ES2429425B1 - METHOD AND SYSTEM TO DETECT MALINTENTIONED SOFTWARE - Google Patents
METHOD AND SYSTEM TO DETECT MALINTENTIONED SOFTWARE Download PDFInfo
- Publication number
- ES2429425B1 ES2429425B1 ES201230142A ES201230142A ES2429425B1 ES 2429425 B1 ES2429425 B1 ES 2429425B1 ES 201230142 A ES201230142 A ES 201230142A ES 201230142 A ES201230142 A ES 201230142A ES 2429425 B1 ES2429425 B1 ES 2429425B1
- Authority
- ES
- Spain
- Prior art keywords
- malintentioned
- software
- detect
- malintentioned software
- detect malintentioned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn - After Issue
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/12—Computing arrangements based on biological models using genetic models
- G06N3/126—Evolutionary algorithms, e.g. genetic algorithms or genetic programming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biophysics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Evolutionary Biology (AREA)
- Bioinformatics & Computational Biology (AREA)
- General Health & Medical Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Biomedical Technology (AREA)
- Artificial Intelligence (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Evolutionary Computation (AREA)
- Molecular Biology (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Genetics & Genomics (AREA)
- Virology (AREA)
- Physiology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Multi Processors (AREA)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| ES201230142A ES2429425B1 (en) | 2012-01-31 | 2012-01-31 | METHOD AND SYSTEM TO DETECT MALINTENTIONED SOFTWARE |
| PCT/EP2013/050237 WO2013113532A1 (en) | 2012-01-30 | 2013-01-08 | A method and a system to detect malicious software |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| ES201230142A ES2429425B1 (en) | 2012-01-31 | 2012-01-31 | METHOD AND SYSTEM TO DETECT MALINTENTIONED SOFTWARE |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| ES2429425A2 ES2429425A2 (en) | 2013-11-14 |
| ES2429425R1 ES2429425R1 (en) | 2013-12-09 |
| ES2429425B1 true ES2429425B1 (en) | 2015-03-10 |
Family
ID=47594649
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| ES201230142A Withdrawn - After Issue ES2429425B1 (en) | 2012-01-30 | 2012-01-31 | METHOD AND SYSTEM TO DETECT MALINTENTIONED SOFTWARE |
Country Status (2)
| Country | Link |
|---|---|
| ES (1) | ES2429425B1 (en) |
| WO (1) | WO2013113532A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11930019B2 (en) | 2021-04-21 | 2024-03-12 | Saudi Arabian Oil Company | Methods and systems for fast-paced dynamic malware analysis |
Families Citing this family (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2520987B (en) * | 2013-12-06 | 2016-06-01 | Cyberlytic Ltd | Using fuzzy logic to assign a risk level profile to a potential cyber threat |
| US9473520B2 (en) | 2013-12-17 | 2016-10-18 | Verisign, Inc. | Systems and methods for incubating malware in a virtual organization |
| US9398034B2 (en) | 2013-12-19 | 2016-07-19 | Microsoft Technology Licensing, Llc | Matrix factorization for automated malware detection |
| US9769189B2 (en) | 2014-02-21 | 2017-09-19 | Verisign, Inc. | Systems and methods for behavior-based automated malware analysis and classification |
| WO2015160367A1 (en) | 2014-04-18 | 2015-10-22 | Hewlett-Packard Development Company, L.P. | Pre-cognitive security information and event management |
| US9485263B2 (en) | 2014-07-16 | 2016-11-01 | Microsoft Technology Licensing, Llc | Volatility-based classifier for security solutions |
| US9619648B2 (en) | 2014-07-16 | 2017-04-11 | Microsoft Technology Licensing, Llc | Behavior change detection system for services |
| US9819690B2 (en) * | 2014-10-30 | 2017-11-14 | Empire Technology Development Llc | Malicious virtual machine alert generator |
| CN104506507B (en) * | 2014-12-15 | 2017-10-10 | 蓝盾信息安全技术股份有限公司 | A kind of sweet net safety protective system and method for SDN |
| US9923954B2 (en) | 2014-12-16 | 2018-03-20 | International Business Machines Corporation | Virtual fencing gradient to incrementally validate deployed applications directly in production cloud computing environment |
| US20160191550A1 (en) * | 2014-12-29 | 2016-06-30 | Fireeye, Inc. | Microvisor-based malware detection endpoint architecture |
| US12177235B2 (en) | 2015-01-30 | 2024-12-24 | Comcast Cable Communications, Llc | Process for identifying a compromised device |
| US10110622B2 (en) | 2015-02-13 | 2018-10-23 | Microsoft Technology Licensing, Llc | Security scanner |
