[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

SG10202008842WA - Method and system for determining network vulnerabilities - Google Patents

Method and system for determining network vulnerabilities

Info

Publication number
SG10202008842WA
SG10202008842WA SG10202008842WA SG10202008842WA SG10202008842WA SG 10202008842W A SG10202008842W A SG 10202008842WA SG 10202008842W A SG10202008842W A SG 10202008842WA SG 10202008842W A SG10202008842W A SG 10202008842WA SG 10202008842W A SG10202008842W A SG 10202008842WA
Authority
SG
Singapore
Prior art keywords
determining network
network vulnerabilities
vulnerabilities
determining
network
Prior art date
Application number
SG10202008842WA
Inventor
Kuzmin Anton
Original Assignee
Group Ib Tds Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Group Ib Tds Ltd filed Critical Group Ib Tds Ltd
Publication of SG10202008842WA publication Critical patent/SG10202008842WA/en

Links

SG10202008842WA 2019-12-19 2020-09-10 Method and system for determining network vulnerabilities SG10202008842WA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
RU2019142440A RU2743974C1 (en) 2019-12-19 2019-12-19 System and method for scanning security of elements of network architecture

Publications (1)

Publication Number Publication Date
SG10202008842WA true SG10202008842WA (en) 2021-07-29

Family

ID=74857597

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10202008842WA SG10202008842WA (en) 2019-12-19 2020-09-10 Method and system for determining network vulnerabilities

Country Status (4)

Country Link
US (1) US11356470B2 (en)
NL (1) NL2026468B1 (en)
RU (1) RU2743974C1 (en)
SG (1) SG10202008842WA (en)

