CN101517570A - 分析网络内容的系统和方法 - Google Patents

分析网络内容的系统和方法 Download PDF

Info

Publication number
CN101517570A
CN101517570A CNA2007800259387A CN200780025938A CN101517570A CN 101517570 A CN101517570 A CN 101517570A CN A2007800259387 A CNA2007800259387 A CN A2007800259387A CN 200780025938 A CN200780025938 A CN 200780025938A CN 101517570 A CN101517570 A CN 101517570A
Authority
CN
China
Prior art keywords
url
data
module
request
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007800259387A
Other languages
English (en)
Other versions
CN101517570B (zh
Inventor
丹·哈伯德
尼古拉斯·J·维雷尼尼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fospint Joint Holding Co
Fospint Ltd
Wangsheng Co ltd
Original Assignee
Websense LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Websense LLC filed Critical Websense LLC
Publication of CN101517570A publication Critical patent/CN101517570A/zh
Application granted granted Critical
Publication of CN101517570B publication Critical patent/CN101517570B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification

Abstract

本发明提供一种用于识别网络上的网站中的不适当内容的系统和方法。未被认出的统一资源定位符(URL)或其它网络内容由工作站接入并识别为可能具有恶意内容。可在网关服务器模块或某种其它软件模块内预先处理所述URL或网络内容以收集与所述URL相关的额外信息。可扫描所述URL以查找已知的攻击签名,且如果发现任何攻击签名,则可将所述URL标记为需要由分类模块进行进一步分析的候选URL。