| US9906542B2 (en) | 2015-03-30 | 2018-02-27 | Microsoft Technology Licensing, Llc | Testing frequency control using a volatility score |
| US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
| US9866575B2 (en) | 2015-10-02 | 2018-01-09 | General Electric Company | Management and distribution of virtual cyber sensors |
| US12153674B2 (en) | 2016-04-15 | 2024-11-26 | Sophos Limited | Tracking malware root causes with an event graph |
| US9967267B2 (en) | 2016-04-15 | 2018-05-08 | Sophos Limited | Forensic analysis of computing activity |
| CN108718296A (en) * | 2018-04-27 | 2018-10-30 | 广州西麦科技股份有限公司 | Network management-control method, device and computer readable storage medium based on SDN network |
| US11070588B2 (en) | 2018-06-11 | 2021-07-20 | International Business Machines Corporation | Cognitive malicious activity identification and handling |
| US10733292B2 (en) | 2018-07-10 | 2020-08-04 | International Business Machines Corporation | Defending against model inversion attacks on neural networks |
| CN111338297B (en) * | 2019-12-31 | 2022-04-12 | 南京联成科技发展股份有限公司 | An industrial control security framework system based on industrial cloud |
| CN113010437B (en) * | 2021-04-27 | 2023-04-28 | 中国人民解放军国防科技大学 | Software system reliability management method and system based on fault analysis |
| US11818172B1 (en) | 2021-08-24 | 2023-11-14 | Amdocs Development Limited | System, method, and computer program for a computer attack response service |
| CN117955750B (en) * | 2024-03-27 | 2024-07-05 | 南昌大学 | A network robot behavior detection method based on semi-supervised fuzzy comprehensive evaluation method |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2442525A1 (en) * | 2005-12-13 | 2012-04-18 | Crossbeam Systems, Inc. | Systems and methods for processing data flows |
| US8677479B2 (en) | 2007-04-16 | 2014-03-18 | Microsoft Corporation | Detection of adversaries through collection and correlation of assessments |
| GB0822619D0 (en) | 2008-12-11 | 2009-01-21 | Scansafe Ltd | Malware detection |
-
2012
- 2012-01-31 ES ES201230142A patent/ES2429425B1/en not_active Withdrawn - After Issue
-
2013
- 2013-01-08 WO PCT/EP2013/050237 patent/WO2013113532A1/en active Application Filing
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11930019B2 (en) | 2021-04-21 | 2024-03-12 | Saudi Arabian Oil Company | Methods and systems for fast-paced dynamic malware analysis |
Also Published As
| Publication number | Publication date |
|---|---|
| ES2429425R1 (en) | 2013-12-09 |
| ES2429425A2 (en) | 2013-11-14 |
| WO2013113532A1 (en) | 2013-08-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ES2429425B1 (en) | METHOD AND SYSTEM TO DETECT MALINTENTIONED SOFTWARE | |
| BR112013018981A2 (en) | system and method | |
| BR112014013743A2 (en) | system and method | |
| PL2919994T3 (en) | SYSTEM AND PRINTING METHOD | |
| GB2523013B (en) | Method and system to detect and select best photographs | |
| BR112015009932A2 (en) | method and system. | |
| BR112014029343A2 (en) | device and system | |
| BR112014019965A2 (en) | computer-implemented method and performance recovery system | |
| BR112013030255A2 (en) | information management method and system adapted to it | |
| BR112014013600A2 (en) | system and method | |
| BR112014002937A2 (en) | security system and method | |
| BR112014026572A2 (en) | bearing monitoring method and system | |
| BR112014012419A2 (en) | method implemented by computer and system | |
| BR112014000317A2 (en) | set and system | |
| BR112014026864A2 (en) | system, and method | |
| BR112015012653A2 (en) | thrust reversal system and reversal thrust method | |
| BR112014031384A2 (en) | methods and systems | |
| DK2875460T3 (en) | Anti-cloning system and method | |
| BR112014009638A2 (en) | profiling method and profiling system | |
| BR112014015862A2 (en) | method and system | |
| BR112015013155A2 (en) | method, and system | |
| BR112014031082A2 (en) | method and system to provide control and standstill capability | |
| BR112014007864A2 (en) | system, and method | |
| EP2820406A4 (en) | POLLUTION PREVENTION AND METHOD | |
| BR112015007390A2 (en) | biomass conversion system and method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FG2A | Definitive protection |
Ref document number: 2429425 Country of ref document: ES Kind code of ref document: B1 Effective date: 20150310 |
|
| FA2A | Application withdrawn |
Effective date: 20150721 |