Family Cites Families (228)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7389351B2 (en) 2001-03-15 2008-06-17 Microsoft Corporation System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
US7565692B1 (en) 2000-05-30 2009-07-21 At&T Wireless Services, Inc. Floating intrusion detection platforms
ATE344573T1 (en) 2000-11-30 2006-11-15 Lancope Inc FLOW-BASED NETWORK INTRUSION DETECTION
US20030028803A1 (en) * 2001-05-18 2003-02-06 Bunker Nelson Waldo Network vulnerability assessment system and method
US7325252B2 (en) 2001-05-18 2008-01-29 Achilles Guard Inc. Network security testing
US20090138342A1 (en) 2001-11-14 2009-05-28 Retaildna, Llc Method and system for providing an employee award using artificial intelligence
US7512980B2 (en) 2001-11-30 2009-03-31 Lancope, Inc. Packet sampling flow-based detection of network intrusions
US7225343B1 (en) 2002-01-25 2007-05-29 The Trustees Of Columbia University In The City Of New York System and methods for adaptive model generation for detecting intrusions in computer systems
US8132250B2 (en) 2002-03-08 2012-03-06 Mcafee, Inc. Message profiling systems and methods
EP1349081A1 (en) 2002-03-28 2003-10-01 LION Bioscience AG Method and apparatus for querying relational databases
US7496628B2 (en) 2003-02-25 2009-02-24 Susquehanna International Group, Llp Electronic message filter
US20040193918A1 (en) 2003-03-28 2004-09-30 Kenneth Green Apparatus and method for network vulnerability detection and compliance assessment
US20040221171A1 (en) 2003-05-02 2004-11-04 Ahmed Ahmed Awad E. Intrusion detector based on mouse dynamics analysis
US7926113B1 (en) * 2003-06-09 2011-04-12 Tenable Network Security, Inc. System and method for managing network vulnerability analysis systems
US8839417B1 (en) 2003-11-17 2014-09-16 Mcafee, Inc. Device, system and method for defending a computer network
US8990928B1 (en) 2003-12-11 2015-03-24 Radix Holdings, Llc URL salience
US7392278B2 (en) 2004-01-23 2008-06-24 Microsoft Corporation Building and using subwebs for focused search
US20050193429A1 (en) 2004-01-23 2005-09-01 The Barrier Group Integrated data traffic monitoring system
US8528086B1 (en) 2004-04-01 2013-09-03 Fireeye, Inc. System and method of detecting computer worms
US8561177B1 (en) 2004-04-01 2013-10-15 Fireeye, Inc. Systems and methods for detecting communication channels of bots
US8539582B1 (en) 2004-04-01 2013-09-17 Fireeye, Inc. Malware containment and security analysis on connection
US7953814B1 (en) 2005-02-28 2011-05-31 Mcafee, Inc. Stopping and remediating outbound messaging abuse
WO2006032028A2 (en) 2004-09-13 2006-03-23 Reactivity, Inc. Metric-based monitoring and control of a limited resource
US7540025B2 (en) 2004-11-18 2009-05-26 Cisco Technology, Inc. Mitigating network attacks using automatic signature generation
US20060253582A1 (en) 2005-05-03 2006-11-09 Dixon Christopher J Indicating website reputations within search results
CA2607005C (en) 2005-05-05 2012-02-07 Ironport Systems, Inc. Identifying threats in electronic messages
US7609625B2 (en) 2005-07-06 2009-10-27 Fortinet, Inc. Systems and methods for detecting and preventing flooding attacks in a network environment
US7730040B2 (en) 2005-07-27 2010-06-01 Microsoft Corporation Feedback-driven malware detector
US7707284B2 (en) 2005-08-03 2010-04-27 Novell, Inc. System and method of searching for classifying user activity performed on a computer system
KR20070049514A (en) 2005-11-08 2007-05-11 한국정보보호진흥원 Malignant code monitor system and monitoring method using thereof
US8650080B2 (en) 2006-04-10 2014-02-11 International Business Machines Corporation User-browser interaction-based fraud detection system
CA2648997A1 (en) 2006-04-13 2007-10-25 Art Of Defence Gmbh Method for providing web application security
US7930256B2 (en) 2006-05-23 2011-04-19 Charles River Analytics, Inc. Security system for and method of detecting and responding to cyber attacks on large network systems
US8533819B2 (en) 2006-09-29 2013-09-10 At&T Intellectual Property Ii, L.P. Method and apparatus for detecting compromised host computers
US7984500B1 (en) 2006-10-05 2011-07-19 Amazon Technologies, Inc. Detecting fraudulent activity by analysis of information requests
US8176178B2 (en) 2007-01-29 2012-05-08 Threatmetrix Pty Ltd Method for tracking machines on a network using multivariable fingerprinting of passively available information
US20080295173A1 (en) * 2007-05-21 2008-11-27 Tsvetomir Iliev Tsvetanov Pattern-based network defense mechanism
US7865953B1 (en) 2007-05-31 2011-01-04 Trend Micro Inc. Methods and arrangement for active malicious web pages discovery
JP2011517859A (en) 2007-08-06 2011-06-16 モンセーヌ,ベルナール ドゥ Systems and methods for authentication, data transfer and phishing protection
US8238669B2 (en) 2007-08-22 2012-08-07 Google Inc. Detection and classification of matches between time-based media
US7958555B1 (en) 2007-09-28 2011-06-07 Trend Micro Incorporated Protecting computer users from online frauds