Description

分析网络内容的系统和方法
相关申请案
本申请案涉及2006年7月10日申请的第11/484,335号美国专利申请案(代理人案号WEBSEN.084A),所述申请案的全文以引用的方式并入本文。
技术领域
本申请案涉及数据和应用程序安全性。确切地说,本申请案揭示收集和挖掘数据以确定数据是否包含恶意内容的系统方法。
背景技术
传统上,计算机病毒和其它恶意内容最经常通过将受感染的磁盘或某种其它物理媒体插入计算机而被提供到客户端计算机。随着电子邮件和因特网的使用增加,电子邮件附件攻击变为用于向计算机分布病毒代码的普遍方法。为了用这些类型的具有恶意内容的病毒感染计算机,通常需要用户的某种同意动作,例如打开受感染的文件附件或从网站下载受感染的文件并在用户的计算机上启动所述文件。随着时间的过去,反病毒软件制作者开发出日益有效的程序,所述程序经设计以扫描文件并在其有机会感染客户端计算机之前将其消毒。因此,计算机黑客不得不创造更聪明且创新的方法来用其恶意代码感染计算机。
在当今的日渐联网的数字世界,正开发分布式应用程序以在开放的、合作的联网环境中向用户提供越来越多的功能性。尽管这些应用程序较有力且复杂,但其增加的功能性要求网络服务器以更集成的方式与客户端计算机交互。举例来说,在先前网络应用程序主要向客户端浏览器提供HTML内容并经由HTTP邮递命令从客户端接收回数据的情况下,许多新的网络应用程序经配置以向客户端计算机发送各种形式的内容,其引起在较新的网络浏览器的增强特征内启动应用程序。举例来说,许多基于网络的应用程序现在利用活动-X(Active-X)控件,其必须下载到客户端计算机以使得其可被有效地利用。在特定例子中Java小程序(Java applet)、VB脚本(VBScript)和Java脚本(JavaScript)命令也有能力修改客户端计算机文件。
这些功能性增加所带来的便利也有代价。较新的网络应用程序和内容显然比先前的应用程序环境更有力。因此,其还为将恶意代码下载到客户端计算机提供了机会。另外,随着操作系统和网络浏览应用程序的复杂性增加,更难以识别可能会允许黑客将恶意代码传送到客户端计算机的安全性弱点。尽管浏览器和操作系统厂商通常会发布软件更新以补救这些弱点,但许多用户尚未配置其计算机以下载这些更新。因此,黑客已开始编写利用这些弱点以将其本身下载到用户的机器而不用依赖于用户的任何特定活动(例如启动受感染的文件)的恶意代码和应用程序。此攻击的一个实例是使用嵌入在网站上的活动内容对象的恶意代码。如果恶意代码已经配置以利用网络浏览器中的弱点,那么用户可能仅仅因为访问过所述页面就会被恶意代码感染或损害,因为所述页面中的内容将在用户的计算机上执行。
解决嵌入内容中的恶意代码的问题的一种尝试是利用网络浏览器上的升高的安全性设定。然而在许多公司环境中,内部网或外部网应用程序经配置而向客户端计算机发送可执行内容。将浏览器设定设定为高安全性等级往往会妨碍或阻碍对这些类型的“安全”应用程序的有效使用。解决问题的另一尝试是使用网络防火墙应用程序来阻止所有可执行内容。此强力方法在许多环境中也是低效的,因为为了让软件正确地起作用,有必要对特定类型内容进行选择性存取。
需要一种允许检测恶意网络内容而不会损害用户功能性的系统和方法。此外,需要一种可检测可执行内容并快速识别和归类其行为,且以最小延迟向大量客户端计算机提供针对恶意内容的保护的系统。
发明内容
本发明的系统、方法和装置每一者均具有若干方面,其中任何单个一个方面均不唯一负责其所需的属性。现在将简要论述本发明的若干特征,但并不限制本发明的范围。
在一个实施例中,提供一种识别网络内容中的不适当内容的计算机实施的方法。所述方法包含接收针对网络内容的请求。将所请求的网络内容与数据库中的数据进行比较。如果所请求的内容不在数据库中,则将其发送到收集与所请求内容相关的数据的收集模块。基于所收集数据,确定URL的候选状态。
在另一实施例中,提供一种用于从一组未经归类URL中识别候选URL的系统。所述系统可包含经配置以存储未经归类URL的URL数据库,以及经配置以收集关于未经归类URL的包含与未经归类URL相关的数据的信息的收集系统。收集系统可包含数据挖掘模块,其经配置以识别具有指示目标内容的特性的未经归类URL。
在又一实施例中,提供一种收集关于URL的数据的计算机实施的方法。所述方法包含提供具有配置插件的数据挖掘模块。所述数据挖掘模块可具有经配置以彼此独立操作的多个调度程序。数据挖掘模块接收URL数据用于分析,并将URL数据分离为URL串的工作单元。所述方法进一步用于确定所述多个调度程序中是否有一者可用于接收工作单元,且如果调度程序中的一者可用则将URL发送到所述调度程序。
在又一实施例中,提供一种收集关于URL的数据的系统。所述系统可包含用于存储关于URL的信息的数据库。所述系统还可包含调度程序库,所述调度程序包含异步系统过程,每一异步系统过程经配置以接收URL数据输入且对数据执行动作。所述系统还可包含驱动程序模块,其经配置监视所述调度程序库以查找可用的调度程序,且将所述URL数据输入的一部分发送到所述可用的调度程序。
在又一实施例中,一种用于从一组未经归类URL中识别候选URL的系统包含用于存储未经归类URL的构件,用于收集与未经归类URL相关的信息的构件,以及用于识别具有指示目标内容的特性的未经归类URL的构件。
附图说明
在本描述内容中参看附图,其中始终以相同标号指代相同部分。
图1是根据本发明方面的系统的各种组件的方框图。
图2是来自图1的工作站模块的方框图。
图3是来自图1的网关服务器模块的方框图。
图4是记录数据库的实例。
图5是URL接入策略数据库表的实例。
图6A和6B分别是经归类和未经归类的URL的实例。
图7是来自图1的数据库管理模块的方框图。
图8是来自图7的收集系统的方框图。
图9是来自图8的收集模块的方框图。
图10展示根据本发明某些方面的蜜罐客户端系统。
图11是由来自图9的收集模块收集的URL相关数据的实例。
图12是描述在一个实施例中可如何在网关服务器模块中处理URL的流程图。
图13是描述根据某些实施例可如何结合策略模块通过网关服务器模块处理URL的流程图。
图14是描述收集系统可如何在网关服务器模块内处理URL的流程图。
图15是描述收集系统可如何在数据库管理模块内处理URL的流程图。
图16是描述可如何使用蜜罐客户端控制服务器来收集URL数据的流程图。
图17是描述可如何进一步补充由收集系统收集的数据以允许详细分析的流程图。
图18是数据挖掘系统的方框图。
具体实施方式
特定实施例提供识别和归类在通过统一资源定位符(URL)识别的位置发现的网络内容的系统和方法,所述内容包含可能可执行的网络内容和恶意内容。如本文使用,可能可执行的网络内容通常指包含由网络浏览器或网络客户端计算机执行的指令的任何类型的内容。可能可执行的网络内容可包含例如小程序、嵌入HTML或其它超文本文档(包含例如Java脚本或VB脚本的脚本语言)的可执行代码、嵌入其它文档(例如微软Word宏或样式表)中的可执行代码。可能可执行的网络内容也可指执行位于另一位置(例如另一网页、另一计算机或网络浏览器计算机本身上)中的代码的文档。举例来说,通常可认为包含“对象”元素且因此可引起活动X或其它可执行组件的执行的HTML网页是可能可执行的网络内容,无论所述可执行组件的位置如何。恶意内容可指不可执行但可经计算以利用客户端计算机的弱点的内容。然而,可能可执行的网络内容也可能是恶意内容。举例来说,已使用图像文件来在所述图像经处理用于显示时利用某些操作系统中的弱点。而且,恶意网络内容也可指例如“网络钓鱼(phishing)”方案的交互内容,在所述方案中,HTML表格或其它网络内容经设计以表现为由例如银行的另一(通常是受到信任的)网站提供,以便欺骗用户向未经授权方提供证书或其它敏感信息。
图1提供示范性系统的最高级说明。系统包含网络110。网络110可以是局域网、广域网或某种其它类型的网络。网络110可包含一个或一个以上工作站116。工作站116可以是附接到网络的各种类型的客户端计算机。客户端计算机116可以是桌上型计算机、笔记型计算机、手持式计算机或类似计算机。客户端计算机也可装载有操作系统,所述操作系统允许客户端计算机通过例如网络浏览器、电子邮件程序等各种软件模块利用网络。
每一工作站116均可与网关服务器模块120电连通。网关服务器模块可驻存在网络110的边缘,使得从因特网112和向因特网112发送的业务可在进入或离开网络110的途中经过网关服务器模块。网关服务器模块120可采用安装在服务器上的软件模块的形式,所述服务器作为向比工作站116直接附接到的网络110广的区域网络112的网关而起作用。数据库管理模块114也连接到因特网112。数据库管理模块也可以是驻存在一个或一个以上计算装置上的软件模块(或一个或一个以上硬件器件)。数据库管理模块114可驻存在包含某类网络连接硬件(例如网络接口卡)的机器上,所述网络连接硬件允许数据库管理模块114向因特网112发送数据和信息以及从因特网112接收数据和信息。
现在参看图2,呈现工作站116的更详细视图。工作站116可包含工作站模块130。工作站模块130可采用经安装以在工作站116的操作系统上运行的软件的形式。或者,工作站模块130可以是在另一机器上运行的由工作站116远程启动的应用程序。
工作站模块130可包含各种组件。工作站模块可包含本地活动内容模块132的清单(inventory),其记录存储在工作站116上的所有网络内容。举例来说,本地内容清单模块132可周期性列出所有本地内容的清单。清单中列出的数据可上载到网关服务器模块120以与经归类的URL/内容数据库146(下文更详细论述)进行比较。本地内容清单模块132可通过与其中含有的清单中列出的本地内容进行比较来确定是否有新内容正在被引入到工作站116。
工作站模块还可包含上载/下载模块134和URL请求模块136。上载/下载模块134可用于通过网关服务器模块120从网络110向因特网112发送和接收数据。URL请求模块136从用户或某个系统过程接收URL输入,且可经由网关服务器模块120发送请求以检索与所述URL相关联的文件和/或内容。通常,上载/下载模块134和URL请求模块136中的每一者的功能可由例如网络浏览器的软件应用程序执行,其中因特网探测器
Figure A20078002593800091
(Internet
Figure A20078002593800092
)、谋智火狐(Mozilla Firefox)、奥普拉(Opera)、远征(Safari)是此项技术中众所周知的浏览软件的实例。或者,模块的功能可在不同的软件应用程序之间划分。举例米说,FTP应用程序可执行上载/下载模块134的功能,而网络浏览器可执行URL请求。其它类型的软件也可执行上载/下载模块134的功能。尽管工作站上通常不需要这些类型的软件,但例如间谍软件(Spyware)或特洛伊木马(Trojan Horses)的软件可能做出从因特网发送和接收数据的请求。
工作站模块130可与网关服务器模块120通信。网关服务器模块120可用于分析传入和传出的网络业务并做出关于所述业务对工作站116可能造成的影响的各种确定。现在参看图3,提供网关服务器模块120的实例。网关服务器模块120与工作站116双向通信。其可从工作站模块130接收文件上载和下载以及URL请求。网关服务器模块120还与因特网112双向通信。因此,源自网络110的工作站116内的请求可能需要在其前进到因特网时通过网关服务器模块120。在一些实施例中,网关服务器模块120可与保护网络110免受来自因特网112的未经授权的入侵的某个防火墙硬件或软件集成。在其它实施例中,网关服务器模块120可以是独立的硬件器件乃至是安装在驻存于到因特网112的网络网关处的单独网关服务器上的软们模块。
如上论述,网关服务器模块120可借助于工作站模块130而从工作站116接收URL请求和上载/下载数据。网关服务器模块120可包含基于所接收数据执行各种功能的各种组件。
网关服务器模块120中包含的一个特征是经归类URL数据库146。URL数据库146可用于存储包含与URL相关联的数据的关于URL的信息。经归类URL数据库146可以是关系数据库,或其可以例如平面文件、面向对象的数据库的某种其它形式存储,且可经由应用程序编程接口(API)或某个数据库管理软件(DBMS)存取。URL数据库146通常可用于帮助确定由URL请求模块136发送的URL请求是否将被许可完成。在一个实施例中,将存储在URL数据库146中的URL归类。
网关服务器模块120还可包含策略模块142。策略模块142可用于实施关于特定内容将如何由网关服务器模块120或由安装在网络110内的防火墙或某种其它安全性软件处理的网络策略。在一个实施例中,策略模块142可经配置以提供关于如何处理针对经归类URL的URL请求的系统引导。举例来说,网关服务器模块120可经配置以不允许归类为“恶意”或“间谍软件”的URL请求。在其它实施例中,策略模块142可用于确定如何处理未经归类的URL请求。在一个实施例中,系统可经配置以阻止针对不在经归类URL数据库146中的URL的所有请求。策略模块142还可经配置以基于做出请求的用户或做出请求的时间而允许某些对未经归类URL的请求。这允许系统在通用型(one-size-fits-a11)配置将不满足运行网关服务器模块120的组织的业务需要时避免具有所述配置。
网关服务器模块120可包含收集模块140。收集模块140可以是用于收集关于URL的数据的软件程序、例行程序或过程。在一个实施例中,当从URL请求模块136接收到针对特定URL的请求时,收集模块140可经配置以访问所述URL并下载页面数据到网关服务器模块120以供网关服务器模块120的组件进行分析。下载的数据还可经由因特网112发送以传递到数据库管理模块114(如下文将进一步论述的)。
