摘要:
Method, system and computer program product for comparing or measuring information content in at least one data stream including one or more data segments is provided. In at least one embodiment of the invention, information leak capacity in network traffic is quantified. Instead of trying to detect the presence of sensitive data—an impossible task in the general case—one goal of the method, system and computer program product is to measure and constrain its maximum volume. Most network traffic is repeated or determined by external information, such as protocol specifications or messages sent by a server. By filtering this data, one can isolate and quantify true information flowing from a computer. Measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing are provided. When applied to real web browsing traffic, the algorithms were able to discount 98.5% of measured bytes and effectively isolate information leaks.
摘要:
A method, system and computer program product for creating shape collages are provided. The method includes receiving a shape specification signal which specifies at least one desired shape having an area. The method further includes receiving image data which represents a plurality of images. The method still further includes processing the shape specification signal and the image data to obtain a shape collage of the images at least partially covering the area of the at least one desired shape. The step of processing may include the steps of at least partially covering the at least one desired shape with at least one shape primitive and placing at least one image over the at least one shape primitive to at least partially fill the at least one shape primitive. The method may further include receiving a command signal to either locate a user-specified image essentially or approximately at a desired location in the shape collage or resize the user-specified image from an initial size in the initial collage to a desired size. The method may still further include processing the command signal and the shape collage to create a finished shape collage having either the user-specified image essentially or approximately at the desired location or the user-specified image with the desired size to increase visual appeal of the finished shape collage to the user.
摘要:
Method, system and computer program product for comparing or measuring information content in at least one data stream including one or more data segments is provided. In at least one embodiment of the invention, information leak capacity in network traffic is quantified. Instead of trying to detect the presence of sensitive data—an impossible task in the general case—one goal of the method, system and computer program product is to measure and constrain its maximum volume. Most network traffic is repeated or determined by external information, such as protocol specifications or messages sent by a server. By filtering this data, one can isolate and quantify true information flowing from a computer. Measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing are provided. When applied to real web browsing traffic, the algorithms were able to discount 98.5% of measured bytes and effectively isolate information leaks.
摘要:
Method, system and computer program product for detecting at least one of security threats and undesirable computer files are provided. A first method includes receiving a data stream which represents outbound, application layer messages from a first computer process to at least one second computer process. The computer processes are implemented on one or more computers. The method further includes monitoring the data stream to detect a security threat based on a whitelist having entries which contain metadata. The whitelist describes legitimate application layer messages based on a set of heuristics. The method still further includes generating a signal if a security threat is detected. A second method includes comparing a set of computer files with a whitelist which characterizes all legitimate computer files. The whitelist contains one or more entries. Each of the entries describe a plurality of legitimate computer files.
摘要:
Method, system and computer program product for detecting at least one of security threats and undesirable computer files are provided. A first method includes receiving a data stream which represents outbound, application layer messages from a first computer process to at least one second computer process. The computer processes are implemented on one or more computers. The method further includes monitoring the data stream to detect a security threat based on a whitelist having entries which contain metadata. The whitelist describes legitimate application layer messages based on a set of heuristics. The method still further includes generating a signal if a security threat is detected. A second method includes comparing a set of computer files with a whitelist which characterizes all legitimate computer files. The whitelist contains one or more entries. Each of the entries describe a plurality of legitimate computer files.
摘要:
A method, system and computer program product detect attempts to send significant amounts of information out via HTTP tunnels to rogue Web servers from within an otherwise firewalled network. A related goal is to help detect spyware programs. Filters, based on the analysis of HTTP traffic over a training period, help detect anomalies in outbound HTTP traffic using metrics such as request regularity, bandwidth usage, inter-request delay time, and transaction size.
摘要:
A method, system and computer program product for creating shape collages are provided. The method includes receiving a shape specification signal which specifies at least one desired shape having an area. The method further includes receiving image data which represents a plurality of images. The method still further includes processing the shape specification signal and the image data to obtain a shape collage of the images at least partially covering the area of the at least one desired shape. The step of processing may include the steps of at least partially covering the at least one desired shape with at least one shape primitive and placing at least one image over the at least one shape primitive to at least partially fill the at least one shape primitive. The method may further include receiving a command signal to either locate a user-specified image essentially or approximately at a desired location in the shape collage or resize the user-specified image from an initial size in the initial collage to a desired size. The method may still further include processing the command signal and the shape collage to create a finished shape collage having either the user-specified image essentially or approximately at the desired location or the user-specified image with the desired size to increase visual appeal of the finished shape collage to the user.