US9779403B2 (en) 2007-12-07 2017-10-03 Jpmorgan Chase Bank, N.A. Mobile fraud prevention system and method
US8949990B1 (en) * 2007-12-21 2015-02-03 Trend Micro Inc. Script-based XSS vulnerability detection
WO2009106998A1 (en) 2008-02-28 2009-09-03 Ipharro Media Gmbh Frame sequence comparison in multimedia streams
US8082187B2 (en) 2008-05-07 2011-12-20 AcademixDirect, Inc. Method of generating a referral website URL using website listings in a cookie
US8856937B1 (en) 2008-06-27 2014-10-07 Symantec Corporation Methods and systems for identifying fraudulent websites
US20140250145A1 (en) 2008-07-10 2014-09-04 Chacha Search, Inc Method and system of providing verified content
US10027688B2 (en) 2008-08-11 2018-07-17 Damballa, Inc. Method and system for detecting malicious and/or botnet-related domain names
US8621635B2 (en) 2008-08-18 2013-12-31 Microsoft Corporation Web page privacy risk detection
US8086480B2 (en) 2008-09-25 2011-12-27 Ebay Inc. Methods and systems for activity-based recommendations
US9177144B2 (en) 2008-10-30 2015-11-03 Mcafee, Inc. Structural recognition of malicious code patterns
US8850571B2 (en) 2008-11-03 2014-09-30 Fireeye, Inc. Systems and methods for detecting malicious network content
US8578491B2 (en) 2008-12-11 2013-11-05 Alcatel Lucent Network based malware detection and reporting
US8285830B1 (en) 2009-01-06 2012-10-09 Citizenhawk, Inc. System and method for combating cybersquatting
US8448245B2 (en) 2009-01-17 2013-05-21 Stopthehacker.com, Jaal LLC Automated identification of phishing, phony and malicious web sites
US8695091B2 (en) 2009-02-11 2014-04-08 Sophos Limited Systems and methods for enforcing policies for proxy website detection using advertising account ID
US8090729B2 (en) 2009-03-03 2012-01-03 Microsoft Corporation Large graph measurement
US8429751B2 (en) 2009-03-13 2013-04-23 Trustwave Holdings, Inc. Method and apparatus for phishing and leeching vulnerability detection
US8229219B1 (en) 2009-08-06 2012-07-24 Google Inc. Full-length video fingerprinting
US8600993B1 (en) 2009-08-26 2013-12-03 Google Inc. Determining resource attributes from site address attributes
US8396857B2 (en) 2009-08-31 2013-03-12 Accenture Global Services Limited System to modify websites for organic search optimization
GB2474545B (en) 2009-09-24 2015-06-24 Fisher Rosemount Systems Inc Integrated unified threat management for a process control system
US8572740B2 (en) 2009-10-01 2013-10-29 Kaspersky Lab, Zao Method and system for detection of previously unknown malware
EP2323046A1 (en) 2009-10-16 2011-05-18 Telefónica, S.A. Method for detecting audio and video copy in multimedia streams
US8625033B1 (en) 2010-02-01 2014-01-07 Google Inc. Large-scale matching of audio and video
US9501644B2 (en) 2010-03-15 2016-11-22 F-Secure Oyj Malware protection
US8612463B2 (en) 2010-06-03 2013-12-17 Palo Alto Research Center Incorporated Identifying activities using a hybrid user-activity model
US8260914B1 (en) 2010-06-22 2012-09-04 Narus, Inc. Detecting DNS fast-flux anomalies
US8839441B2 (en) * 2010-06-28 2014-09-16 Infosys Limited Method and system for adaptive vulnerability scanning of an application
US9246932B2 (en) 2010-07-19 2016-01-26 Sitelock, Llc Selective website vulnerability and infection testing
RU2446459C1 (en) 2010-07-23 2012-03-27 Закрытое акционерное общество "Лаборатория Касперского" System and method for checking web resources for presence of malicious components
CA2806699A1 (en) 2010-07-26 2012-02-02 Ki Yong Kim Hacker virus security-integrated control device
US8924488B2 (en) 2010-07-27 2014-12-30 At&T Intellectual Property I, L.P. Employing report ratios for intelligent mobile messaging classification and anti-spam defense
EP2609538B1 (en) 2010-08-25 2016-10-19 Lookout Inc. System and method for server-coupled malware prevention
AU2011293160B2 (en) 2010-08-26 2015-04-09 Verisign, Inc. Method and system for automatic detection and analysis of malware
US8837769B2 (en) 2010-10-06 2014-09-16 Futurewei Technologies, Inc. Video signature based on image hashing and shot detection
US9626677B2 (en) 2010-11-29 2017-04-18 Biocatch Ltd. Identification of computerized bots, and identification of automated cyber-attack modules
US8521667B2 (en) 2010-12-15 2013-08-27 Microsoft Corporation Detection and categorization of malicious URLs
CN102082792A (en) 2010-12-31 2011-06-01 成都市华为赛门铁克科技有限公司 Phishing webpage detection method and device
US8972412B1 (en) 2011-01-31 2015-03-03 Go Daddy Operating Company, LLC Predicting improvement in website search engine rankings based upon website linking relationships
US8726376B2 (en) 2011-03-11 2014-05-13 Openet Telecom Ltd. Methods, systems and devices for the detection and prevention of malware within a network
US8402543B1 (en) 2011-03-25 2013-03-19 Narus, Inc. Machine learning based botnet detection with dynamic adaptation
RU107616U1 (en) 2011-03-28 2011-08-20 Закрытое акционерное общество "Лаборатория Касперского" SYSTEM OF QUICK ANALYSIS OF DATA STREAM ON THE AVAILABILITY OF MALICIOUS OBJECTS