在一些实施例中,网关服务器模块120还可包含记录数据库144。记录数据库144可执行各种功能。举例来说,其可存储网络110内的特定类型发生情况的记录。在一个实施例中,记录数据库144可经配置以记录工作站116请求未经授权URL的每一事件。在一些实施例中,记录数据库144还可经配置以记录特定未经归类URL被请求的频率。此信息可用于确定未经归类URL是否应具有特定重要性或优先权且应先于较早的接收到的数据而由数据库管理模块114归类。在一些实施例中,未经归类URL可单独存储在未经归类URL数据库147中。
举例来说,可编写某个间谍软件以从特定URL请求数据。如果网络110内的许多工作站116被所述间谍软件感染,则对特定URL的重复请求可提供网络内存在某种异常的指示。记录数据库也可经配置以记录对经归类URL数据的请求。在一些实施例中,对经归类URL的请求归类可有助于确定特定URL是否被错误地特征化。
现在参看图4,论述记录数据库144的实例。记录数据库144包含四列数据。第一列“页面请求次数”152指示网络110内的用户请求特定URL的次数。第二列“URL”154记录正在记录数据库144中记录的特定URL串。因此,当将URL发送到记录数据库144时,可首先搜索数据库以确定所述URL串是否已在其中。如果不是,那么可将URL串添加到数据库。在一些实施例中,收集模块140可经配置以访问所请求的URL并收集关于所述URL的数据。收集模块140可检索所请求URL的页面源并对其进行扫描以查找可能指示内容类型的特定关键词。举例来说,如果页面源包含“javascript://”,那么所述页可被识别为具有Java脚本。尽管此内容并非固有危险的,但具有Java脚本的网页包含恶意内容的可能性可能更大,所述恶意内容经设计以利用浏览器应用程序处理Java脚本函数调用的方式。在一些实施例中,此数据可存储在记录数据库144中在Java脚本列155中。记录数据库也可从包含活动-X内容的页面接收类似的信息并将所述内容存储在活动X列156内。在其它实施例中,可针对Java小程序、VB脚本等检测和存储其它类型的内容。
再次参看图3,网关服务器模块120可进一步包含管理界面模块148或“管理模块”。管理模块148可用于允许网络管理员或组织内的其它技术人员配置网关服务器模块120的各种特征。在某些实施例中,管理模块148允许网络管理员或某种其它网络管理类型来配置策略模块142。
现在参看图5,提供URL接入策略数据库158的实例。URL接入策略数据库158可由策略模块142用于实施用于网络110内的工作站116接入基于网络的内容的策略。在所示的实施例中,URL接入策略数据库158包含具有四列的表。第一列是用户列160。“用户”列160包含关于服从于在表的给定行中定义的策略的用户的数据。下一列“类别”162列出所述行定义的策略所适用的内容的类别。第三列“总是阻止”164表示当所请求内容的用户和类别166匹配于所述特定行中定义的用户和类别时系统实施的行为或策略。在一个实施例中,“总是阻止”字段可以是其中数据可设定为真或假的布尔型字段。因此,在数据表所示的第一行中,策略模块142经配置以“总是阻止”用户“asmith”对“恶意内容”的请求。
如上所述,策略模块还可经配置以基于不同时间实施策略。在图5提供的实施例中,第四列“允许的时间”166提供此功能性。第二行数据提供如何实施时间策略的实例。用户164设定为“bnguyen”且类别162是“赌博”。正如保留为空白的字段所指示的,策略未经配置以针对“bnguyen”“总是阻止”赌博内容。然而,这些URL请求被许可的时间限于从6PM到8AM。因此,采用这些类型的策略允许网络管理员向工作站和用户提供某一程度的灵活性,但此灵活性的提供是以在典型工作时间期间网络业务不受损害的方式进行的。
图6A和6B提供对经归类URL数据库146可如何存储经归类数据的说明。在一个实施例中,经归类URL可存储在例如图6A所示的两列数据库表中。在一个实施例中,所述表可包含URL列172,其可仅存储已经特征化的URL串。类别列174可存储关于所述URL已如何由数据库模块114特征化的数据(如下文将详细描述)。在一个实施例中,可对URL字段编索引以使得其可被实时地更快速地搜索。因为经归类URL的列表可能涉及到数百万个URL,所以快速接入例行程序是有益的。
现在参看图6B,提供未经归类URL的表147(上文结合图3描述)。此表中可填充有来自工作站116的URL请求,所述URL请求是请求在经归类URL表146中不存在的URL。如下文将更详细描述,网关服务器模块120可经配置以查询经归类URL数据库146以确定是否应阻止所请求的URL。如果所请求URL在经归类数据库146中,则策略模块可确定是否允许所述请求前进到因特网112。然而如果在经归类URL数据库中没有发现所请求URL,则可将其添加到未经归类URL列表176,使得其可经由因特网112发送到数据库管理模块114并稍后经分析和归类且下载到经归类URL数据库146中。
图7是对数据库管理模块114中可包含的各种组件的说明。如上文论述,数据库管理模块114可位于网络110及其相关联工作站116的远端(可经由因特网112接入)。数据库管理模块可采用一个或许多不同硬件和软件组件的形式,例如同时运行数百个服务器以实现改善性能的服务器库。
在一个实施例中,数据库管理模块114可包含上载/下载模块178。上载/下载模块178可以是软件或硬件组件,其允许数据库管理模块114从因特网112向任意数目的位置发送和接收数据。在一个实施例中,上载/下载模块经配置以向因特网112上的网关服务器模块120发送新归类的URL以添加到其本地URL数据库146。
数据库管理模块114还可包含URL/内容数据库180。URL/内容数据库180可采用数据仓库的形式,其存储URL串和关于已由收集系统182收集的URL的信息。URL/内容数据库180可以是经编索引以提供快速且有效的数据搜索的关系数据库。在某些实施例中,URL数据库可以是数据入库应用程序,其跨越许多物理硬件组件和存储媒体。URL数据库可包含例如以下数据:URL串、与这些串相关联的内容、关于如何收集到内容(例如,通过蜜罐客户端、通过客户提交等)的信息,且可能包含URL被写入到URL/内容数据库180内的日期。
数据库管理模块114可进一步包含训练系统184。训练系统184可以是软件/硬件模块,其用于定义可用于归类基于网络的内容的属性和定义。数据库管理模块114可进一步提供记分/分类系统186,其利用由训练系统184创建的定义和属性来向网络内容提供记分或分类(例如,归类),使得所述归类可经由上载/下载模块178传递到网关服务器模块120。
现在参看图8,提供收集系统182的更详细视图。收集系统182可包含收集模块190,其(直接或间接)耦合到数据挖掘模块192。收集模块190可由数据库管理模块114用于为URL/内容数据库180收集关于未经归类的URL的数据。收集模块还可用于收集URL供其它系统组件进行额外分析。收集模块190可与其可从其收集关于URL的数据的一个或一个以上收集源194相关联。收集源可采用各种形式。在一些实施例中,收集源194可包含主动与被动蜜罐和蜜罐客户端、存储在网关服务器模块120上的记录数据库144的用以识别应用程序的数据分析、用于收集的URL和协议。收集源也可以是网络爬行(webcrawling)应用程序,其针对特定关键词搜索因特网112,或在页面内容内搜索短语。收集源194还可包含从DNS数据库挖掘的URL和IP地址数据以识别与已知恶意IP地址相关联的域。在一些实施例中,可通过从共享恶意代码和恶意URL样本的其它组织接收此信息以收集用于归类的URL。在又一些实施例中,可经由电子邮件模块收集URL,所述模块经配置以从整个公众接收举报(tip),近似于通过罪犯举报热线来识别罪犯的方式。
现在参看图9,提供收集模块190的更详细视图。收集模块190可包含允许其有效利用上述收集源中每一者的各种子组件。收集模块190可包含搜索短语数据模块197和表达式数据模块198。搜索短语数据模块197收集并提供可能与识别不适当内容相关的搜索短语。表达式数据模块198可包含各种类型的表达式,例如常规表达式、操作数或某种其它表达式。搜索短语数据模块197和表达式数据模块198每一者可包含可更新的记录组,其可用于定义用于网络爬行收集源194的搜索参数。收集模块190还可包含优先权模块200。优先权模块200可采用在收集系统182内运行的软件过程的形式,或者其可作为单独过程运行。优先权模块可用于对收集模块收集的数据区分优先次序,以便使较可能危险或可疑的URL(或数据)在较可能无害的URL之前受到严格的检查。在一个实施例中,优先权模块200可基于接收的URL来自的收集源194而指派优先权。举例来说,如果从客户报告接收到URL,则可为其指定较高的优先权。类似地,如果从接入在过去主机恶意内容已知的域或IP地址或子网的网络爬行器接收到URL,则所述URL可得到高优先权。类似地,由蜜罐客户端(下文更详细论述)识别的可能危险的网站也可得到高优先权。收集模块190还可包含数据选择模块202,其可与优先权模块200一起工作以确定所识别URL是否应被标记为用于归类的候选URL。在一个实施例中,数据选择URL可提供用于接收搜索参数的用户界面以通过基于优先权和内容搜索数据来进一步细化经区分优先次序的数据。
如上文指示,收集模块还可包含数据下载模块204。数据下载模块204可经配置以识别URL以进行访问以及从所访问URL下载数据和内容。数据下载模块可结合收集模块中的各种子系统一起工作,以检索用于URL/内容数据库180的数据。一个此子系统是网络爬行器模块206。网络爬行器模块206可以是软件应用程序,其经配置以通过接入网页并跟随包含在所述页面中的超链接来接入因特网112上的网站。网络爬行器模块206可配置有若干同时的过程,所述过程允许模块同时爬行许多网站并将所访问URL报告回URL/内容数据库180,如下文将更详细论述。收集模块190还可包含蜜罐客户端模块208。蜜罐客户端模块208是软件过程,其经配置而以吸引存储在所访问页面内的恶意代码的方式模仿网络浏览者访问网站的行为。蜜罐客户端模块208可访问网站并跟踪网站的行为,且将内容下载回到URL/内容数据库180供进一步分析。
下载模块204还可包含第三方供应者模块212,其经配置以从第三方接收URL和相关联的内容。举例来说,第三方模块212可经配置以提供可由一般公众接入的网站。所述模块可经配置以接收输入URL串,所述串随后可被输入到URL/内容数据库180中。在一些实施例中,第三方模块还可经配置以接收来自专有或公共邮寄列表的电子邮件,且识别所述电子邮件内嵌入的任何URL数据以存储在URL/内容数据库180中。
下载模块还可包含网关服务器接入模块210。网关服务器接入模块是软件组件或程序,其可经配置以有规律地接入网关服务器模块120上的记录数据库144以下载/上载由记录数据库144识别的所有新未经归类的网络内容。
返回参看图8,收集系统还可包含数据挖掘模块192。数据挖掘模块192可用于获得关于存储在URL/内容数据库180中的URL的额外数据。在许多例子中,由收集源194供应到收集模块190和URL/内容数据库180的信息仅限于URL串。因此,为了使系统有效地归类所述URL内的内容,可能必须有更多数据。举例来说,可能需要检查实际的页面内容以确定是否存在嵌入URL内的危险内容。数据挖掘模块192用于收集关于URL的此额外必要数据,且下文将更详细论述。
图10提供蜜罐客户端系统208的更详细视图。蜜罐客户端系统208包含控制服务器220。控制服务器220用于控制多个蜜罐挖掘器(honey miner)222,其经配置以访问网站并模仿人类浏览者的行为以尝试检测网站上的恶意代码。蜜罐挖掘器222可以是被动蜜罐挖掘器或主动蜜罐挖掘器。被动蜜罐挖掘器类似于上述的网络爬行器。然而,不同于仅访问网站并报告从所述站点可获得的URL链接的上述网络爬行器,被动蜜罐挖掘器可经配置以下载页面内容并将其传回控制服务器220以用于插入到URL/内容数据库180中或某个其它数据库中。蜜罐挖掘器222可以是单一机器上的软件模块,或者其每一者可实施在单独计算装置上。
在一个实施例中,每一控制服务器可控制16个被动蜜罐挖掘器222。控制服务器220可从URL/内容数据库180提取或接收需要额外信息以便得到完全分析或归类的URL。控制服务器220将所述URL提供到挖掘器,挖掘器又审阅URL并存储收集的数据。当被动挖掘器222完成特定URL时,其可从其控制服务器222请求另一URL。在一些实施例中,挖掘器222可经配置以跟随URL内容上的链接,使得除了访问由控制服务器220指定的URL之外,挖掘器还可访问其链接到所述URL的内容。在一些实施例中,挖掘器222可经配置以相对于每一原始URL挖掘到指定深度。举例来说,挖掘器222可经配置以向下挖掘穿过四层网络内容,然后从控制服务器220请求新的URL数据。
在其它实施例中,控制服务器220可经配置以控制主动蜜罐挖掘器222。与仅访问网站并存储站点上呈现的内容的被动蜜罐挖掘器相比,主动蜜罐挖掘器222可经配置以访问URL并运行或执行在站点上识别的内容。在一些实施例中,主动蜜罐挖掘器222包含网络浏览软件,其经配置以访问网站并经由浏览器软件接入网站上的内容。控制服务器220(或蜜罐挖掘器本身222)可经配置以在其执行其访问的网站上的内容时监视蜜罐挖掘器222的特性。在一个实施例中,控制服务器220将记录由于执行所访问网站上的应用程序或内容而由蜜罐挖掘器访问的URL。因此,主动蜜罐挖掘器222可提供更准确地跟踪系统行为并发现先前未识别出的利用(exploit)的方式。因为主动蜜罐挖掘器将其本身暴露于可执行内容的危险,所以在一些实施例中主动蜜罐挖掘器222可位于沙盒(sandbox)环境中,其提供一组受到紧密控制的资源用于客人程序(guest program)在其中运行,以便保护其它计算机免于可能由恶意内容造成的危险。在一些实施例中,沙盒可采用模拟操作系统的虚拟机的形式。在其它实施例中,沙盒可采用与网络隔离的实际系统的形式。可通过实时跟踪对沙盒机器上的文件系统做出的改变来检测反常行为。在一些实施例中,由主动蜜罐挖掘器222执行的代码可能会引起运行所述挖掘器的机器由于嵌入在网页内容中的恶意代码而变为不可操作。为了解决此问题,控制服务器可控制替代挖掘器,其可插于帮助完成在挖掘过程期间损坏的蜜罐挖掘器222的工作。
