Methods and apparatus to identify malicious activity in a network

    公开(公告)号:US09769190B2

    公开(公告)日:2017-09-19

    申请号:US15354214

    申请日:2016-11-17

    Inventor: Baris Coskun

    Abstract: Example network monitoring methods disclosed herein include iteratively adjusting respective weights assigned to respective types of network activity features for devices monitored in a network, the iterative adjusting to determine an output set of weights corresponding to ones of the types of network activity features indicative of malicious network activity. For example, the iterative adjusting is to (1) reduce a first distance calculated between a first pair of reference devices previously classified as being associated with malicious network activity, and (2) increase a second distance calculated between a first one of the pair of the reference devices and a first unclassified device. Disclosed example network monitoring methods also include determining whether a second unclassified device is associated with malicious network activity based on the output set of weights.

    METHODS OF GENERATING SIGNATURES FROM GROUPS OF ELECTRONIC MESSAGES AND RELATED METHODS AND SYSTEMS FOR IDENTIFYING SPAM MESSAGES
    23.
    发明申请
    METHODS OF GENERATING SIGNATURES FROM GROUPS OF ELECTRONIC MESSAGES AND RELATED METHODS AND SYSTEMS FOR IDENTIFYING SPAM MESSAGES 审中-公开
    从电子信息组中产生信号的方法以及识别垃圾信息的相关方法和系统

    公开(公告)号:US20150312186A1

    公开(公告)日:2015-10-29

    申请号:US14264159

    申请日:2014-04-29

    CPC classification number: H04L51/12

    Abstract: A method of generating a signature for a group of electronic messages that each include a plurality of characters comprises extracting a plurality of blocks of characters from each of the electronic messages, mathematically processing each of the blocks of characters from each electronic message, and generating a signature for the group of electronic messages based at least in part on the mathematically processed blocks of characters. In some embodiments a counting Bloom filter may be used to generate the signature. The signatures generated by these methods may be used to identify spam.

    Abstract translation: 一种生成每个包括多个字符的一组电子消息的签名的方法包括从每个电子消息中提取多个字符块,从每个电子消息中数学地处理每个字符块,并且生成 至少部分地基于数学处理的字符块,对于该组电子消息的签名。 在一些实施例中,可以使用计数布隆过滤器来生成签名。 由这些方法生成的签名可用于识别垃圾邮件。

    Methods and apparatus to identify an internet protocol address blacklist boundary
    24.
    发明授权
    Methods and apparatus to identify an internet protocol address blacklist boundary 有权
    识别互联网协议地址黑名单边界的方法和装置

    公开(公告)号:US09083730B2

    公开(公告)日:2015-07-14

    申请号:US14099600

    申请日:2013-12-06

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify an Internet protocol address blacklist boundary. An example method includes identifying a netblock associated with a malicious Internet protocol address, the netblock having a lower boundary and an upper boundary, collecting netflow data associated with a plurality of Internet protocol addresses in the netblock, establishing a first window associated with a lower portion of Internet protocol addresses numerically lower than a candidate Internet protocol address, establishing a second window associated with an upper portion of Internet protocol addresses numerically higher than a candidate Internet protocol address, calculating a breakpoint score based on a comparison between a behavioral profile of the first window and a behavioral profile of the second window, and identifying a first sub-netblock when the breakpoint score exceeds a threshold value.

    Abstract translation: 公开了方法,装置,系统和制品以识别因特网协议地址黑名单边界。 示例性方法包括识别与恶意因特网协议地址相关联的网络块,网络块具有下边界和上边界,收集与网络块中的多个因特网协议地址相关联的网络流数据,建立与下部相关联的第一窗口 互联网协议地址数字地低于候选互联网协议地址,建立与互联网协议地址的上部相关联的第二窗口,数字地高于候选互联网协议地址,计算断点得分,基于第一 窗口和第二窗口的行为简档,以及当断点得分超过阈值时识别第一子网块。

    METHODS AND APPARATUS TO IDENTIFY MALICIOUS ACTIVITY IN A NETWORK
    25.
    发明申请
    METHODS AND APPARATUS TO IDENTIFY MALICIOUS ACTIVITY IN A NETWORK 有权
    识别网络中的恶性活动的方法和设备

    公开(公告)号:US20150135320A1

    公开(公告)日:2015-05-14

    申请号:US14080532

    申请日:2013-11-14

    Inventor: Baris Coskun

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to learn malicious activity. An example method includes assigning weights of a distance function to respective statistical features; iteratively calculating, with a processor, the distance function to adjust the weights (1) to cause a reduction in a first distance calculated according to the distance function for a first pair of entities in a reference group associated with malicious activity and (2) to cause an increase in a second distance calculated according to the distance function for a first one of the entities included in the reference group and a second entity not included in the reference group; and determining whether a first statistical feature is indicative of malicious activity based on a respective adjusted weight of the first statistical feature determined after calculating the distance function for a number of iterations.

    Abstract translation: 公开了方法,装置,系统和制品来学习恶意活动。 一种示例性方法包括将距离函数的权重分配给相应的统计特征; 使用处理器迭代地计算所述距离函数以调整所述权重(1)以导致根据与恶意活动相关联的参考组中的第一对实体的距离函数计算的第一距离的减小;以及(2)至 导致对于包括在参考组中的第一个实体和不包括在参考组中的第二实体的根据距离函数计算的第二距离的增加; 以及基于在计算多个迭代的距离函数之后确定的所述第一统计特征的相应调整的权重来确定第一统计特征是否指示恶意活动。

Patent Agency Ranking