US9363278B2 (en) 2011-05-11 2016-06-07 At&T Mobility Ii Llc Dynamic and selective response to cyber attack for telecommunications carrier networks
US8151341B1 (en) 2011-05-23 2012-04-03 Kaspersky Lab Zao System and method for reducing false positives during detection of network attacks
US8555388B1 (en) 2011-05-24 2013-10-08 Palo Alto Networks, Inc. Heuristic botnet detection
WO2013009713A2 (en) 2011-07-08 2013-01-17 Uab Research Foundation Syntactical fingerprinting
WO2013008778A1 (en) 2011-07-11 2013-01-17 Mizunuma Takeshi Identifier management method and system
GB2493514B (en) 2011-08-02 2015-04-08 Qatar Foundation Copy detection
US8677472B1 (en) 2011-09-27 2014-03-18 Emc Corporation Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server
US8645355B2 (en) 2011-10-21 2014-02-04 Google Inc. Mapping Uniform Resource Locators of different indexes
US8584235B2 (en) 2011-11-02 2013-11-12 Bitdefender IPR Management Ltd. Fuzzy whitelisting anti-malware systems and methods
US9519781B2 (en) 2011-11-03 2016-12-13 Cyphort Inc. Systems and methods for virtualization and emulation assisted malware detection
RU2487406C1 (en) 2011-11-24 2013-07-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of detecting malicious entities distributed over peer-to-peer networks
US8635700B2 (en) 2011-12-06 2014-01-21 Raytheon Company Detecting malware using stored patterns
US8660296B1 (en) 2012-01-10 2014-02-25 Google Inc. Systems and methods for facilitating video fingerprinting using local descriptors
US9111090B2 (en) 2012-04-02 2015-08-18 Trusteer, Ltd. Detection of phishing attempts
RU2523114C2 (en) 2012-04-06 2014-07-20 Закрытое акционерное общество "Лаборатория Касперского" Method of analysing malicious activity on internet, detecting malicious network nodes and neighbouring intermediate nodes
US10304036B2 (en) 2012-05-07 2019-05-28 Nasdaq, Inc. Social media profiling for one or more authors using one or more social media platforms
RU2488880C1 (en) 2012-05-11 2013-07-27 Закрытое акционерное общество "Лаборатория Касперского" System and method of adaptive optimisation of inspection of data flow sent in network for availability of threats
US9497212B2 (en) 2012-05-21 2016-11-15 Fortinet, Inc. Detecting malicious resources in a network based upon active client reputation monitoring
US20150200962A1 (en) 2012-06-04 2015-07-16 The Board Of Regents Of The University Of Texas System Method and system for resilient and adaptive detection of malicious websites
US9154517B2 (en) 2012-06-19 2015-10-06 AO Kaspersky Lab System and method for preventing spread of malware in peer-to-peer network
US9043920B2 (en) 2012-06-27 2015-05-26 Tenable Network Security, Inc. System and method for identifying exploitable weak points in a network
EP2877956B1 (en) 2012-07-24 2019-07-17 Webroot Inc. System and method to provide automatic classification of phishing sites
RU2495486C1 (en) 2012-08-10 2013-10-10 Закрытое акционерное общество "Лаборатория Касперского" Method of analysing and detecting malicious intermediate nodes in network
US10110601B1 (en) 2012-08-16 2018-10-23 Paypal, Inc. Systems and methods for protecting users from malicious content
CN103685174B (en) 2012-09-07 2016-12-21 中国科学院计算机网络信息中心 A kind of detection method for phishing site of independent of sample
US9386030B2 (en) 2012-09-18 2016-07-05 Vencore Labs, Inc. System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
US9215239B1 (en) 2012-09-28 2015-12-15 Palo Alto Networks, Inc. Malware detection based on traffic analysis
US10965775B2 (en) 2012-11-20 2021-03-30 Airbnb, Inc. Discovering signature of electronic social networks
RU2522019C1 (en) 2012-12-25 2014-07-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of detecting threat in code executed by virtual machine
RU2536664C2 (en) 2012-12-25 2014-12-27 Закрытое акционерное общество "Лаборатория Касперского" System and method for automatic modification of antivirus database
RU2530210C2 (en) 2012-12-25 2014-10-10 Закрытое акционерное общество "Лаборатория Касперского" System and method for detecting malware preventing standard user interaction with operating system interface
RU129279U1 (en) * 2013-01-09 2013-06-20 ОБЩЕСТВО С ОГРАНИЧЕННОЙ ОТВЕТСТВЕННОСТЬЮ "МФИ Софт" DEVICE FOR DETECTION AND PROTECTION AGAINST ANOMALOUS ACTIVITY ON DATA TRANSMISSION NETWORKS
US20160127402A1 (en) 2014-11-04 2016-05-05 Patternex, Inc. Method and apparatus for identifying and detecting threats to an enterprise or e-commerce system
US10425429B2 (en) 2013-04-10 2019-09-24 Gabriel Bassett System and method for cyber security analysis and human behavior prediction
GB201306628D0 (en) 2013-04-11 2013-05-29 F Secure Oyj Detecting and marking client devices
US20160055490A1 (en) 2013-04-11 2016-02-25 Brandshield Ltd. Device, system, and method of protecting brand names and domain names
GB2513168B (en) 2013-04-18 2017-12-27 F Secure Corp Detecting unauthorised changes to website content