现在参看图11,提供已由收集系统收集的一组URL相关数据的实例。尽管提供所收集数据的特定实例,但所属领域的技术人员将了解,除了此实例中提供的数据之外还可收集其它数据。所收集数据中包含针对URL的IP地址230。IP地址230可用于识别正代管同一IP地址下或同一服务器上的可疑内容的多个域的网站。因此,如果具有恶意内容的URL被识别为来自特定IP地址,那么可针对具有相同IP地址的其它URL挖掘URL/内容数据库180中的数据的其余部分,以便对其进行选择和对其进行更仔细的分析。所收集URL数据还可包含URL 232,如图11中的第二列指示。在使用例如上述蜜罐客户端过程的挖掘过程收集数据的例子中,URL 232可常包含来自相同网域的各种页面,因为挖掘器可能经配置以爬行通过网站中的所有链接。所收集数据还可包含针对特定URL的页面内容234。因为URL的内容可呈图形、文本、应用程序和/或其它内容的形式,所以在一些实施例中,存储此URL数据的数据库可经配置以将页面内容存储为数据记录中的二进制大对象(blob)或应用程序对象。然而,由于某些网页只含有文本,因此页面内容234也可存储为文本。在一些实施例中,收集例行程序可经配置以确定URL是否含有可执行内容。在这些例子中,所收集数据的所得数据集可包含URL在其页面代码内是否具有可执行内容236的指示。此信息可稍后用于从具有候选数据的URL/内容数据库180中选择数据以供分析。
如上文结合图3论述,在一些实施例中,网关服务器模块120可经配置以基于经归类URL数据库146中存储的数据来控制对特定URL的接入。图12是描述网关服务器模块处理来自工作站116的请求的实施例的流程图。
在方框1200,工作站116从因特网112请求URL。在方框1202,此请求在因特网网关处被拦截并转发到网关服务器模块120。在方框1204,查询经归类URL数据库146以确定所请求的URL是否存储在数据库146中。如果发现所请求的URL是数据库中的记录,则过程继续移动到方框1206,其中其分析URL记录以确定URL的类别是否是应针对工作站用户阻止的类别。如果所述类别被阻止,则过程跳转到方框1212且请求被阻止。然而如果类别未被阻止,则在方框1208处允许所述请求。
如果在方框1204处没有发现所请求的URL是经归类URL数据库146中的记录,则系统前进到方框1210。在方框1210处,系统确定如何处理未经归类内容。在一些实施例中,系统可利用策略模块142来做出此确定。如果网关服务器模块120经配置以阻止针对未经归类内容的请求,则过程移动到方框1212,且阻止请求。另一方面,如果模块经配置以允许这些类型的未经归类请求,则过程移动到方框1208,其中允许所述请求前进到因特网112。
在一些实施例中,对URL数据的请求可能会导致将新记录添加到记录数据库144。这些记录稍后可被传送到数据库管理模块114供进一步分析。现在参看图13,提供描述网关服务器模块可借以处理URL请求的过程的另一流程图。在方框1300,网关服务器模块120接收针对URL的请求。如上所述,此请求可来自工作站116。在方框1302,接着将URL与经归类URL数据库146进行比较,且系统在方框1304确定所请求URL是否在经归类URL数据库中。
如果URL已经在经归类URL数据库146中,则过程跳转到方框1308。然而如果没有发现所请求URL在经归类URL数据库146中,则过程移动到方框1306,其中将URL插入到未经归类URL数据库147中。(在一些实施例中,记录数据库144和未经归类URL147数据库可以是同一数据库。)在将URL插入到数据库中之后,所述方法前进到方框1308。在方框1308,检查策略数据库以获得关于如何处理所接收URL的指令。一旦策略模块142经检查,就在方框1310更新记录数据库144以记录URL已被请求。在更新记录数据库144之后,如果策略数据库许可工作站116接入URL,则过程移动到方框1314,且将URL请求发送到因特网112。然而如果策略数据库不允许所述请求,则过程跳转到方框1316且阻止请求。
在一些实施例中,网关服务器模块120可执行收集以减少数据库管理模块114的收集系统182的负担。图14提供网关服务器收集模块140用于收集关于未经归类URL的数据的系统的实例。在方框1400,网关服务器模块接收针对URL的请求。接着,在方框1402,将所请求URL与经归类URL数据库进行比较。如果在方框1404系统确定所请求URL在URL数据库中,则过程移动到方框1410,其中依据URL如何归类而将请求转发到因特网112或阻止请求。
如果所请求URL不在经归类URL数据库146中,则过程移动到方框1406,其中将URL发送到网关收集模块140。接着在方框1408,收集模块140收集关于所请求URL的URL数据。在一些实施例中,此数据可存储在未经归类URL数据库147中。或者,此数据可简单地经由因特网112转发到数据库管理模块114。一旦数据经收集并存储,则过程移动到方框1410,其中基于策略模块142中指示的策略而允许或阻止URL请求。
如先前论述,可将未经归类URL数据从网关服务器模块120发送到数据库管理模块114供进一步分析,使得URL可经归类并添加到经归类URL数据库146。然而,因为未经归类数据的量有时太大,所以或许不可能在无损于准确性的情况下将所有接收的数据归类。因此,在一些例子中,可能需要识别未经归类数据内的最可能对工作站116和网络110呈现威胁的候选URL。
图15提供用于识别候选URL供进一步分析的方法的实例。所述方法以将URL接收到数据库模块114的收集系统182中开始。在方框1502,预处理URL或应用程序以确定其是否携带已知的恶意数据元素或数据签名。接着在方框1504,如果系统确定URL包含已知的恶意元素,则过程跳转到方框1514,其中将URL标记为候选URL并将其发送到训练系统184供进一步分析。如果在方框1504中对URL的初始分析没有显示恶意元素,则过程移动到方框1506,其中将URL添加到可能候选URL的数据库。接着在方框1508,数据挖掘模块192经配置以基于预先配置的条件(例如,攻击串、病毒签名等)从源194(可能候选URL的数据库是其中之一)选择URL。接着在方框1510将包含所有数据源194的数据集发送到数据挖掘模块192,其中在方框1512通过数据挖掘模块192分析每一URL。如果URL满足所定义的预先配置条件,则过程移动到方框1514,其中将URL标记为候选URL并将其继续发送到记分/分类系统186供额外分析。然而如果URL不满足为将其转换为候选URL而指定的条件,则方法前进到方框1516且不将URL标记为候选。尽管在URL候选分类的上下文中描述此实施例,但所属领域的技术人员将容易了解,可使用上述过程类似地分析应用程序并将其标记为候选。
在另一实施例中,系统可结合数据挖掘系统192利用蜜罐客户端系统208来收集将添加到候选URL列表用于分类的URL。图16说明用于收集此数据的过程的实例。在方框1600,启动蜜罐客户端控制服务器220。接着在方框1602控制服务器220启动一个或一个以上蜜罐挖掘器222。接着在方框1604,蜜罐挖掘器222访问由控制服务器220向其提供的下一URL,并在方框1606解析所述URL的页面源以确定URL中是否存在活动内容。如果页面中没有发现活动内容,则过程跳转到方框1610。然而如果发现活动内容,则过程移动到方框1608,其中将URL添加到候选URL列表。
接着在方框1610,挖掘器222确定当前URL是否含有超链接或表格。如果没有发现超链接或表格,则过程循环回到方框1604,其中挖掘器从控制服务器222接收另一URL供分析。然而如果URL含有超链接或表格,则方法前进到方框1612,其中其接着确定URL是否包含隐藏链接或表格。因为许多恶意网站希望避免例如蜜罐客户端系统208的挖掘软件的检测,所以其包含当人浏览时无法看到的隐藏超链接。因此,网站可通过将这些链接作为“诱饵”隐藏来检测挖掘器。用于隐藏链接的一种技术是使其具有与网页背景相同的颜色。如果挖掘器跟随链接,则网站被警告存在挖掘器。
在图16提供的方法中,挖掘器经配置以检测这些隐藏链接。如果不存在隐藏链接,那么过程跳转到方框1618,且挖掘器通过跟随URL内容中的非隐藏链接而继续。然而在方框1614,如果存在任何隐藏链接,则在方框1616将URL及其隐藏链接添加到分类列表并将其忽略。一旦隐藏链接经处理(即,添加到分类列表),则方法接着前进到方框1618,其中跟随非隐藏链接。
在一些实施例中,将URL数据添加到URL/内容数据库180,而无需供记分/分类系统186进行完全分析的所有必要数据。举例来说,有时从收集源194接收的关于URL的仅有的数据是URL串本身。因此,可能必须收集关于URL的额外数据以便对其进行适当分析。现在参看图17,其根据一个实施例展示描述系统可如何处理候选URL的过程。在方框1700,将来自收集源的数据添加到URL/内容数据库180。如先前论述,URL/内容数据库180可以是数据仓库。接着在方框1702,系统查看URL数据并确定是否有进行分析所必需的遗漏内容。在一些实施例中,如果URL的内容不在数据仓库中,则在方框1704系统确定需要更多数据并将URL发送到数据挖掘模块用于补充。数据挖掘模块接着可获取所接收数据并收集额外数据。如果没有内容遗漏,则在方框1706将URL立即发送到记分/分类模块186供进一步分析。
如上论述,收集并分析因特网数据以确定其是否包含有害的活动内容的难点之一是必须收集和分析的极大的数据量。在又一实施例中,数据挖掘模块192可用于通过收集大量相关数据来解决这些问题以有效且高效地利用系统资源。现在参看图18,提供数据挖掘系统192的更详细的方框图。数据挖掘系统192可采用软件模块的形式,其运行多个异步过程以实现最大效率和输出。数据挖掘系统192可包含插件模块242,插件模块242接收提供关于应如何处理输入数据的指令的配置参数。在一个实施例中,由插件模块接收的指令可采用HTTP协议插件的形式,其为数据挖掘系统192提供参数以接收URL数据并基于由数据挖掘系统对URL数据实施的各种HTTP相关指令分析和补充数据。在另一实施例中,插件可适合于挖掘例如FTP、NNTP或某种其它数据形式的某种其它协议。
也可用于实施被动蜜罐客户端的数据挖掘系统192也可包含调度程序248的库246。调度程序248是各个异步处理实体,其基于输入到数据挖掘系统中的数据(用于分析)和由插件模块242接收的配置数据接收任务指派。库246是由驱动程序244控制的调度程序集合。驱动程序244是用于库的管理机制。驱动程序244可经配置以监视库246中的调度程序248的活动以确定何时将额外数据发送到库246中用于挖掘和分析。在一个实施例中,驱动程序可经配置以每当任何调度程序248空闲便将新数据单元发送到库246中。在一个实施例中,驱动程序244可用作控制服务器以管理如上文结合图10描述的蜜罐客户端挖掘器222。库246可将数据单元传递到空闲的调度程序248。调度程序248读取插件配置并根据插件242执行动作。
在一个实施例中,插件模块可接收HTTP插件。HTTP插件可经配置以接收呈URL串形式的输入数据,关于所述数据,数据挖掘系统192将获得额外信息,例如URL的页面内容、在接入时由URL返回的HTTP消息(例如,“4xx-文件未找到”或“5xx-服务器错误”)。插件可进一步指定网络爬行模式,其中调度程序除了收集页面内容以外还将URL内容内的URL链接添加到待分析的URL数据集。
如本文使用,“数据库”指存储在可由计算机存取的媒体上的存储数据的任何集合。举例来说,数据库可指平面数据文件或结构化数据文件。而且,将认识到结合本文揭示的实施例描述的各种说明性数据库可实施为组合各种说明性数据库的方面的数据库,或者可将说明性数据库划分为多个数据库。举例来说,各种说明性数据库中的一者或一者以上可实施为一个或一个以上关系数据库中的表。实施例可以关系数据库实施,所述关系数据库包含SQL数据库、面向对象的数据库、对象关系数据库、平面文件或任何其它合适的数据存储系统。
结合本文揭示的实施例描述的各种说明性逻辑区块、模块和电路可用如下装置实施或执行:通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或其它可编程逻辑装置、离散门或晶体管逻辑、离散硬件组件或其经设计以执行本文所述功能的任意组合。通用处理器可以是微处理器,但在替代方案中,处理器可以是任何常规处理器、控制器、微控制器或状态机。处理器也可实施为计算装置的组合,例如DSP与微处理器的组合、多个微处理器、一个或一个以上微处理器结合DSP核心,或任何其它此配置。
结合本文揭示的实施例描述的方法或算法的步骤可直接以硬件实施、以由处理器执行的软件模块实施,或以两者的组合实施。软件模块可驻存在RAM存储器、快闪存储器、ROM存储器、EPROM存储器、EEPROM存储器、寄存器、硬盘、可移除盘、CD-ROM或此项技术中已知的任何其它形式的存储媒体中。示范性存储媒体耦合到处理器,使得处理器可从存储媒体读取信息和向存储媒体写入信息。在替代方案中,存储媒体可与处理器成为一体。处理器和存储媒体可驻存在ASIC中。ASIC可驻存在用户终端中。在替代方案中,处理器和存储媒体可作为离散组件驻存在用户终端中。所属领域的技术人员将了解,在不脱离本发明精神的情况下可做出许多各种修改。因此,应清楚了解,本发明的形式仅是说明性的,且不希望限制本发明的范围。

