Method for generating cross-site scripting attack
    3.
    发明授权
    Method for generating cross-site scripting attack 有权
    生成跨站点脚本攻击的方法

    公开(公告)号:US08505080B2

    公开(公告)日:2013-08-06

    申请号:US13298295

    申请日:2011-11-17

    IPC分类号: G06F11/00

    CPC分类号: H04L63/1466 H04L63/1433

    摘要: A method for generating a cross-site scripting attack is provided. An attack string sample is analyzed for obtaining a token sequence. A string word corresponding to each token is used to replace the token for generating a cross-site scripting attack string. Accordingly, a large number of cross-site scripting attacks are generated automatically, so as to execute a penetration test for a website.

    摘要翻译: 提供了一种生成跨站点脚本攻击的方法。 分析攻击字符串样本以获得令牌序列。 对应于每个令牌的字符串字用于替换用于生成跨站点脚本攻击字符串的令牌。 因此,自动生成大量的跨站点脚本攻击,以便对网站执行渗透测试。

    METHOD AND SYSTEM FOR DETECTING MALICIOUS SCRIPT
    4.
    发明申请
    METHOD AND SYSTEM FOR DETECTING MALICIOUS SCRIPT 审中-公开
    检测恶性症状的方法和系统

    公开(公告)号:US20120159629A1

    公开(公告)日:2012-06-21

    申请号:US13165787

    申请日:2011-06-21

    IPC分类号: G06F11/00

    摘要: A method for detecting a malicious script is provided. A plurality of distribution eigenvalues are generated according to a plurality of function names of a web script. After the distribution eigenvalues are inputted to a hidden markov model (HMM), probabilities respectively corresponding to a normal state and an abnormal state are calculated. Accordingly, whether the web script is malicious or not can be determined according to the probabilities. Even an attacker attempts to change the event order, insert a new event or replace an event with a new one to avoid detection, the method can still recognize the intent hidden in the web script by using the HMM for event modeling. As such, the method may be applied in detection of obfuscated malicious scripts.

    摘要翻译: 提供了一种用于检测恶意脚本的方法。 根据web脚本的多个功能名称生成多个分布特征值。 在将分布特征值输入到隐马尔可夫模型(HMM)之后,计算分别对应于正常状态和异常状态的概率。 因此,可以根据概率来确定web脚本是否是恶意的。 即使攻击者也尝试更改事件顺序,插入新事件或替换事件以避免检测,该方法仍然可以通过使用HMM进行事件建模来识别隐藏在Web脚本中的意图。 因此,该方法可以应用于检测模糊的恶意脚本。

    BOTNET EARLY DETECTION USING HYBRID HIDDEN MARKOV MODEL ALGORITHM
    5.
    发明申请
    BOTNET EARLY DETECTION USING HYBRID HIDDEN MARKOV MODEL ALGORITHM 有权
    BOTNET早期检测使用混合隐马尔可夫模型算法

    公开(公告)号:US20110004936A1

    公开(公告)日:2011-01-06

    申请号:US12726272

    申请日:2010-03-17

    IPC分类号: G06F21/00

    CPC分类号: H04L63/1441 H04L2463/144

    摘要: A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state.

    摘要翻译: 提供僵尸网络检测系统。 突发特征提取器从检测对象网络接收因特网中继聊天(IRC)分组值,并相应地确定突发特征。 混合隐马尔可夫模型(HHMM)参数估计器根据突发特征确定混合隐马尔可夫模型的概率参数。 流量简档生成器根据概率参数和预定义的网络流量类别建立混合隐马尔可夫模型的概率序列模型。 可疑状态检测器响应于接收到新的IRC分组而确定与中继IRC分组的网络相对应的业务状态,通过将突发特征应用于概率序列模型来确定对象网络的IRC分组流是否可疑, 混合隐马尔可夫模型,并且当IRC分组流被认为具有可疑业务状态时,生成警告信号。

    METHOD FOR GENERATING CROSS-SITE SCRIPTING ATTACK
    6.
    发明申请
    METHOD FOR GENERATING CROSS-SITE SCRIPTING ATTACK 有权
    用于生成跨站脚本攻击的方法

    公开(公告)号:US20130055400A1

    公开(公告)日:2013-02-28

    申请号:US13298295

    申请日:2011-11-17

    IPC分类号: G06F11/00

    CPC分类号: H04L63/1466 H04L63/1433

    摘要: A method for generating a cross-site scripting attack is provided. An attack string sample is analyzed for obtaining a token sequence. A string word corresponding to each token is used to replace the token for generating a cross-site scripting attack string. Accordingly, a large number of cross-site scripting attacks are generated automatically, so as to execute a penetration test for a website.

    摘要翻译: 提供了一种生成跨站点脚本攻击的方法。 分析攻击字符串样本以获得令牌序列。 对应于每个令牌的字符串字用于替换用于生成跨站点脚本攻击字符串的令牌。 因此,自动生成大量的跨站点脚本攻击,以便对网站执行渗透测试。

    Network attack detection devices and methods
    7.
    发明授权
    Network attack detection devices and methods 有权
    网络攻击检测设备和方法

    公开(公告)号:US08341742B2

    公开(公告)日:2012-12-25

    申请号:US12837986

    申请日:2010-07-16

    IPC分类号: H04L29/06

    摘要: A network attack detection device is provided, including a spatial coordinate database for storing spatial coordinate data; a standard time zone database for storing standard time zone data; a domain name system packet collector for collecting a domain name system packet; a spatial snapshot feature extractor for extracting internet protocol address corresponding to the domain name system packet according to the domain name system packet, and generating spatial feature data corresponding to the internet protocol address according to the internet protocol address, the spatial coordinate data and the standard time zone data; and an attack detector for determining whether the domain name system packet is an attack according to the spatial feature data and a spatial snapshot detection model, and when determining that the domain name system packet is an attack, sending a warning to indicate the attack.