WO2014184711A2 (en) 2013-05-13 2014-11-20 Yandex Europe Ag Method of and system for providing a client device with an automatic update of an ip address associated with a domain name
US9357469B2 (en) 2013-05-29 2016-05-31 Rivada Networks, Llc Methods and system for dynamic spectrum arbitrage with mobility management
US20140380480A1 (en) 2013-06-25 2014-12-25 Tencent Technology (Shenzhen) Company Limited Method, device and system for identifying harmful websites
US9443075B2 (en) 2013-06-27 2016-09-13 The Mitre Corporation Interception and policy application for malicious communications
CN103368958A (en) 2013-07-05 2013-10-23 腾讯科技(深圳)有限公司 Method, device and system for detecting webpage
RU2538292C1 (en) 2013-07-24 2015-01-10 Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" Method of detecting computer attacks to networked computer system
KR102120823B1 (en) 2013-08-14 2020-06-09 삼성전자주식회사 Method of controlling read sequence of nov-volatile memory device and memory system performing the same
CN103491205B (en) 2013-09-30 2016-08-17 北京奇虎科技有限公司 The method for pushing of a kind of correlated resources address based on video search and device
US9330258B1 (en) 2013-09-30 2016-05-03 Symantec Corporation Systems and methods for identifying uniform resource locators that link to potentially malicious resources
BR112016007145A8 (en) 2013-10-21 2020-03-03 Microsoft Technology Licensing Llc method for searching layered audio-video, method for building a layered audio-video index, system, computer-readable medium, mobile device and computing device
GB2520987B (en) 2013-12-06 2016-06-01 Cyberlytic Ltd Using fuzzy logic to assign a risk level profile to a potential cyber threat
IN2013CH05744A (en) 2013-12-12 2015-06-19 Infosys Ltd
US20150363791A1 (en) 2014-01-10 2015-12-17 Hybrid Application Security Ltd. Business action based fraud detection system and method
US9262635B2 (en) 2014-02-05 2016-02-16 Fireeye, Inc. Detection efficacy of virtual machine-based analysis with application specific events
US9060018B1 (en) 2014-02-05 2015-06-16 Pivotal Software, Inc. Finding command and control center computers by communication link tracking
KR101514984B1 (en) 2014-03-03 2015-04-24 (주)엠씨알시스템 Detecting system for detecting Homepage spreading Virus and Detecting method thereof
US9338181B1 (en) 2014-03-05 2016-05-10 Netflix, Inc. Network security system with remediation based on value of attacked assets
US9292691B1 (en) 2014-03-12 2016-03-22 Symantec Corporation Systems and methods for protecting users from website security risks using templates
RU2543564C1 (en) 2014-03-20 2015-03-10 Закрытое акционерное общество "Научно-производственное предприятие "Информационные технологии в бизнесе" System of detection and prevention of intrusions based on control of access to resources
CN104980309B (en) * 2014-04-11 2018-04-20 北京奇安信科技有限公司 website security detection method and device
US9853997B2 (en) 2014-04-14 2017-12-26 Drexel University Multi-channel change-point malware detection
US9332022B1 (en) 2014-07-07 2016-05-03 Symantec Corporation Systems and methods for detecting suspicious internet addresses
US9800592B2 (en) 2014-08-04 2017-10-24 Microsoft Technology Licensing, Llc Data center architecture that supports attack detection and mitigation
US20160036837A1 (en) 2014-08-04 2016-02-04 Microsoft Corporation Detecting attacks on data centers
US9942250B2 (en) 2014-08-06 2018-04-10 Norse Networks, Inc. Network appliance for dynamic protection from risky network activities
KR101587161B1 (en) 2014-09-03 2016-01-20 한국전자통신연구원 Apparatus and method for real-time network antivirus
US9026841B1 (en) 2014-09-09 2015-05-05 Belkin International, Inc. Coordinated and device-distributed detection of abnormal network device operation
RU2589310C2 (en) 2014-09-30 2016-07-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of calculating interval of repeated determination of categories of network resource
WO2016064919A1 (en) 2014-10-21 2016-04-28 Abramowitz Marc Lauren Dynamic security rating for cyber insurance products
US10338191B2 (en) 2014-10-30 2019-07-02 Bastille Networks, Inc. Sensor mesh and signal transmission architectures for electromagnetic signature analysis
US20160142429A1 (en) 2014-11-19 2016-05-19 Royce Renteria Preventing access to malicious content
GB2532475B (en) * 2014-11-20 2017-03-08 F Secure Corp Integrity check of DNS server setting
JP6916112B2 (en) 2014-11-21 2021-08-11 ブルヴェクター, インコーポレーテッドBluvector, Inc. Network data characterization system and method
US10574675B2 (en) 2014-12-05 2020-02-25 T-Mobile Usa, Inc. Similarity search for discovering multiple vector attacks
US9367872B1 (en) 2014-12-22 2016-06-14 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9934376B1 (en) 2014-12-29 2018-04-03 Fireeye, Inc. Malware detection appliance architecture
US10230526B2 (en) 2014-12-31 2019-03-12 William Manning Out-of-band validation of domain name system records