Claims (28)

1.一种识别不适当网络内容的计算机实施的方法,所述方法包括:
接收针对网络内容的请求;
将所述请求与数据库中的数据进行比较;
如果所述请求不在所述数据库中,则将所述请求发送到收集模块;
通过所述收集模块收集与所述请求相关的数据;以及
基于所述收集的数据确定所述请求的候选状态。
2.根据权利要求1所述的计算机实施的方法,其中所述请求是应用程序请求。
3.根据权利要求1所述的计算机实施的方法,其中所述请求是针对URL的请求。
4.根据权利要求1所述的计算机实施的方法,其中所述数据库是URL/内容数据库。
5.根据权利要求1所述的计算机实施的方法,其中所述网络内容是可通过URL接入的内容。
6.根据权利要求1所述的计算机实施的方法,其中确定是否使所述请求成为候选请求包括:
预先处理与所述请求相关的所述数据;以及
至少部分地基于所述预先处理将所述请求标记为候选请求。
7.根据权利要求6所述的计算机实施的方法,其中所述预先处理包含扫描所述数据以查找已知的不安全数据元素。
8.根据权利要求7所述的计算机实施的方法,其中所述预先处理指示与所述请求相关的所述数据含有已知的不安全数据元素。
9.根据权利要求7所述的计算机实施的方法,其进一步包括:如果与所述请求相关的所述数据不含有已知的不安全数据元素,则将所述请求标记为可能的候选请求。
10.根据权利要求9所述的计算机实施的方法,其进一步包括:
配置数据挖掘模块以从所述可能的候选请求中选择候选请求;以及
将所述可能的候选请求输入到所述数据挖掘模块中。
11.根据权利要求10所述的计算机实施的方法,其中配置所述数据挖掘模块包含定义指示目标属性的特性,以及配置所述数据挖掘模块以识别具有所述属性的请求。
12.根据权利要求11所述的计算机实施的方法,其中所述属性是一组关键词、常规表达式或操作数中的至少一者。
13.根据权利要求11所述的计算机实施的方法,其中所述属性是HTTP请求标头数据的类型。
14.根据权利要求11所述的计算机实施的方法,其中所述HTTP请求标头数据包含内容类型。
15.一种用于从一组未经归类的URL中选择候选URL的系统,所述系统包括:
数据库,其存储所述未经归类的URL;
收集系统,其经配置以收集与所述未经归类的URL相关的信息;以及
数据挖掘模块,其经配置以识别具有指示目标内容的特性的未经归类的URL。
16.根据权利要求15所述的系统,其中所述目标内容是有害内容。
17.根据权利要求15所述的系统,其进一步包括经配置以收集关于所述未经归类的URL的额外数据的收集模块,所述额外数据用于识别所述目标内容。
18.根据权利要求17所述的系统,其中所述收集模块包含网络爬行模块。
19.根据权利要求18所述的系统,其中所述收集模块包含关键词数据模块。
20.根据权利要求19所述的系统,其进一步包括经配置以基于候选URL的可能危险确定所述URL的优先权以进行归类的优先权模块。
21.一种收集关于URL的数据的计算机实施的方法,所述方法包括:
提供具有配置插件的数据挖掘模块,所述数据挖掘模块具有经配置以彼此独立操作的多个调度程序;
将URL数据接收到所述数据挖掘模块中以用于分析;
将所述URL数据分离为工作单元,每一工作单元包括一URL;
确定所述多个调度程序中是否有一者可用于接收工作单元;
如果可用,则将所述工作单元中的一者发送到所述调度程序中的一者;以及
基于由所述配置插件提供的数据处理所述发送的工作单元。
22.根据权利要求21所述的计算机实施的方法,其中所述调度程序每一者在计算机存储器内包括一单独过程。
23.根据权利要求22所述的方法,其中所述配置插件向所述可用的调度程序提供指令,所述指令致使所述可用的调度程序访问与所述经处理的发送的工作单元相关的网页并将与所述经处理的发送的工作单元相关联的数据存储在数据库中。
24.根据权利要求23所述的方法,其中如果与所述经处理的发送的工作单元相关联的所述数据包含URL串,则将所述URL串添加到所述URL数据。
25.根据权利要求21所述的方法,其中所述确定所述多个调度程序中是否有一者可用于接收工作单元包括轮询所述调度程序。
26.一种用于收集关于URL的数据的系统,所述系统包括:
数据库,其用于存储关于URL的信息;
调度程序库,所述调度程序包括异步系统过程,所述异步系统过程每一者经配置以接收URL数据输入并对所述数据执行动作;以及
驱动程序模块,其经配置以监视所述调度程序库以查找可用的调度程序,且将所述URL数据输入的一部分发送到所述可用的调度程序。
27.根据权利要求26所述的系统,其中所述调度程序进一步经配置以访问由所述接收的URL数据输入指示的URL并将与所述URL数据输入相关联的信息下载到所述数据库。
28.一种用于从一组未经归类的URL中识别候选URL的系统,所述系统包括:
用于存储所述未经归类的URL的构件;
用于收集与所述未经归类的URL相关的信息的构件;以及
用于识别具有指示目标内容的特性的所述未经归类的URL的构件。
CN200780025938.7A 2006-07-10 2007-07-09 分析网络内容的系统和方法 Active CN101517570B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/484,240 2006-07-10
US11/484,240 US8020206B2 (en) 2006-07-10 2006-07-10 System and method of analyzing web content
PCT/US2007/015280 WO2008008219A2 (en) 2006-07-10 2007-07-09 System and method of analyzing web content

Publications (2)

Publication Number Publication Date
CN101517570A true CN101517570A (zh) 2009-08-26
CN101517570B CN101517570B (zh) 2015-09-16

Family

ID=38740351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200780025938.7A Active CN101517570B (zh) 2006-07-10 2007-07-09 分析网络内容的系统和方法

Country Status (6)

Country Link
US (3) US8020206B2 (zh)
EP (1) EP2044539A2 (zh)
CN (1) CN101517570B (zh)
AU (1) AU2007273085B2 (zh)
CA (1) CA2656571A1 (zh)
WO (1) WO2008008219A2 (zh)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917443A (zh) * 2010-08-26 2010-12-15 北京天融信科技有限公司 一种安全网关及其控制敏感链接的方法
CN102289456A (zh) * 2010-06-17 2011-12-21 微软公司 Web爬行的差异检测
CN102571812A (zh) * 2011-12-31 2012-07-11 成都市华为赛门铁克科技有限公司 一种网络威胁的跟踪识别方法及装置
CN102843270A (zh) * 2011-09-02 2012-12-26 哈尔滨安天科技股份有限公司 基于url与本地文件关联的可疑url检测方法和装置
CN103870554A (zh) * 2009-12-11 2014-06-18 北京奇虎科技有限公司 一种实现浏览器地址栏铭牌的方法
TWI611308B (zh) * 2016-11-03 2018-01-11 財團法人資訊工業策進會 網頁資料擷取裝置及其網頁資料擷取方法
CN112134852A (zh) * 2020-08-31 2020-12-25 广州锦行网络科技有限公司 一种蜜罐系统攻击行为数据异步http发送方法及装置

