP2008158959A (ja) * 2006-12-26 2008-07-10 Sky Kk 端末監視サーバと端末監視プログラムとデータ処理端末とデータ処理端末プログラム
US8312536B2 (en) * 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
US8250657B1 (en) 2006-12-29 2012-08-21 Symantec Corporation Web site hygiene-based computer security
US7908660B2 (en) * 2007-02-06 2011-03-15 Microsoft Corporation Dynamic risk management
US20080255977A1 (en) * 2007-04-10 2008-10-16 Utbk, Inc. Systems and Methods to Facilitate Searches via Social Network
US7720965B2 (en) * 2007-04-23 2010-05-18 Microsoft Corporation Client health validation using historical data
US8019689B1 (en) * 2007-09-27 2011-09-13 Symantec Corporation Deriving reputation scores for web sites that accept personally identifiable information
US20090125382A1 (en) 2007-11-07 2009-05-14 Wise Window Inc. Quantifying a Data Source's Reputation
WO2009076555A2 (en) 2007-12-12 2009-06-18 Google Inc. User-created content aggregation and sharing
US7653577B2 (en) * 2008-02-19 2010-01-26 The Go Daddy Group, Inc. Validating e-commerce transactions
US8200587B2 (en) 2008-04-07 2012-06-12 Microsoft Corporation Techniques to filter media content based on entity reputation
CN101261717A (zh) * 2008-04-09 2008-09-10 北京航空航天大学 基于云模型的主观信任评价方法
US8769702B2 (en) 2008-04-16 2014-07-01 Micosoft Corporation Application reputation service
US7472420B1 (en) * 2008-04-23 2008-12-30 Kaspersky Lab, Zao Method and system for detection of previously unknown malware components
US8595282B2 (en) 2008-06-30 2013-11-26 Symantec Corporation Simplified communication of a reputation score for an entity
US8413251B1 (en) * 2008-09-30 2013-04-02 Symantec Corporation Using disposable data misuse to determine reputation
US8271501B2 (en) 2008-12-17 2012-09-18 International Business Machines Corporation Web search among rich media objects
US8381289B1 (en) * 2009-03-31 2013-02-19 Symantec Corporation Communication-based host reputation system
US8001606B1 (en) * 2009-06-30 2011-08-16 Symantec Corporation Malware detection using a white list
US9081958B2 (en) 2009-08-13 2015-07-14 Symantec Corporation Using confidence about user intent in a reputation system
US7890627B1 (en) 2009-09-02 2011-02-15 Sophos Plc Hierarchical statistical model of internet reputation
US8800030B2 (en) 2009-09-15 2014-08-05 Symantec Corporation Individualized time-to-live for reputation scores of computer files
US8341745B1 (en) * 2010-02-22 2012-12-25 Symantec Corporation Inferring file and website reputations by belief propagation leveraging machine reputation
US9501644B2 (en) 2010-03-15 2016-11-22 F-Secure Oyj Malware protection

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9652614B2 (en) 2008-04-16 2017-05-16 Microsoft Technology Licensing, Llc Application reputation service
JP2011227884A (ja) * 2010-03-31 2011-11-10 Broadband Security Inc ファイルのアップロード遮断システム及びファイルのアップロード遮断方法
WO2012003050A1 (en) * 2010-07-02 2012-01-05 Symantec Corporation Systems and methods for creating customized confidence bands for use in malware detection
CN103109295A (zh) * 2010-07-02 2013-05-15 赛门铁克公司 创建在恶意软件检测中使用的定制化置信带的系统和方法
US8528090B2 (en) 2010-07-02 2013-09-03 Symantec Corporation Systems and methods for creating customized confidence bands for use in malware detection
CN103109295B (zh) * 2010-07-02 2015-09-09 赛门铁克公司 创建在恶意软件检测中使用的定制化置信带的系统和方法
CN102682235A (zh) * 2011-01-20 2012-09-19 微软公司 可执行程序的信誉检查
US8863291B2 (en) 2011-01-20 2014-10-14 Microsoft Corporation Reputation checking of executable programs
JP2012227873A (ja) * 2011-04-22 2012-11-15 Dowango:Kk コメント配信システム、コメント配信システムの動作方法、プログラム
US20230147408A1 (en) * 2014-07-29 2023-05-11 Hewlett Packard Enterprise Development Lp Client reputation driven role-based access control

Also Published As

Publication number Publication date
WO2010002638A3 (en) 2011-02-24
JP2011527046A (ja) 2011-10-20
JP5510937B2 (ja) 2014-06-04
CN102171657A (zh) 2011-08-31
US8595282B2 (en) 2013-11-26
CN102171657B (zh) 2014-10-01
US20090328209A1 (en) 2009-12-31

Similar Documents

Publication Publication Date Title
US8595282B2 (en) Simplified communication of a reputation score for an entity
US9262638B2 (en) Hygiene based computer security
US8650647B1 (en) Web site computer security using client hygiene scores
US8499063B1 (en) Uninstall and system performance based software application reputation
US8904520B1 (en) Communication-based reputation system
US8312537B1 (en) Reputation based identification of false positive malware detections
AU2017387092B2 (en) Gathering indicators of compromise for security threat detection
AU2018217323B2 (en) Methods and systems for identifying potential enterprise software threats based on visual and non-visual data
US8239944B1 (en) Reducing malware signature set size through server-side processing
US8001606B1 (en) Malware detection using a white list
US8726391B1 (en) Scheduling malware signature updates in relation to threat awareness and environmental safety
US8381289B1 (en) Communication-based host reputation system
US8095964B1 (en) Peer computer based threat detection
US11861006B2 (en) High-confidence malware severity classification of reference file set
US8015284B1 (en) Discerning use of signatures by third party vendors
US8190647B1 (en) Decision tree induction that is sensitive to attribute computational complexity
US8332947B1 (en) Security threat reporting in light of local security tools
US20070162975A1 (en) Efficient collection of data
EP3374870B1 (en) Threat risk scoring of security threats
CN112055957A (zh) 计算机网络安全评估引擎
US12430437B2 (en) Specific file detection baked into machine learning pipelines
US9009819B1 (en) Method and system for detecting rogue security software that displays frequent misleading warnings
US10367835B1 (en) Methods and apparatus for detecting suspicious network activity by new devices
US20250390576A1 (en) Specific file detection baked into machine learning pipelines

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980123712.X

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09774090

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase

Ref document number: 2011516546

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09774090

Country of ref document: EP

Kind code of ref document: A2