US9712549B2 (en) 2015-01-08 2017-07-18 Imam Abdulrahman Bin Faisal University System, apparatus, and method for detecting home anomalies
CN104504307B (en) 2015-01-08 2017-09-29 北京大学 Audio frequency and video copy detection method and device based on copy cell
KR20160095856A (en) 2015-02-04 2016-08-12 한국전자통신연구원 System and method for detecting intrusion intelligently based on automatic detection of new attack type and update of attack type
US11328307B2 (en) 2015-02-24 2022-05-10 OpSec Online, Ltd. Brand abuse monitoring system with infringement detection engine and graphical user interface
EP3065076A1 (en) 2015-03-04 2016-09-07 Secure-Nok AS System and method for responding to a cyber-attack-related incident against an industrial control system
US9253208B1 (en) 2015-03-05 2016-02-02 AO Kaspersky Lab System and method for automated phishing detection rule evolution
US9769201B2 (en) 2015-03-06 2017-09-19 Radware, Ltd. System and method thereof for multi-tiered mitigation of cyber-attacks
US9712553B2 (en) 2015-03-27 2017-07-18 The Boeing Company System and method for developing a cyber-attack scenario
US20160308898A1 (en) 2015-04-20 2016-10-20 Phirelight Security Solutions Inc. Systems and methods for tracking, analyzing and mitigating security threats in networks via a network traffic analysis platform
US10284595B2 (en) 2015-05-08 2019-05-07 Citrix Systems, Inc. Combining internet routing information with access logs to assess risk of user exposure
US10129239B2 (en) 2015-05-08 2018-11-13 Citrix Systems, Inc. Systems and methods for performing targeted scanning of a target range of IP addresses to verify security certificates
US10536357B2 (en) 2015-06-05 2020-01-14 Cisco Technology, Inc. Late data detection in data center
US10382484B2 (en) 2015-06-08 2019-08-13 Illusive Networks Ltd. Detecting attackers who target containerized clusters
US9917852B1 (en) 2015-06-29 2018-03-13 Palo Alto Networks, Inc. DGA behavior detection
RU164629U1 (en) 2015-06-30 2016-09-10 Акционерное общество "Институт точной механики и вычислительной техники имени С.А. Лебедева Российской академии наук" ELECTRONIC MODULE OF PROTECTION AGAINST NETWORK ATTACKS ON THE BASIS OF THE NETWORK PROCESSOR NP-5
EP3125147B1 (en) 2015-07-27 2020-06-03 Swisscom AG System and method for identifying a phishing website
US9456000B1 (en) 2015-08-06 2016-09-27 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
CN106506435B (en) 2015-09-08 2019-08-06 中国电信股份有限公司 For detecting the method and firewall system of network attack
US9654492B2 (en) 2015-09-15 2017-05-16 Mimecast North America, Inc. Malware detection system based on stored data
WO2017049045A1 (en) 2015-09-16 2017-03-23 RiskIQ, Inc. Using hash signatures of dom objects to identify website similarity
US9825989B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Cyber attack early warning system
KR101703446B1 (en) 2015-10-15 2017-02-06 숭실대학교산학협력단 Network capable of detection DoS attacks and Method for controlling thereof, Gateway and Managing server comprising the network
CN105429955B (en) 2015-10-30 2018-12-11 西安四叶草信息技术有限公司 A kind of detection method of long-range loophole
CN105429956B (en) 2015-11-02 2018-09-25 重庆大学 Malware detection system based on P2P dynamic clouds and method
US10200382B2 (en) 2015-11-05 2019-02-05 Radware, Ltd. System and method for detecting abnormal traffic behavior using infinite decaying clusters
RU2622870C2 (en) 2015-11-17 2017-06-20 Общество с ограниченной ответственностью "САЙТСЕКЬЮР" System and method for evaluating malicious websites
US9894036B2 (en) 2015-11-17 2018-02-13 Cyber Adapt, Inc. Cyber threat attenuation using multi-source threat data analysis
CN106709777A (en) 2015-11-18 2017-05-24 阿里巴巴集团控股有限公司 Order clustering method and apparatus thereof, and anti-malicious information method and apparatus thereof
US10594710B2 (en) 2015-11-20 2020-03-17 Webroot Inc. Statistical analysis of network behavior using event vectors to identify behavioral anomalies using a composite score
RU2613535C1 (en) 2015-11-20 2017-03-16 Илья Самуилович Рабинович Method for detecting malicious software and elements
US10212175B2 (en) 2015-11-30 2019-02-19 International Business Machines Corporation Attracting and analyzing spam postings
JP6239215B2 (en) 2015-12-14 2017-11-29 三菱電機株式会社 Information processing apparatus, information processing method, and information processing program
US9723344B1 (en) 2015-12-29 2017-08-01 Google Inc. Early detection of policy violating media
US11069370B2 (en) 2016-01-11 2021-07-20 University Of Tennessee Research Foundation Tampering detection and location identification of digital audio recordings
US10440050B1 (en) 2016-01-27 2019-10-08 United Services Automobile Association (Usaa) Identifying sensitive data on computer networks
RU2628192C2 (en) 2016-01-27 2017-08-15 Акционерное общество "Творческо-производственное объединение "Центральная киностудия детских и юношеских фильмов им. М. Горького" Device for semantic classification and search in archives of digitized film materials