Families Citing this family (329)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7584208B2 (en) 2002-11-20 2009-09-01 Radar Networks, Inc. Methods and systems for managing offers and requests in a network
US7640267B2 (en) 2002-11-20 2009-12-29 Radar Networks, Inc. Methods and systems for managing entities in a computing device using semantic objects
US7433876B2 (en) 2004-02-23 2008-10-07 Radar Networks, Inc. Semantic web portal and platform
US9027135B1 (en) 2004-04-01 2015-05-05 Fireeye, Inc. Prospective client identification using malware attack detection
US8566946B1 (en) 2006-04-20 2013-10-22 Fireeye, Inc. Malware containment on connection
US9106694B2 (en) 2004-04-01 2015-08-11 Fireeye, Inc. Electronic message analysis for malware detection
US8793787B2 (en) 2004-04-01 2014-07-29 Fireeye, Inc. Detecting malicious network content using virtual environment components
US8171553B2 (en) 2004-04-01 2012-05-01 Fireeye, Inc. Heuristic based capture with replay to virtual machine
US8898788B1 (en) 2004-04-01 2014-11-25 Fireeye, Inc. Systems and methods for malware attack prevention
US8881282B1 (en) 2004-04-01 2014-11-04 Fireeye, Inc. Systems and methods for malware attack detection and identification
US8528086B1 (en) 2004-04-01 2013-09-03 Fireeye, Inc. System and method of detecting computer worms
US8584239B2 (en) 2004-04-01 2013-11-12 Fireeye, Inc. Virtual machine with dynamic data flow analysis
US7587537B1 (en) 2007-11-30 2009-09-08 Altera Corporation Serializer-deserializer circuits formed from input-output circuit registers
US8924838B2 (en) 2006-08-09 2014-12-30 Vcvc Iii Llc. Harvesting data from page
US8312075B1 (en) * 2006-11-29 2012-11-13 Mcafee, Inc. System, method and computer program product for reconstructing data received by a computer in a manner that is independent of the computer
US8099455B2 (en) * 2007-08-16 2012-01-17 Sony Ericsson Mobile Communications Ab Notifying remote devices of available content
US20090076887A1 (en) 2007-09-16 2009-03-19 Nova Spivack System And Method Of Collecting Market-Related Data Via A Web-Based Networking Environment
US8479284B1 (en) 2007-12-20 2013-07-02 Symantec Corporation Referrer context identification for remote object links
US8180761B1 (en) * 2007-12-27 2012-05-15 Symantec Corporation Referrer context aware target queue prioritization
US7966650B2 (en) * 2008-02-22 2011-06-21 Sophos Plc Dynamic internet address assignment based on user identity and policy compliance
US9264441B2 (en) * 2008-03-24 2016-02-16 Hewlett Packard Enterprise Development Lp System and method for securing a network from zero-day vulnerability exploits
US8359651B1 (en) * 2008-05-15 2013-01-22 Trend Micro Incorporated Discovering malicious locations in a public computer network
US8997219B2 (en) 2008-11-03 2015-03-31 Fireeye, Inc. Systems and methods for detecting malicious PDF network content
US8850571B2 (en) * 2008-11-03 2014-09-30 Fireeye, Inc. Systems and methods for detecting malicious network content
US8800040B1 (en) 2008-12-31 2014-08-05 Symantec Corporation Methods and systems for prioritizing the monitoring of malicious uniform resource locators for new malware variants
US9037567B2 (en) * 2009-04-15 2015-05-19 Vcvc Iii Llc Generating user-customized search results and building a semantics-enhanced search engine
US8200617B2 (en) 2009-04-15 2012-06-12 Evri, Inc. Automatic mapping of a location identifier pattern of an object to a semantic type using object metadata
US8862579B2 (en) 2009-04-15 2014-10-14 Vcvc Iii Llc Search and search optimization using a pattern of a location identifier
US10628847B2 (en) 2009-04-15 2020-04-21 Fiver Llc Search-enhanced semantic advertising
CN101527721B (zh) * 2009-04-22 2012-09-05 中兴通讯股份有限公司 一种基于家庭网关的防病毒方法及相关装置
US8370302B2 (en) * 2009-06-02 2013-02-05 Hitachi, Ltd. Method and apparatus for block based volume backup
US8489685B2 (en) 2009-07-17 2013-07-16 Aryaka Networks, Inc. Application acceleration as a service system and method
US8832829B2 (en) 2009-09-30 2014-09-09 Fireeye, Inc. Network-based binary file extraction and analysis for malware detection
US8321551B2 (en) * 2010-02-02 2012-11-27 Symantec Corporation Using aggregated DNS information originating from multiple sources to detect anomalous DNS name resolutions
US8813232B2 (en) 2010-03-04 2014-08-19 Mcafee Inc. Systems and methods for risk rating and pro-actively detecting malicious online ads
US8990610B2 (en) * 2010-03-12 2015-03-24 International Business Machines Corporation Preferred resource selector
US8510829B2 (en) 2010-06-24 2013-08-13 Mcafee, Inc. Systems and methods to detect malicious media files
US8825810B1 (en) * 2010-07-09 2014-09-02 Open Invention Network, Llc Domain name service based remote programming objects
US8595843B1 (en) * 2010-08-12 2013-11-26 Amazon Technologies, Inc. Techniques for identifying sources of unauthorized code
US8484740B2 (en) 2010-09-08 2013-07-09 At&T Intellectual Property I, L.P. Prioritizing malicious website detection
CN102404281B (zh) * 2010-09-09 2014-08-13 北京神州绿盟信息安全科技股份有限公司 一种网站扫描设备和方法
US8640225B2 (en) 2010-09-24 2014-01-28 Nokia Corporation Method and apparatus for validating resource identifier
KR20120071827A (ko) * 2010-12-23 2012-07-03 한국인터넷진흥원 악성코드 경유-유포지 탐지를 위한 씨드 정보 수집 장치 및 수집 방법
CN102567304B (zh) * 2010-12-24 2014-02-26 北大方正集团有限公司 一种网络不良信息的过滤方法及装置
CN102902917A (zh) * 2011-07-29 2013-01-30 国际商业机器公司 用于预防钓鱼式攻击的方法和系统
US9106709B2 (en) * 2011-09-22 2015-08-11 Opera Software Asa Server side mobile audience intelligence creation
US8880389B2 (en) * 2011-12-09 2014-11-04 Igor Iofinov Computer implemented semantic search methodology, system and computer program product for determining information density in text
CN102402620A (zh) * 2011-12-26 2012-04-04 余姚市供电局 一种恶意网页防御方法和系统
US9519782B2 (en) 2012-02-24 2016-12-13 Fireeye, Inc. Detecting malicious network content
US9047456B2 (en) 2012-03-20 2015-06-02 Canon Information And Imaging Solutions, Inc. System and method for controlling access to a resource
WO2013162264A1 (ko) * 2012-04-23 2013-10-31 줌인터넷 주식회사 패킷미러링을 이용한 객체 수집 방법 및 시스템
WO2013184653A1 (en) * 2012-06-04 2013-12-12 Board Of Regents, The University Of Texas System Method and system for resilient and adaptive detection of malicious websites
EP2857987A4 (en) * 2012-06-30 2015-04-15 Huawei Tech Co Ltd METHOD, DEVICE AND SYSTEM FOR ACQUIRING USER BEHAVIOR
CN103778365B (zh) 2012-10-18 2015-05-13 腾讯科技(深圳)有限公司 一种检测网页隐藏内容的方法,及设备
US10572665B2 (en) 2012-12-28 2020-02-25 Fireeye, Inc. System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
EP2760183A1 (en) * 2013-01-28 2014-07-30 British Telecommunications public limited company System for detecting hyperlink faults
US9176843B1 (en) 2013-02-23 2015-11-03 Fireeye, Inc. Framework for efficient security coverage of mobile software applications
US8990944B1 (en) 2013-02-23 2015-03-24 Fireeye, Inc. Systems and methods for automatically detecting backdoors
US9009823B1 (en) 2013-02-23 2015-04-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications installed on mobile devices
US9367681B1 (en) 2013-02-23 2016-06-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US9824209B1 (en) 2013-02-23 2017-11-21 Fireeye, Inc. Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
US9009822B1 (en) 2013-02-23 2015-04-14 Fireeye, Inc. Framework for multi-phase analysis of mobile applications
US9159035B1 (en) 2013-02-23 2015-10-13 Fireeye, Inc. Framework for computer application analysis of sensitive information tracking
US9195829B1 (en) 2013-02-23 2015-11-24 Fireeye, Inc. User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9355247B1 (en) 2013-03-13 2016-05-31 Fireeye, Inc. File extraction from memory dump for malicious content analysis
US9565202B1 (en) 2013-03-13 2017-02-07 Fireeye, Inc. System and method for detecting exfiltration content
US9626509B1 (en) 2013-03-13 2017-04-18 Fireeye, Inc. Malicious content analysis with multi-version application support within single operating environment
US9104867B1 (en) 2013-03-13 2015-08-11 Fireeye, Inc. Malicious content analysis using simulated user interaction without user involvement
US9311479B1 (en) 2013-03-14 2016-04-12 Fireeye, Inc. Correlation and consolidation of analytic data for holistic view of a malware attack
US9430646B1 (en) 2013-03-14 2016-08-30 Fireeye, Inc. Distributed systems and methods for automatically detecting unknown bots and botnets
WO2014145805A1 (en) 2013-03-15 2014-09-18 Mandiant, Llc System and method employing structured intelligence to verify and contain threats at endpoints
US9251343B1 (en) 2013-03-15 2016-02-02 Fireeye, Inc. Detecting bootkits resident on compromised computers
US10713358B2 (en) 2013-03-15 2020-07-14 Fireeye, Inc. System and method to extract and utilize disassembly features to classify software intent
CN105144767B (zh) * 2013-04-12 2019-07-02 Sk电信有限公司 用于检查消息的装置和方法以及用户终端
US9495180B2 (en) 2013-05-10 2016-11-15 Fireeye, Inc. Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en) 2013-05-13 2017-04-25 Fireeye, Inc. Classifying sets of malicious indicators for detecting command and control communications associated with malware
US10133863B2 (en) 2013-06-24 2018-11-20 Fireeye, Inc. Zero-day discovery system
US9536091B2 (en) 2013-06-24 2017-01-03 Fireeye, Inc. System and method for detecting time-bomb malware
US9300686B2 (en) 2013-06-28 2016-03-29 Fireeye, Inc. System and method for detecting malicious links in electronic messages
US9888016B1 (en) 2013-06-28 2018-02-06 Fireeye, Inc. System and method for detecting phishing using password prediction
US20160169164A1 (en) * 2013-07-23 2016-06-16 Mahindra & Mahindra Ltd. Naturally aspirated common rail diesel engine meeting ultra low pm emission by passive exhaust after treatment
US9773126B2 (en) * 2013-09-17 2017-09-26 Adobe Systems Incorporated Data collection privacy
US9294501B2 (en) 2013-09-30 2016-03-22 Fireeye, Inc. Fuzzy hash of behavioral results
US9736179B2 (en) 2013-09-30 2017-08-15 Fireeye, Inc. System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US9171160B2 (en) 2013-09-30 2015-10-27 Fireeye, Inc. Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9628507B2 (en) 2013-09-30 2017-04-18 Fireeye, Inc. Advanced persistent threat (APT) detection center
US10089461B1 (en) 2013-09-30 2018-10-02 Fireeye, Inc. Page replacement code injection
US9690936B1 (en) 2013-09-30 2017-06-27 Fireeye, Inc. Multistage system and method for analyzing obfuscated content for malware
US10515214B1 (en) 2013-09-30 2019-12-24 Fireeye, Inc. System and method for classifying malware within content created during analysis of a specimen
US10192052B1 (en) 2013-09-30 2019-01-29 Fireeye, Inc. System, apparatus and method for classifying a file as malicious using static scanning
US9921978B1 (en) 2013-11-08 2018-03-20 Fireeye, Inc. System and method for enhanced security of storage devices
US9189627B1 (en) 2013-11-21 2015-11-17 Fireeye, Inc. System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
EP3076302B1 (en) * 2013-11-25 2020-04-29 NEC Corporation Information collection system, control method, and program
US9756074B2 (en) 2013-12-26 2017-09-05 Fireeye, Inc. System and method for IPS and VM-based detection of suspicious objects
US9747446B1 (en) 2013-12-26 2017-08-29 Fireeye, Inc. System and method for run-time object classification
CN104125209B (zh) * 2014-01-03 2015-09-09 腾讯科技(深圳)有限公司 恶意网址提示方法和路由器
US9292686B2 (en) 2014-01-16 2016-03-22 Fireeye, Inc. Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment
US9262635B2 (en) 2014-02-05 2016-02-16 Fireeye, Inc. Detection efficacy of virtual machine-based analysis with application specific events
US9241010B1 (en) 2014-03-20 2016-01-19 Fireeye, Inc. System and method for network behavior detection
US10242185B1 (en) 2014-03-21 2019-03-26 Fireeye, Inc. Dynamic guest image creation and rollback
US9419986B2 (en) * 2014-03-26 2016-08-16 Symantec Corporation System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
US9591015B1 (en) 2014-03-28 2017-03-07 Fireeye, Inc. System and method for offloading packet processing and static analysis operations
US9432389B1 (en) 2014-03-31 2016-08-30 Fireeye, Inc. System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9223972B1 (en) 2014-03-31 2015-12-29 Fireeye, Inc. Dynamically remote tuning of a malware content detection system
US9973531B1 (en) 2014-06-06 2018-05-15 Fireeye, Inc. Shellcode detection
US9438623B1 (en) 2014-06-06 2016-09-06 Fireeye, Inc. Computer exploit detection using heap spray pattern matching
US9594912B1 (en) 2014-06-06 2017-03-14 Fireeye, Inc. Return-oriented programming detection
US10084813B2 (en) 2014-06-24 2018-09-25 Fireeye, Inc. Intrusion prevention and remedy system
US9398028B1 (en) 2014-06-26 2016-07-19 Fireeye, Inc. System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
US10805340B1 (en) 2014-06-26 2020-10-13 Fireeye, Inc. Infection vector and malware tracking with an interactive user display
US10002252B2 (en) 2014-07-01 2018-06-19 Fireeye, Inc. Verification of trusted threat-aware microvisor
US9363280B1 (en) 2014-08-22 2016-06-07 Fireeye, Inc. System and method of detecting delivery of malware using cross-customer data
US10671726B1 (en) 2014-09-22 2020-06-02 Fireeye Inc. System and method for malware analysis using thread-level event monitoring
US10027689B1 (en) 2014-09-29 2018-07-17 Fireeye, Inc. Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9773112B1 (en) 2014-09-29 2017-09-26 Fireeye, Inc. Exploit detection of malware and malware families
US9690933B1 (en) 2014-12-22 2017-06-27 Fireeye, Inc. Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US10075455B2 (en) 2014-12-26 2018-09-11 Fireeye, Inc. Zero-day rotating guest image profile
US9934376B1 (en) 2014-12-29 2018-04-03 Fireeye, Inc. Malware detection appliance architecture
US9838417B1 (en) 2014-12-30 2017-12-05 Fireeye, Inc. Intelligent context aware user interaction for malware detection
US9690606B1 (en) 2015-03-25 2017-06-27 Fireeye, Inc. Selective system call monitoring
US10148693B2 (en) 2015-03-25 2018-12-04 Fireeye, Inc. Exploit detection system
US9438613B1 (en) 2015-03-30 2016-09-06 Fireeye, Inc. Dynamic content activation for automated analysis of embedded objects
US10417031B2 (en) 2015-03-31 2019-09-17 Fireeye, Inc. Selective virtualization for security threat detection
US10474813B1 (en) 2015-03-31 2019-11-12 Fireeye, Inc. Code injection technique for remediation at an endpoint of a network
US9483644B1 (en) 2015-03-31 2016-11-01 Fireeye, Inc. Methods for detecting file altering malware in VM based analysis
US9654485B1 (en) 2015-04-13 2017-05-16 Fireeye, Inc. Analytics-based security monitoring system and method
US9594904B1 (en) 2015-04-23 2017-03-14 Fireeye, Inc. Detecting malware based on reflection
US10642753B1 (en) 2015-06-30 2020-05-05 Fireeye, Inc. System and method for protecting a software component running in virtual machine using a virtualization layer
US10726127B1 (en) 2015-06-30 2020-07-28 Fireeye, Inc. System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US11113086B1 (en) 2015-06-30 2021-09-07 Fireeye, Inc. Virtual system and method for securing external network connectivity
US10454950B1 (en) 2015-06-30 2019-10-22 Fireeye, Inc. Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
EP3125147B1 (en) * 2015-07-27 2020-06-03 Swisscom AG System and method for identifying a phishing website
US10715542B1 (en) 2015-08-14 2020-07-14 Fireeye, Inc. Mobile application risk analysis
US10176321B2 (en) 2015-09-22 2019-01-08 Fireeye, Inc. Leveraging behavior-based rules for malware family classification
US10033747B1 (en) 2015-09-29 2018-07-24 Fireeye, Inc. System and method for detecting interpreter-based exploit attacks
US10817606B1 (en) 2015-09-30 2020-10-27 Fireeye, Inc. Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
US9825989B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Cyber attack early warning system
US9825976B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Detection and classification of exploit kits
US10210329B1 (en) 2015-09-30 2019-02-19 Fireeye, Inc. Method to detect application execution hijacking using memory protection
US10601865B1 (en) 2015-09-30 2020-03-24 Fireeye, Inc. Detection of credential spearphishing attacks using email analysis
US10706149B1 (en) 2015-09-30 2020-07-07 Fireeye, Inc. Detecting delayed activation malware using a primary controller and plural time controllers
US10284575B2 (en) 2015-11-10 2019-05-07 Fireeye, Inc. Launcher for setting analysis environment variations for malware detection
US10447728B1 (en) 2015-12-10 2019-10-15 Fireeye, Inc. Technique for protecting guest processes using a layered virtualization architecture
US10846117B1 (en) 2015-12-10 2020-11-24 Fireeye, Inc. Technique for establishing secure communication between host and guest processes of a virtualization architecture
US10108446B1 (en) 2015-12-11 2018-10-23 Fireeye, Inc. Late load technique for deploying a virtualization layer underneath a running operating system
US10565378B1 (en) 2015-12-30 2020-02-18 Fireeye, Inc. Exploit of privilege detection framework
US10621338B1 (en) 2015-12-30 2020-04-14 Fireeye, Inc. Method to detect forgery and exploits using last branch recording registers
US10050998B1 (en) 2015-12-30 2018-08-14 Fireeye, Inc. Malicious message analysis system
US10133866B1 (en) 2015-12-30 2018-11-20 Fireeye, Inc. System and method for triggering analysis of an object for malware in response to modification of that object
US11552986B1 (en) 2015-12-31 2023-01-10 Fireeye Security Holdings Us Llc Cyber-security framework for application of virtual features
US9824216B1 (en) 2015-12-31 2017-11-21 Fireeye, Inc. Susceptible environment detection system
US10581874B1 (en) 2015-12-31 2020-03-03 Fireeye, Inc. Malware detection system with contextual analysis
US10404733B1 (en) * 2016-02-02 2019-09-03 Symantec Corporation Active push-based remediation for reputation-based security systems
CN107045507B (zh) * 2016-02-05 2020-08-21 北京国双科技有限公司 网页爬取方法及装置
US10785255B1 (en) 2016-03-25 2020-09-22 Fireeye, Inc. Cluster configuration within a scalable malware detection system
