Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation
    1.
    发明申请
    Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation 有权
    用于检测基于邻近的移动恶意软件传播的设备,系统和方法

    公开(公告)号:US20120151587A1

    公开(公告)日:2012-06-14

    申请号:US12963617

    申请日:2010-12-08

    IPC分类号: G06F21/00

    摘要: Devices, systems, and methods are disclosed which leverage an agent that resides in a mobile communication device to detect Proximity based Mobile Malware Propagation (PMMP). The agent injects one or several trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices. However, the triggers connect to an agent server on a service provider's network. Essentially, the method is based on the assumption that malware lacks the intelligence to differentiate the trigger network connection from a normal one. Therefore, by attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, and such attacks typically bypass network based security inspection in the network.

    摘要翻译: 公开了利用驻留在移动通信设备中的代理来检测基于接近度的移动恶意软件传播(PMMP)的设备,系统和方法。 代理在候选连接列表中注入一个或多个触发网络连接。 这些连接显示为合法的网络和设备。 但是,触发器连接到服务提供商网络上的代理服务器。 本质上,该方法是基于这样的假设:恶意软件缺乏将触发网络连接与正常触发网络连接区分开来的智能。 因此,通过尝试通过触发网络连接进行连接,恶意软件显示出来。 系统在本地恶意软件爆发之后的短时间内帮助收集恶意软件签名,这种攻击通常会绕过网络中的网络安全检查。

    Devices, systems, and methods for detecting proximity-based mobile propagation
    2.
    发明授权
    Devices, systems, and methods for detecting proximity-based mobile propagation 有权
    用于检测基于邻近度的移动传播的设备,系统和方法

    公开(公告)号:US08763126B2

    公开(公告)日:2014-06-24

    申请号:US12963617

    申请日:2010-12-08

    IPC分类号: G06F21/00

    摘要: Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.

    摘要翻译: 公开了设备,系统和方法。 代理驻留在移动通信设备中。 代理检测基于邻近的移动恶意软件传播。 代理在候选连接列表中注入一个或多个触发网络连接。 这些连接显示为合法的网络和设备,而是触发与服务提供商网络上的代理服务器的连接。 通过尝试通过触发网络连接进行连接,恶意软件显示本身。本地区恶意软件爆发后,系统将在短时间内收集恶意软件签名,但这种攻击通常会绕过网络中的网络安全检查。

    System and Method to Detect and Mitigate Distributed Denial of Service Attacks using Random Internet Protocol Hopping
    4.
    发明申请
    System and Method to Detect and Mitigate Distributed Denial of Service Attacks using Random Internet Protocol Hopping 有权
    使用随机互联网协议跳跃检测和缓解分布式拒绝服务攻击的系统和方法

    公开(公告)号:US20120072605A1

    公开(公告)日:2012-03-22

    申请号:US12884976

    申请日:2010-09-17

    IPC分类号: G06F21/20

    摘要: A method includes sending a first redirect instruction to a first client in response to a first session request received at a service address, and establishing a first session with the first client in response to a second session request received at the first redirect address indicated by the first redirect instruction. Additionally, the method includes determining a first service interval has passed, and sending a second redirect instruction to a second client in response to a third session request received at the service address after the first service interval has passed. The method still further includes establishing a second session with the second client in response to the fourth session request received at the second redirect address indicated by the second redirect instruction after the first service interval has passed, and rejecting the fifth session request received from a third client at the first redirect address after the first service interval has passed.

    摘要翻译: 一种方法包括响应于在服务地址处接收到的第一会话请求向第一客户端发送第一重定向指令,以及响应于在由所述第一重定向地址指示的第一重定向地址接收到的第二会话请求,建立与第一客户端的第一会话 第一个重定向指令。 此外,该方法包括确定已经过去的第一服务间隔,并且响应于在经过第一服务间隔之后在服务地址处接收的第三会话请求,向第二客户端发送第二重定向指令。 该方法还包括响应于在第一服务间隔已经过去之后由第二重定向指令指示的第二重定向地址处接收到的第四会话请求,建立与第二客户端的第二会话,并且拒绝从第三客户端接收到的第五会话请求 客户端在第一个服务间隔之后的第一个重定向地址。

    Cellular-based live traffic service
    6.
    发明授权
    Cellular-based live traffic service 有权
    基于蜂窝的实时流量服务

    公开(公告)号:US08296046B2

    公开(公告)日:2012-10-23

    申请号:US12632969

    申请日:2009-12-08

    IPC分类号: G01C21/34 G08G1/01

    摘要: A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices.

    摘要翻译: 基于蜂窝的实时业务服务不需要预先部署基础设施或支持GPS的设备,使用由蜂窝设备提供的信号来确定蜂窝设备的路线分辨率定位和跟踪信息。 对课程分辨率数据执行专门的统计分析,以推断出细胞器件的精细分辨率位置。 在示例性实施例中,在地图等上提供定位和跟踪信息以显示蜂窝设备的相对位置和/或轨迹。

    Method and system for dynamic traffic prioritization
    8.
    发明授权
    Method and system for dynamic traffic prioritization 有权
    动态流量优先级的方法和系统

    公开(公告)号:US09148376B2

    公开(公告)日:2015-09-29

    申请号:US12963227

    申请日:2010-12-08

    摘要: A method provides for the dynamic traffic prioritization in a communication network. The method electronically monitors traffic in a communication network and determines when traffic exceeds configured thresholds on the links of the communication network. Thus, the method determines a link which is potentially about to be congested in the communication network. The method categorizes the traffic on this link by an end system attached to one end of the potentially congested link into a plurality of priority categories using application layer parameters. Using a re-direct capability of the end system, the method re-directs at least one of the pluralities of priority categories of traffic to an alternate Internet Protocol address. The method uses preconfigured Quality of Service mechanisms on the provider edge router attached to the other end of the potentially congested link to guarantee a predetermined amount of bandwidth capacity of the link to traffic destined to the alternate Internet Protocol address.

    摘要翻译: 一种方法提供通信网络中的动态流量优先级。 该方法电子监控通信网络中的流量,并确定流量何时超过通信网络链路上的配置阈值。 因此,该方法确定通信网络中潜在地将拥塞的链路。 该方法通过使用应用层参数将附接到潜在拥塞链路的一端的终端系统在该链路上分类为多个优先级类别。 使用终端系统的直接能力,该方法将多个优先级别的业务中的至少一个重定向到备用因特网协议地址。 该方法在连接到可能拥塞链路的另一端的提供商边缘路由器上使用预配置的服务质量机制,以保证到达备用因特网协议地址的流量的链路的预定量的带宽容量。

    Methods, devices, systems, and computer program products for edge driven communications network security monitoring
    10.
    发明授权
    Methods, devices, systems, and computer program products for edge driven communications network security monitoring 有权
    用于边缘驱动通信网络安全监控的方法,设备,系统和计算机程序产品

    公开(公告)号:US08302189B2

    公开(公告)日:2012-10-30

    申请号:US12627733

    申请日:2009-11-30

    IPC分类号: G06F21/00

    CPC分类号: H04L63/0209 H04L63/1416

    摘要: An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed.

    摘要翻译: 可以利用边缘监控方法来检测包括多个相对低带宽的攻击的攻击,这些攻击在受害子网络处被聚合。 聚合的低带宽攻击可以产生相对较高的带宽攻击,包括针对受害者的非请求数据流量,使得聚合攻击在位于受害者附近的边缘监视器电路更可检测。 还公开了相关系统,设备和计算机程序产品。