US9900338B2 (en) 2016-02-09 2018-02-20 International Business Machines Corporation Forecasting and classifying cyber-attacks using neural embeddings based on pattern of life data
CA3015697C (en) 2016-02-29 2022-11-22 Securekey Technologies Inc. Systems and methods for distributed identity verification
US10482242B2 (en) 2016-03-08 2019-11-19 Tanium Inc. System and method for performing event inquiries in a network
US10063572B2 (en) 2016-03-28 2018-08-28 Accenture Global Solutions Limited Antivirus signature distribution with distributed ledger
US10313382B2 (en) 2016-03-29 2019-06-04 The Mitre Corporation System and method for visualizing and analyzing cyber-attacks using a graph model
US9838407B1 (en) 2016-03-30 2017-12-05 EMC IP Holding Company LLC Detection of malicious web activity in enterprise computer networks
US10212145B2 (en) 2016-04-06 2019-02-19 Avaya Inc. Methods and systems for creating and exchanging a device specific blockchain for device authentication
US10178107B2 (en) 2016-04-06 2019-01-08 Cisco Technology, Inc. Detection of malicious domains using recurring patterns in domain names
CN105897714B (en) 2016-04-11 2018-11-09 天津大学 Botnet detection method based on DNS traffic characteristics
RU2625050C1 (en) 2016-04-25 2017-07-11 Акционерное общество "Лаборатория Касперского" System and method of transactions trusted declaration
US11223598B2 (en) 2016-05-03 2022-01-11 Nokia Of America Corporation Internet security
RU2634211C1 (en) 2016-07-06 2017-10-24 Общество с ограниченной ответственностью "Траст" Method and system of protocols analysis of harmful programs interaction with control centers and detection of computer attacks
RU2636702C1 (en) 2016-07-07 2017-11-27 Общество С Ограниченной Ответственностью "Яндекс" Method and device for selecting network resource as source of content in recommendations system
US20180012144A1 (en) 2016-07-11 2018-01-11 Qualcomm Innovation Center, Inc. Incremental and speculative analysis of javascripts based on a multi-instance model for web security
CN106131016B (en) 2016-07-13 2019-05-03 北京知道创宇信息技术有限公司 Malice URL detects interference method, system and device
US10212133B2 (en) 2016-07-29 2019-02-19 ShieldX Networks, Inc. Accelerated pattern matching using pattern functions
WO2018025157A1 (en) 2016-07-31 2018-02-08 Cymmetria, Inc. Deploying deception campaigns using communication breadcrumbs
US10498761B2 (en) 2016-08-23 2019-12-03 Duo Security, Inc. Method for identifying phishing websites and hindering associated activity
RU2634209C1 (en) 2016-09-19 2017-10-24 Общество с ограниченной ответственностью "Группа АйБи ТДС" System and method of autogeneration of decision rules for intrusion detection systems with feedback
US10313352B2 (en) 2016-10-26 2019-06-04 International Business Machines Corporation Phishing detection with machine learning
WO2018095192A1 (en) 2016-11-23 2018-05-31 腾讯科技(深圳)有限公司 Method and system for website attack detection and prevention
US10715543B2 (en) 2016-11-30 2020-07-14 Agari Data, Inc. Detecting computer security risk based on previously observed communications
CN106713312A (en) 2016-12-21 2017-05-24 深圳市深信服电子科技有限公司 Method and device for detecting illegal domain name
US10721262B2 (en) 2016-12-28 2020-07-21 Palantir Technologies Inc. Resource-centric network cyber attack warning system
CN108574742B (en) * 2017-03-10 2021-04-16 腾讯科技(深圳)有限公司 Domain name information collection method and domain name information collection device
US10462169B2 (en) 2017-04-29 2019-10-29 Splunk Inc. Lateral movement detection through graph-based candidate selection
JP2020531936A (en) * 2017-06-29 2020-11-05 Line株式会社 How and systems to detect application vulnerabilities
WO2019010182A1 (en) 2017-07-06 2019-01-10 Pixm Phishing detection method and system
CN107392456A (en) 2017-07-14 2017-11-24 武汉理工大学 A kind of multi-angle rating business credit modeling method for merging internet information
RU2670906C9 (en) 2017-12-28 2018-12-12 Общество С Ограниченной Ответственностью "Центр Разработки И Внедрения Инновационных Технологий" Self-adjusting interactive system, method for message and/or call exchange between users of different web sites using client-server technology and computer readable medium
CN108282489B (en) * 2018-02-07 2020-01-31 网宿科技股份有限公司 vulnerability scanning method, server and system
RU2681699C1 (en) 2018-02-13 2019-03-12 Общество с ограниченной ответственностью "Траст" Method and server for searching related network resources
US10778701B2 (en) 2018-04-10 2020-09-15 Red Hat, Inc. Mitigating cyber-attacks by automatically coordinating responses from cyber-security tools
RU2722693C1 (en) 2020-01-27 2020-06-03 Общество с ограниченной ответственностью «Группа АйБи ТДС» Method and system for detecting the infrastructure of a malicious software or a cybercriminal
RU2738335C1 (en) 2020-05-12 2020-12-11 Общество С Ограниченной Ответственностью "Группа Айби" Method and system for classifying and filtering prohibited content in a network