US10616266B1 (en) 2016-03-25 2020-04-07 Fireeye, Inc. Distributed malware detection system and submission workflow thereof
US10671721B1 (en) 2016-03-25 2020-06-02 Fireeye, Inc. Timeout management services
US10601863B1 (en) 2016-03-25 2020-03-24 Fireeye, Inc. System and method for managing sensor enrollment
US10893059B1 (en) 2016-03-31 2021-01-12 Fireeye, Inc. Verification and enhancement using detection systems located at the network periphery and endpoint devices
US20220164840A1 (en) 2016-04-01 2022-05-26 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11004125B2 (en) 2016-04-01 2021-05-11 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11244367B2 (en) 2016-04-01 2022-02-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US10860715B2 (en) * 2016-05-26 2020-12-08 Barracuda Networks, Inc. Method and apparatus for proactively identifying and mitigating malware attacks via hosted web assets
US10282700B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10467432B2 (en) 2016-06-10 2019-11-05 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US10503926B2 (en) 2016-06-10 2019-12-10 OneTrust, LLC Consent receipt management systems and related methods
US10318761B2 (en) 2016-06-10 2019-06-11 OneTrust, LLC Data processing systems and methods for auditing data request compliance
US10873606B2 (en) 2016-06-10 2020-12-22 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10909488B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US10606916B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11294939B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11134086B2 (en) 2016-06-10 2021-09-28 OneTrust, LLC Consent conversion optimization systems and related methods
US11354435B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11146566B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11343284B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11157600B2 (en) 2016-06-10 2021-10-26 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US10607028B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US10839102B2 (en) 2016-06-10 2020-11-17 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US10997318B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US11416109B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11188615B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Data processing consent capture systems and related methods
US11438386B2 (en) 2016-06-10 2022-09-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11188862B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Privacy management systems and methods
US11074367B2 (en) 2016-06-10 2021-07-27 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11087260B2 (en) 2016-06-10 2021-08-10 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11475136B2 (en) 2016-06-10 2022-10-18 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11238390B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Privacy management systems and methods
US11636171B2 (en) 2016-06-10 2023-04-25 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11416590B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11336697B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11222309B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10803200B2 (en) * 2016-06-10 2020-10-13 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11144622B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Privacy management systems and methods
US10878127B2 (en) 2016-06-10 2020-12-29 OneTrust, LLC Data subject access request processing systems and related methods
US10510031B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11625502B2 (en) 2016-06-10 2023-04-11 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US10565236B1 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10853501B2 (en) 2016-06-10 2020-12-01 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11562097B2 (en) 2016-06-10 2023-01-24 OneTrust, LLC Data processing systems for central consent repository and related methods
US11023842B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11210420B2 (en) 2016-06-10 2021-12-28 OneTrust, LLC Data subject access request processing systems and related methods
US11675929B2 (en) 2016-06-10 2023-06-13 OneTrust, LLC Data processing consent sharing systems and related methods
US10944725B2 (en) 2016-06-10 2021-03-09 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11301796B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11366909B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11138299B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US10282559B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11222139B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US10846433B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing consent management systems and related methods
US10169609B1 (en) 2016-06-10 2019-01-01 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10796260B2 (en) 2016-06-10 2020-10-06 OneTrust, LLC Privacy management systems and methods
US11461500B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US11416798B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US10949565B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11366786B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing systems for processing data subject access requests
US11403377B2 (en) 2016-06-10 2022-08-02 OneTrust, LLC Privacy management systems and methods
US11277448B2 (en) 2016-06-10 2022-03-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10685140B2 (en) 2016-06-10 2020-06-16 OneTrust, LLC Consent receipt management systems and related methods
US11228620B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11227247B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US10997315B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11222142B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US11392720B2 (en) 2016-06-10 2022-07-19 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US10678945B2 (en) 2016-06-10 2020-06-09 OneTrust, LLC Consent receipt management systems and related methods
US10783256B2 (en) 2016-06-10 2020-09-22 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11586700B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for automatically blocking the use of tracking tools
US10885485B2 (en) 2016-06-10 2021-01-05 OneTrust, LLC Privacy management systems and methods
US10565161B2 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for processing data subject access requests
US11295316B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US10284604B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US11481710B2 (en) 2016-06-10 2022-10-25 OneTrust, LLC Privacy management systems and methods
US11025675B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11138242B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11416589B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11200341B2 (en) 2016-06-10 2021-12-14 OneTrust, LLC Consent receipt management systems and related methods
US10909265B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Application privacy scanning systems and related methods
US11354434B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11727141B2 (en) 2016-06-10 2023-08-15 OneTrust, LLC Data processing systems and methods for synching privacy-related user consent across multiple computing devices
US10592648B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Consent receipt management systems and related methods
US11651104B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Consent receipt management systems and related methods
US10740487B2 (en) 2016-06-10 2020-08-11 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US11651106B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10896394B2 (en) 2016-06-10 2021-01-19 OneTrust, LLC Privacy management systems and methods
US11057356B2 (en) 2016-06-10 2021-07-06 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11038925B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11151233B2 (en) 2016-06-10 2021-10-19 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11418492B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11100444B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US10592692B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Data processing systems for central consent repository and related methods
US11544667B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11328092B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11341447B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Privacy management systems and methods
US10169585B1 (en) 2016-06-22 2019-01-01 Fireeye, Inc. System and methods for advanced malware detection through placement of transition events
US10462173B1 (en) 2016-06-30 2019-10-29 Fireeye, Inc. Malware detection verification and enhancement by coordinating endpoint and malware detection systems
CN106330778B (zh) * 2016-08-22 2020-01-24 深圳广联赛讯有限公司 网络流量控制方法及装置
US10592678B1 (en) 2016-09-09 2020-03-17 Fireeye, Inc. Secure communications between peers using a verified virtual trusted platform module
US10491627B1 (en) 2016-09-29 2019-11-26 Fireeye, Inc. Advanced malware detection using similarity analysis
US10795991B1 (en) 2016-11-08 2020-10-06 Fireeye, Inc. Enterprise search
GB2555801A (en) * 2016-11-09 2018-05-16 F Secure Corp Identifying fraudulent and malicious websites, domain and subdomain names
US10587647B1 (en) 2016-11-22 2020-03-10 Fireeye, Inc. Technique for malware detection capability comparison of network security devices
US10552610B1 (en) 2016-12-22 2020-02-04 Fireeye, Inc. Adaptive virtual machine snapshot update framework for malware behavioral analysis
US10581879B1 (en) 2016-12-22 2020-03-03 Fireeye, Inc. Enhanced malware detection for generated objects
US10523609B1 (en) 2016-12-27 2019-12-31 Fireeye, Inc. Multi-vector malware detection and analysis
US10904286B1 (en) 2017-03-24 2021-01-26 Fireeye, Inc. Detection of phishing attacks using similarity analysis
US10798112B2 (en) 2017-03-30 2020-10-06 Fireeye, Inc. Attribute-controlled malware detection
US10902119B1 (en) 2017-03-30 2021-01-26 Fireeye, Inc. Data extraction system for malware analysis
US10791138B1 (en) 2017-03-30 2020-09-29 Fireeye, Inc. Subscription-based malware detection
US10848397B1 (en) 2017-03-30 2020-11-24 Fireeye, Inc. System and method for enforcing compliance with subscription requirements for cyber-attack detection service
US10334015B2 (en) * 2017-04-28 2019-06-25 Bank Of America Corporation Apparatus and methods for shortening user exposure to malicious websites
US10013577B1 (en) 2017-06-16 2018-07-03 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
US10503904B1 (en) 2017-06-29 2019-12-10 Fireeye, Inc. Ransomware detection and mitigation
US10601848B1 (en) 2017-06-29 2020-03-24 Fireeye, Inc. Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
US10855700B1 (en) 2017-06-29 2020-12-01 Fireeye, Inc. Post-intrusion detection of cyber-attacks during lateral movement within networks
US10893068B1 (en) 2017-06-30 2021-01-12 Fireeye, Inc. Ransomware file modification prevention technique
CN107454083A (zh) * 2017-08-08 2017-12-08 四川长虹电器股份有限公司 反爬虫的方法
US10747872B1 (en) 2017-09-27 2020-08-18 Fireeye, Inc. System and method for preventing malware evasion
US10805346B2 (en) 2017-10-01 2020-10-13 Fireeye, Inc. Phishing attack detection
US11108809B2 (en) 2017-10-27 2021-08-31 Fireeye, Inc. System and method for analyzing binary code for malware classification using artificial neural network techniques
US11240275B1 (en) 2017-12-28 2022-02-01 Fireeye Security Holdings Us Llc Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
US11271955B2 (en) 2017-12-28 2022-03-08 Fireeye Security Holdings Us Llc Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US11005860B1 (en) 2017-12-28 2021-05-11 Fireeye, Inc. Method and system for efficient cybersecurity analysis of endpoint events
US10826931B1 (en) 2018-03-29 2020-11-03 Fireeye, Inc. System and method for predicting and mitigating cybersecurity system misconfigurations
US10956477B1 (en) 2018-03-30 2021-03-23 Fireeye, Inc. System and method for detecting malicious scripts through natural language processing modeling
US11558401B1 (en) 2018-03-30 2023-01-17 Fireeye Security Holdings Us Llc Multi-vector malware detection data sharing system for improved detection
US11003773B1 (en) 2018-03-30 2021-05-11 Fireeye, Inc. System and method for automatically generating malware detection rule recommendations
US11075930B1 (en) 2018-06-27 2021-07-27 Fireeye, Inc. System and method for detecting repetitive cybersecurity attacks constituting an email campaign
US11314859B1 (en) 2018-06-27 2022-04-26 FireEye Security Holdings, Inc. Cyber-security system and method for detecting escalation of privileges within an access token
US11201875B2 (en) * 2018-06-28 2021-12-14 Webroot, Inc. Web threat investigation using advanced web crawling
US11228491B1 (en) 2018-06-28 2022-01-18 Fireeye Security Holdings Us Llc System and method for distributed cluster configuration monitoring and management
US11316900B1 (en) 2018-06-29 2022-04-26 FireEye Security Holdings Inc. System and method for automatically prioritizing rules for cyber-threat detection and mitigation
US10803202B2 (en) 2018-09-07 2020-10-13 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US11544409B2 (en) 2018-09-07 2023-01-03 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11144675B2 (en) 2018-09-07 2021-10-12 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11182473B1 (en) 2018-09-13 2021-11-23 Fireeye Security Holdings Us Llc System and method for mitigating cyberattacks against processor operability by a guest process
CN109670093A (zh) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 爬虫识别方法、装置、设备及可读存储介质
US11763004B1 (en) 2018-09-27 2023-09-19 Fireeye Security Holdings Us Llc System and method for bootkit detection
US11176251B1 (en) 2018-12-21 2021-11-16 Fireeye, Inc. Determining malware via symbolic function hash analysis
US11743290B2 (en) 2018-12-21 2023-08-29 Fireeye Security Holdings Us Llc System and method for detecting cyberattacks impersonating legitimate sources
US11368475B1 (en) 2018-12-21 2022-06-21 Fireeye Security Holdings Us Llc System and method for scanning remote services to locate stored objects with malware
US11601444B1 (en) 2018-12-31 2023-03-07 Fireeye Security Holdings Us Llc Automated system for triage of customer issues
US11310238B1 (en) 2019-03-26 2022-04-19 FireEye Security Holdings, Inc. System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources
US11677786B1 (en) 2019-03-29 2023-06-13 Fireeye Security Holdings Us Llc System and method for detecting and protecting against cybersecurity attacks on servers
US11636198B1 (en) 2019-03-30 2023-04-25 Fireeye Security Holdings Us Llc System and method for cybersecurity analyzer update and concurrent management system
US11258806B1 (en) 2019-06-24 2022-02-22 Mandiant, Inc. System and method for automatically associating cybersecurity intelligence to cyberthreat actors
US11556640B1 (en) 2019-06-27 2023-01-17 Mandiant, Inc. Systems and methods for automated cybersecurity analysis of extracted binary string sets
US11392700B1 (en) 2019-06-28 2022-07-19 Fireeye Security Holdings Us Llc System and method for supporting cross-platform data verification
CN110519280B (zh) * 2019-08-30 2022-01-04 北京思维造物信息科技股份有限公司 一种爬虫识别方法、装置、计算机设备及存储介质
US11886585B1 (en) 2019-09-27 2024-01-30 Musarubra Us Llc System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
US11637862B1 (en) 2019-09-30 2023-04-25 Mandiant, Inc. System and method for surfacing cyber-security threats with a self-learning recommendation engine
US11838300B1 (en) 2019-12-24 2023-12-05 Musarubra Us Llc Run-time configurable cybersecurity system
US11522884B1 (en) 2019-12-24 2022-12-06 Fireeye Security Holdings Us Llc Subscription and key management system
US11436327B1 (en) 2019-12-24 2022-09-06 Fireeye Security Holdings Us Llc System and method for circumventing evasive code for cyberthreat detection
WO2022011142A1 (en) 2020-07-08 2022-01-13 OneTrust, LLC Systems and methods for targeted data discovery
US11444976B2 (en) 2020-07-28 2022-09-13 OneTrust, LLC Systems and methods for automatically blocking the use of tracking tools
WO2022032072A1 (en) 2020-08-06 2022-02-10 OneTrust, LLC Data processing systems and methods for automatically redacting unstructured data from a data subject access request
WO2022060860A1 (en) 2020-09-15 2022-03-24 OneTrust, LLC Data processing systems and methods for detecting tools for the automatic blocking of consent requests
US20230334158A1 (en) 2020-09-21 2023-10-19 OneTrust, LLC Data processing systems and methods for automatically detecting target data transfers and target data processing
WO2022099023A1 (en) 2020-11-06 2022-05-12 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
CN114650158A (zh) * 2020-12-21 2022-06-21 深信服科技股份有限公司 一种http检测方法、系统、设备及计算机存储介质
US11687528B2 (en) 2021-01-25 2023-06-27 OneTrust, LLC Systems and methods for discovery, classification, and indexing of data in a native computing system
US11442906B2 (en) 2021-02-04 2022-09-13 OneTrust, LLC Managing custom attributes for domain objects defined within microservices
WO2022170254A1 (en) 2021-02-08 2022-08-11 OneTrust, LLC Data processing systems and methods for anonymizing data samples in classification analysis
WO2022173912A1 (en) 2021-02-10 2022-08-18 OneTrust, LLC Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system
US11775348B2 (en) 2021-02-17 2023-10-03 OneTrust, LLC Managing custom workflows for domain objects defined within microservices
WO2022178219A1 (en) 2021-02-18 2022-08-25 OneTrust, LLC Selective redaction of media content
EP4305539A1 (en) 2021-03-08 2024-01-17 OneTrust, LLC Data transfer discovery and analysis systems and related methods
US11562078B2 (en) 2021-04-16 2023-01-24 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US11620142B1 (en) 2022-06-03 2023-04-04 OneTrust, LLC Generating and customizing user interfaces for demonstrating functions of interactive user environments
US11706226B1 (en) * 2022-06-21 2023-07-18 Uab 360 It Systems and methods for controlling access to domains using artificial intelligence