    摘要翻译: 提供一种网络攻击检测装置,包括用于存储空间坐标数据的空间坐标数据库; 用于存储标准时区数据的标准时区数据库; 用于收集域名系统包的域名系统包收集器; 空间快照特征提取器,用于根据域名系统分组提取与域名系统分组对应的互联网协议地址,并根据因特网协议地址,空间坐标数据和标准产生与互联网协议地址对应的空间特征数据 时区数据; 以及用于根据空间特征数据和空间快照检测模型来确定域名系统分组是否是攻击的攻击检测器,并且当确定域名系统分组是攻击时,发送指示攻击的警告。

    Botnet early detection using hybrid hidden markov model algorithm
    8.
    发明授权
    Botnet early detection using hybrid hidden markov model algorithm 有权
    僵尸网络早期检测使用混合隐马尔可夫模型算法

    公开(公告)号:US08307459B2

    公开(公告)日:2012-11-06

    申请号:US12726272

    申请日:2010-03-17

    IPC分类号: G06F7/04 G06F11/00

    CPC分类号: H04L63/1441 H04L2463/144

    摘要: A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state.

    摘要翻译: 提供僵尸网络检测系统。 突发特征提取器从检测对象网络接收因特网中继聊天(IRC)分组值,并相应地确定突发特征。 混合隐马尔可夫模型(HHMM)参数估计器根据突发特征确定混合隐马尔可夫模型的概率参数。 流量简档生成器根据概率参数和预定义的网络流量类别建立混合隐马尔可夫模型的概率序列模型。 可疑状态检测器响应于接收到新的IRC分组而确定与中继IRC分组的网络相对应的业务状态,通过将突发特征应用于概率序列模型来确定对象网络的IRC分组流是否可疑, 混合隐马尔可夫模型,并且当IRC分组流被认为具有可疑业务状态时,生成警告信号。

    METHOD AND SYSTEM FOR CLASSIFYING ARTICLE
    9.
    发明申请
    METHOD AND SYSTEM FOR CLASSIFYING ARTICLE 审中-公开
    用于分类文章的方法和系统

    公开(公告)号:US20130166558A1

    公开(公告)日:2013-06-27

    申请号:US13549759

    申请日:2012-07-16

    IPC分类号: G06F17/30

    CPC分类号: G06F16/353

    摘要: The present invention discloses a method and system for classifying articles. The present invention can be not only capable of distinguishing the type of the article but also novelty to generate an overview article automatically in accordance with the initial prepared keyword combination or articles. Furthermore, the overview article described above comprises a representative topic corresponding to the content of the initial prepared articles, wherein the representative topic is also able to identify the field of the articles. Accordingly, by the said overview article, the present invention is capable of decreasing the time required to understand the spirit and the technical aspect of the articles so as to solve the long lasted problem of the prior art.

    摘要翻译: 本发明公开了一种分类物品的方法和系统。 本发明不仅能够区分物品的类型,而且能够根据初始准备的关键字组合或物品自动地产生概要文章的新颖性。 此外,上述概述文章包括与初始准备文章的内容相对应的代表性主题,其中代表主题还能够识别文章的领域。 因此,通过所述概述文章,本发明能够减少理解物品的精神和技术方面所需的时间,以解决现有技术的长期存在的问题。

    CONFLICT OF INTEREST DETECTION SYSTEM AND METHOD USING SOCIAL INTERACTION MODELS
    10.
    发明申请
    CONFLICT OF INTEREST DETECTION SYSTEM AND METHOD USING SOCIAL INTERACTION MODELS 审中-公开
    利益关系系统的冲突和使用社会互动模型的方法

    公开(公告)号:US20110173187A1

    公开(公告)日:2011-07-14

    申请号:US12850597

    申请日:2010-08-04

    IPC分类号: G06F17/30

    摘要: A conflict of interest detection system is provided. A data extractor retrieves a document and extracts author, title, and date information. A co-authorship finder finds out co-author relation among documents. A relevant group cluster identifies a key researcher in a particular field, and groups researchers connected to the key researcher as a group. A potential link finder identifies researchers who may have co-author relation. A relation filter filters out couples having weaker relation from the group having co-author relation. The filtered co-author relation data is then stored as a conflict of interest list.

    摘要翻译: 提供利益冲突检测系统。 数据提取器检索文档并提取作者,标题和日期信息。 共同作者查找者发现文件之间的共同作者关系。 相关组群确定了一个特定领域的重点研究员,并将研究人员与关键研究人员联系起来。 潜在的链接查找器识别可能具有共同作者关系的研究人员。 关系滤波器滤除与具有共同作者关系的组具有较弱关系的夫妻。 然后将经筛选的共同作者关系数据作为利益冲突列表存储。