Also Published As

Publication number Publication date
RU2743974C1 (en) 2021-03-01
NL2026468A (en) 2021-08-11
US11356470B2 (en) 2022-06-07
US20210194914A1 (en) 2021-06-24
NL2026468B1 (en) 2021-11-16

Similar Documents

Publication Publication Date Title
SG11202006772QA (en) System and method for decentralized-identifier creation
SG11202005591SA (en) System And Method For Blockchain-Based Cross-Entity Authentication
SG11202007802XA (en) Network handover method, apparatus and system, and handover determination method and apparatus
GB2588985B (en) Network and method
EP3917082A4 (en) Method and apparatus for determining configuration resource
PL3399909T3 (en) Method and system for determining network connections
EP3850814A4 (en) Method and system for network routing
SG11202007691SA (en) Blockchain-based consent management system and method
EP3918274A4 (en) Object dimensioning system and method
EP3550768A4 (en) Network quality detection method and system
SG11202110410UA (en) Detection method and detection system
SG11202003877VA (en) System and method for blockchain-based notification
EP3909220C0 (en) System and method for secure detokenization
GB2596770B (en) Carrier-resolved photo-hall system and method
SG11202003928RA (en) System and method for blockchain-based notification
EP3874580A4 (en) System and method for determining q factor
EP3962157A4 (en) Mdbv determining method, apparatus, and system
EP3893571A4 (en) Method and apparatus for determining communication resource
GB201901644D0 (en) Testing system and method
SG11202006627QA (en) Method and apparatus for trusted service management
EP4025875C0 (en) Method and system for determining position displacments
SG11202109094RA (en) Apparatus evaluation system and apparatus evaluation method
SG11202107512WA (en) Settlement system and settlement method
GB201919284D0 (en) Method and system for digital attestation
GB202018295D0 (en) System and method for cybersecurity framework among network devices