MOBILE MALICIOUS SOFTWARE MITIGATION
    7.
    发明申请
    MOBILE MALICIOUS SOFTWARE MITIGATION 失效
    移动恶意软件减轻

    公开(公告)号:US20120233694A1

    公开(公告)日:2012-09-13

    申请号:US13045916

    申请日:2011-03-11

    IPC分类号: G06F21/00

    摘要: Mitigation of malicious software in wireless networks and/or on mobile devices is provided. A mobile malicious software mitigation component is provided that obtains an internet protocol address that is exhibiting malicious software behavior, a profile of the malicious software behavior, and a time of the malicious software behavior. The malicious software mitigation component can determine an identity of a mobile device that was assigned the internet protocol address during the time it was exhibiting malicious software behavior, and transmit the profile to the mobile device. In addition, the malicious software mitigation component determine if the duration of the assignment of the internet protocol address to the mobile device is sufficient for positive identification.

    摘要翻译: 提供了无线网络和/或移动设备上恶意软件的缓解。 提供了一种移动恶意软件缓解组件,其获得呈现恶意软件行为的互联网协议地址,恶意软件行为的简档以及恶意软件行为的时间。 恶意软件缓解组件可以确定在其呈现恶意软件行为时分配了因特网协议地址的移动设备的身份,并将该配置文件发送到移动设备。 此外,恶意软件缓解组件确定对于移动设备的互联网协议地址的分配持续时间是否足以进行肯定识别。

    Mobile malicious software mitigation
    8.
    发明授权
    Mobile malicious software mitigation 失效
    移动恶意软件缓解

    公开(公告)号:US08695095B2

    公开(公告)日:2014-04-08

    申请号:US13045916

    申请日:2011-03-11

    IPC分类号: H04L29/06 G06F15/16

    摘要: Mitigation of malicious software in wireless networks and/or on mobile devices is provided. A mobile malicious software mitigation component is provided that obtains an internet protocol address that is exhibiting malicious software behavior, a profile of the malicious software behavior, and a time of the malicious software behavior. The malicious software mitigation component can determine an identity of a mobile device that was assigned the internet protocol address during the time it was exhibiting malicious software behavior, and transmit the profile to the mobile device. In addition, the malicious software mitigation component determine if the duration of the assignment of the internet protocol address to the mobile device is sufficient for positive identification.

    摘要翻译: 提供了无线网络和/或移动设备上恶意软件的缓解。 提供了一种移动恶意软件缓解组件,其获得呈现恶意软件行为的互联网协议地址,恶意软件行为的简档以及恶意软件行为的时间。 恶意软件缓解组件可以确定在其呈现恶意软件行为时分配了因特网协议地址的移动设备的身份,并将该配置文件发送到移动设备。 此外,恶意软件缓解组件确定对于移动设备的互联网协议地址的分配持续时间是否足以进行肯定识别。

    Mobile botnet mitigation
    9.
    发明授权
    Mobile botnet mitigation 有权
    移动僵尸网络缓解

    公开(公告)号:US09219744B2

    公开(公告)日:2015-12-22

    申请号:US12962940

    申请日:2010-12-08

    摘要: Mitigation of bot networks in wireless networks and/or on mobile devices is provided. A botnet detection component is provided that inspects data traffic and data flows on the wireless network to identify mobile devices that are suspected of behaving as bots. A traffic profile of the suspected bot behavior can be generated and forwarded to the mobile devices that are suspected of behaving as bots. The mobile device can correlate data traffic on the device to the traffic profile in order to identify applications responsible for the suspected bot behavior, and remove the identified applications.

    摘要翻译: 提供了无线网络和/或移动设备上的机器人网络的减轻。 提供了一种僵尸网络检测组件,其检查无线网络上的数据流量和数据流,以识别被怀疑为机器人的移动设备。 可以生成可疑机器人行为的流量配置文件,并将其转发到被怀疑为机器人的移动设备。 移动设备可以将设备上的数据流量与流量简档相关联,以便识别负责可疑机器人行为的应用,并移除所识别的应用。

    Peer-to-peer (P2P) botnet tracking at backbone level
    10.
    发明授权
    Peer-to-peer (P2P) botnet tracking at backbone level 有权
    骨干级别的点对点(P2P)僵尸网络跟踪

    公开(公告)号:US08627473B2

    公开(公告)日:2014-01-07

    申请号:US13155761

    申请日:2011-06-08

    IPC分类号: G06F21/00 H04L29/06

    CPC分类号: H04L63/1425

    摘要: A method, computer-readable medium, and system for analyzing backbone traffic to determine compromised hosts from among hosts on a network are provided. The backbone traffic includes data flows. Each of the data flows is analyzed to determine peer-to-peer data flows from among the data flows. Each of the peer-to-peer data flows is one of the data flows having a source address and a destination address that are each unassociated with a domain name. The peer-to-peer data flows are analyzed to determine the compromised hosts from among the hosts. Each of the compromised hosts is interconnected with another of the compromised hosts via at least one of the peer-to-peer data flows.

    摘要翻译: 提供了一种用于分析骨干流量以从网络中的主机之间确定受损主机的方法,计算机可读介质和系统。 骨干流量包括数据流。 分析每个数据流以确定数据流中的对等数据流。 每个对等数据流是具有源地址和目的地地址的数据流之一,每个数据流都与域名不相关。 分析对等数据流,以确定主机之间的受损主机。 每个受感染的主机通过至少一个对等数据流与另一个被入侵的主机互连。