Family Cites Families (375)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4423414A (en) 1981-08-27 1983-12-27 Burroughs Corporation System and method for name-lookup in a local area network data communication system
JPS6170654A (ja) 1984-09-14 1986-04-11 Hitachi Ltd 分散処理システムにおける資源管理方式
US4734036A (en) * 1984-11-30 1988-03-29 Helene Kasha Method and device for learning a language
JPH04127370A (ja) 1990-09-19 1992-04-28 Toshiba Corp 情報収集システム
US5758152A (en) * 1990-12-06 1998-05-26 Prime Arithmetics, Inc. Method and apparatus for the generation and manipulation of data structures
WO1992019054A1 (en) 1991-04-12 1992-10-29 Concord Communications, Inc. Network monitoring
US5408642A (en) * 1991-05-24 1995-04-18 Symantec Corporation Method for recovery of a computer program infected by a computer virus
JPH04372037A (ja) 1991-06-21 1992-12-25 Matsushita Electric Ind Co Ltd システム管理情報設定装置
US5699287A (en) * 1992-09-30 1997-12-16 Texas Instruments Incorporated Method and device for adding and subtracting thermometer coded data
US5581703A (en) 1993-06-29 1996-12-03 International Business Machines Corporation Method and apparatus for reserving system resources to assure quality of service
US5555376A (en) 1993-12-03 1996-09-10 Xerox Corporation Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request
US5493692A (en) * 1993-12-03 1996-02-20 Xerox Corporation Selective delivery of electronic messages in a multiple computer system based on context and environment of a user
US5835726A (en) 1993-12-15 1998-11-10 Check Point Software Technologies Ltd. System for securing the flow of and selectively modifying packets in a computer network
US5606668A (en) * 1993-12-15 1997-02-25 Checkpoint Software Technologies Ltd. System for securing inbound and outbound data packet flow in a computer network
US6769009B1 (en) 1994-05-31 2004-07-27 Richard R. Reisman Method and system for selecting a personalized set of information channels
US5720033A (en) * 1994-06-30 1998-02-17 Lucent Technologies Inc. Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems
AU3099295A (en) 1994-08-09 1996-03-07 Shiva Corporation Apparatus and method for restricting access to a local computer network
US5682325A (en) 1994-09-12 1997-10-28 Bell Atlantic Network Services, Inc. Level 1 gateway for video tone networks
US5944794A (en) 1994-09-30 1999-08-31 Kabushiki Kaisha Toshiba User identification data management scheme for networking computer systems using wide area network
US5864683A (en) * 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5541911A (en) 1994-10-12 1996-07-30 3Com Corporation Remote smart filtering communication management system
US5758257A (en) * 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US5832503A (en) 1995-02-24 1998-11-03 Cabletron Systems, Inc. Method and apparatus for configuration management in communications networks
US5696486A (en) 1995-03-29 1997-12-09 Cabletron Systems, Inc. Method and apparatus for policy-based alarm notification in a distributed network management environment
US5699513A (en) 1995-03-31 1997-12-16 Motorola, Inc. Method for secure network access via message intercept
US5586121A (en) 1995-04-21 1996-12-17 Hybrid Networks, Inc. Asymmetric hybrid access system and method
AU706649B2 (en) * 1995-05-08 1999-06-17 Cranberry Properties, Llc Rules based electronic message management system
US5802278A (en) 1995-05-10 1998-09-01 3Com Corporation Bridge/router architecture for high performance scalable networking
US5696898A (en) 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
CA2176775C (en) 1995-06-06 1999-08-03 Brenda Sue Baker System and method for database access administration
US5678041A (en) 1995-06-06 1997-10-14 At&T System and method for restricting user access rights on the internet based on rating information stored in a relational database
US5774668A (en) 1995-06-07 1998-06-30 Microsoft Corporation System for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing
ATE279065T1 (de) 1995-06-07 2004-10-15 Divine Technology Ventures Zugangskontrolle und überwachungssystem für internetserver
US6456306B1 (en) 1995-06-08 2002-09-24 Nortel Networks Limited Method and apparatus for displaying health status of network devices
US6807558B1 (en) 1995-06-12 2004-10-19 Pointcast, Inc. Utilization of information “push” technology
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server
US5648965A (en) 1995-07-07 1997-07-15 Sun Microsystems, Inc. Method and apparatus for dynamic distributed packet tracing and analysis
US5796944A (en) 1995-07-12 1998-08-18 3Com Corporation Apparatus and method for processing data frames in an internetworking device
US5941947A (en) 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5742759A (en) * 1995-08-18 1998-04-21 Sun Microsystems, Inc. Method and system for facilitating access control to system resources in a distributed computer system
US5712979A (en) * 1995-09-20 1998-01-27 Infonautics Corporation Method and apparatus for attaching navigational history information to universal resource locator links on a world wide web page
US6338088B1 (en) * 1995-11-02 2002-01-08 British Telecommunications Public Limited Company Service creation apparatus for a communications network
US5781801A (en) 1995-12-20 1998-07-14 Emc Corporation Method and apparatus for receive buffer management in multi-sender communication systems
DE69610905T2 (de) 1995-12-28 2001-06-21 Inc Indefense Verfahren zum schutz von ausführbaren softwareprogrammen gegen infektion durch softwareviren
US5787427A (en) 1996-01-03 1998-07-28 International Business Machines Corporation Information handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies
US5768519A (en) 1996-01-18 1998-06-16 Microsoft Corporation Method and apparatus for merging user accounts from a source security domain into a target security domain
US5826014A (en) 1996-02-06 1998-10-20 Network Engineering Software Firewall system for protecting network elements connected to a public network
US5898830A (en) * 1996-10-17 1999-04-27 Network Engineering Software Firewall providing enhanced network security and user transparency
US5855020A (en) 1996-02-21 1998-12-29 Infoseek Corporation Web scan process
US5832212A (en) 1996-04-19 1998-11-03 International Business Machines Corporation Censoring browser method and apparatus for internet viewing
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
US5787253A (en) 1996-05-28 1998-07-28 The Ag Group Apparatus and method of analyzing internet activity
US5920859A (en) 1997-02-05 1999-07-06 Idd Enterprises, L.P. Hypertext document retrieval system and method
US5842040A (en) 1996-06-18 1998-11-24 Storage Technology Corporation Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data units
US5850523A (en) 1996-06-21 1998-12-15 National Instruments Corporation Method and system for monitoring fieldbus network with multiple packet filters
US5991807A (en) 1996-06-24 1999-11-23 Nortel Networks Corporation System for controlling users access to a distributive network in accordance with constraints present in common access distributive network interface separate from a server
US5835722A (en) * 1996-06-27 1998-11-10 Logon Data Corporation System to control content and prohibit certain interactive attempts by a person using a personal computer
US5799002A (en) 1996-07-02 1998-08-25 Microsoft Corporation Adaptive bandwidth throttling for network services
US6052723A (en) * 1996-07-25 2000-04-18 Stockmaster.Com, Inc. Method for aggregate control on an electronic network
US5832228A (en) 1996-07-30 1998-11-03 Itt Industries, Inc. System and method for providing multi-level security in computer devices utilized with non-secure networks
EP0822502A1 (en) * 1996-07-31 1998-02-04 BRITISH TELECOMMUNICATIONS public limited company Data access system
US5828833A (en) 1996-08-15 1998-10-27 Electronic Data Systems Corporation Method and system for allowing remote procedure calls through a network firewall
US5950195A (en) 1996-09-18 1999-09-07 Secure Computing Corporation Generalized security policy management system and method
US6253188B1 (en) 1996-09-20 2001-06-26 Thomson Newspapers, Inc. Automated interactive classified ad system for the internet
US5933827A (en) 1996-09-25 1999-08-03 International Business Machines Corporation System for identifying new web pages of interest to a user
US5911043A (en) 1996-10-01 1999-06-08 Baker & Botts, L.L.P. System and method for computer-based rating of information retrieved from a computer network
US5884325A (en) * 1996-10-09 1999-03-16 Oracle Corporation System for synchronizing shared data between computers
US5958015A (en) 1996-10-29 1999-09-28 Abirnet Ltd. Network session wall passively listening to communication session, with use of access rules, stops further communication between network devices by emulating messages to the devices
US6167520A (en) 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US7058822B2 (en) 2000-03-30 2006-06-06 Finjan Software, Ltd. Malicious mobile code runtime monitoring system and methods
US5801747A (en) 1996-11-15 1998-09-01 Hyundai Electronics America Method and apparatus for creating a television viewer profile
US5848412A (en) 1996-11-19 1998-12-08 Ncr Corporation User controlled browser identification disclosing mechanism
US6070242A (en) * 1996-12-09 2000-05-30 Sun Microsystems, Inc. Method to activate unregistered systems in a distributed multiserver network environment
US5848233A (en) 1996-12-09 1998-12-08 Sun Microsystems, Inc. Method and apparatus for dynamic packet filter assignment
US6078914A (en) 1996-12-09 2000-06-20 Open Text Corporation Natural language meta-search system and method
US5896502A (en) * 1996-12-10 1999-04-20 International Business Machines Corporation Internet data transfer control via a client system to reduce delay
US6065059A (en) * 1996-12-10 2000-05-16 International Business Machines Corporation Filtered utilization of internet data transfers to reduce delay and increase user control
US5889958A (en) 1996-12-20 1999-03-30 Livingston Enterprises, Inc. Network access control system and process
US5892905A (en) * 1996-12-23 1999-04-06 International Business Machines Corporation Computer apparatus and method for providing a common user interface for software applications accessed via the world-wide web
US6832256B1 (en) 1996-12-27 2004-12-14 Intel Corporation Firewalls that filter based upon protocol commands
US5987611A (en) 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6052730A (en) * 1997-01-10 2000-04-18 The Board Of Trustees Of The Leland Stanford Junior University Method for monitoring and/or modifying web browsing sessions
US6173364B1 (en) * 1997-01-15 2001-01-09 At&T Corp. Session cache and rule caching method for a dynamic filter
US6233686B1 (en) * 1997-01-17 2001-05-15 At & T Corp. System and method for providing peer level access control on a network
US6078913A (en) 1997-02-12 2000-06-20 Kokusai Denshin Denwa Co., Ltd. Document retrieval apparatus
AUPO525497A0 (en) 1997-02-21 1997-03-20 Mills, Dudley John Network-based classified information systems
JP3466039B2 (ja) 1997-02-26 2003-11-10 株式会社東芝 通信装置および通信方法
US6076051A (en) 1997-03-07 2000-06-13 Microsoft Corporation Information retrieval utilizing semantic representation of text
US6178505B1 (en) * 1997-03-10 2001-01-23 Internet Dynamics, Inc. Secure delivery of information in a network
US6105027A (en) 1997-03-10 2000-08-15 Internet Dynamics, Inc. Techniques for eliminating redundant access checking by access filters
US5983270A (en) 1997-03-11 1999-11-09 Sequel Technology Corporation Method and apparatus for managing internetwork and intranetwork activity
US5987606A (en) 1997-03-19 1999-11-16 Bascom Global Internet Services, Inc. Method and system for content filtering information retrieved from an internet computer network
US5996011A (en) 1997-03-25 1999-11-30 Unified Research Laboratories, Inc. System and method for filtering data received by a computer system
US6539430B1 (en) 1997-03-25 2003-03-25 Symantec Corporation System and method for filtering data received by a computer system
US5937404A (en) 1997-04-23 1999-08-10 Appaloosa Interactive Corporation Apparatus for bleaching a de-activated link in a web page of any distinguishing color or feature representing an active link
US5961591A (en) 1997-05-13 1999-10-05 Microsoft Corporation Downloading data while rejection of its use may be overridden
US5968176A (en) 1997-05-29 1999-10-19 3Com Corporation Multilayer firewall system
US5899995A (en) * 1997-06-30 1999-05-04 Intel Corporation Method and apparatus for automatically organizing information
US5956734A (en) 1997-07-11 1999-09-21 International Business Machines Corporation Parallel file system with a quota check utility
US5893086A (en) 1997-07-11 1999-04-06 International Business Machines Corporation Parallel file system and method with extensible hashing
US7117358B2 (en) 1997-07-24 2006-10-03 Tumbleweed Communications Corp. Method and system for filtering communication
US6356864B1 (en) 1997-07-25 2002-03-12 University Technology Corporation Methods for analysis and evaluation of the semantic content of a writing based on vector length
US6446119B1 (en) 1997-08-07 2002-09-03 Laslo Olah System and method for monitoring computer usage
US6275938B1 (en) * 1997-08-28 2001-08-14 Microsoft Corporation Security enhancement for untrusted executable code
JP2001515246A (ja) * 1997-09-02 2001-09-18 トーレス、デイモン、シー. 自動化コンテンツのスケジューリング装置と表示装置
US5999929A (en) 1997-09-29 1999-12-07 Continuum Software, Inc World wide web link referral system and method for generating and providing related links for links identified in web pages
US5978807A (en) 1997-09-30 1999-11-02 Sony Corporation Apparatus for and method of automatically downloading and storing internet web pages
US6266664B1 (en) 1997-10-01 2001-07-24 Rulespace, Inc. Method for scanning, analyzing and rating digital information content
US6256739B1 (en) 1997-10-30 2001-07-03 Juno Online Services, Inc. Method and apparatus to determine user identity and limit access to a communications network
US6108799A (en) * 1997-11-21 2000-08-22 International Business Machines Corporation Automated sample creation of polymorphic and non-polymorphic marcro viruses
US5987457A (en) 1997-11-25 1999-11-16 Acceleration Software International Corporation Query refinement method for searching documents
JPH11219363A (ja) 1998-01-30 1999-08-10 Toshiba Corp データベースの検索支援システム
US5987610A (en) * 1998-02-12 1999-11-16 Ameritech Corporation Computer virus screening methods and systems
US6357010B1 (en) * 1998-02-17 2002-03-12 Secure Computing Corporation System and method for controlling access to documents stored on an internal network
US6073135A (en) 1998-03-10 2000-06-06 Alta Vista Company Connectivity server for locating linkage information between Web pages
US6055564A (en) * 1998-03-11 2000-04-25 Hewlett Packard Company Admission control where priority indicator is used to discriminate between messages
US7302402B2 (en) * 1998-03-30 2007-11-27 International Business Machines Corporation Method, system and program products for sharing state information across domains
US6233618B1 (en) * 1998-03-31 2001-05-15 Content Advisor, Inc. Access control of networked data
US6065055A (en) 1998-04-20 2000-05-16 Hughes; Patrick Alan Inappropriate site management software
US6219667B1 (en) * 1998-05-28 2001-04-17 International Business Machines Corporation Efficient large-scale access control for internet/intranet information systems
JP3665480B2 (ja) 1998-06-24 2005-06-29 富士通株式会社 文書整理装置および方法
US6742003B2 (en) * 2001-04-30 2004-05-25 Microsoft Corporation Apparatus and accompanying methods for visualizing clusters of data and hierarchical cluster classifications
US6377577B1 (en) * 1998-06-30 2002-04-23 Cisco Technology, Inc. Access control list processing in hardware
US6085241A (en) 1998-07-22 2000-07-04 Amplify. Net, Inc. Internet user-bandwidth management and control tool
US6446061B1 (en) 1998-07-31 2002-09-03 International Business Machines Corporation Taxonomy generation for document collections
US6266668B1 (en) 1998-08-04 2001-07-24 Dryken Technologies, Inc. System and method for dynamic data-mining and on-line communication of customized information
US6907425B1 (en) 1998-10-01 2005-06-14 At&T Corp. System and method for searching information stored on a network
US6567800B1 (en) * 1998-10-01 2003-05-20 At&T Corp. System and method for searching information stored on a network
US6460141B1 (en) 1998-10-28 2002-10-01 Rsa Security Inc. Security and access management system for web-enabled and non-web-enabled applications and content on a computer network
US7603685B2 (en) 1998-11-03 2009-10-13 United Video Properties, Inc. Program guide system with combination category search
WO2000033160A2 (en) * 1998-12-03 2000-06-08 Expanse Networks, Inc. Subscriber characterization and advertisement monitoring system
US7194554B1 (en) 1998-12-08 2007-03-20 Nomadix, Inc. Systems and methods for providing dynamic network authorization authentication and accounting
US6564327B1 (en) 1998-12-23 2003-05-13 Worldcom, Inc. Method of and system for controlling internet access
US6295529B1 (en) 1998-12-24 2001-09-25 Microsoft Corporation Method and apparatus for indentifying clauses having predetermined characteristics indicative of usefulness in determining relationships between different texts
US6654787B1 (en) 1998-12-31 2003-11-25 Brightmail, Incorporated Method and apparatus for filtering e-mail
US6654735B1 (en) 1999-01-08 2003-11-25 International Business Machines Corporation Outbound information analysis for generating user interest profiles and improving user productivity
US6418433B1 (en) 1999-01-28 2002-07-09 International Business Machines Corporation System and method for focussed web crawling
US6154741A (en) 1999-01-29 2000-11-28 Feldman; Daniel J. Entitlement management and access control system
JP3220104B2 (ja) 1999-02-16 2001-10-22 ケイディーディーアイ株式会社 Url階層構造を利用した情報自動フィルタリング方法および装置
US6286001B1 (en) 1999-02-24 2001-09-04 Doodlebug Online, Inc. System and method for authorizing access to data on content servers in a distributed network
US6366298B1 (en) 1999-06-03 2002-04-02 Netzero, Inc. Monitoring of individual internet usage
US6904609B1 (en) 1999-03-18 2005-06-07 Microsoft Corporation Systems and methods for electronic program guide data services
US20010044800A1 (en) 2000-02-22 2001-11-22 Sherwin Han Internet organizer
US6486892B1 (en) * 1999-04-07 2002-11-26 Joseph L. Stern System and method for accessing, manipulating and viewing internet and non-internet related information and for controlling networked devices
US6175830B1 (en) 1999-05-20 2001-01-16 Evresearch, Ltd. Information management, retrieval and display system and associated method
US6519571B1 (en) * 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
US6493744B1 (en) 1999-08-16 2002-12-10 International Business Machines Corporation Automatic rating and filtering of data files for objectionable content
US6295559B1 (en) 1999-08-26 2001-09-25 International Business Machines Corporation Rating hypermedia for objectionable content
US6862713B1 (en) 1999-08-31 2005-03-01 International Business Machines Corporation Interactive process for recognition and evaluation of a partial search query and display of interactive results
US6675169B1 (en) 1999-09-07 2004-01-06 Microsoft Corporation Method and system for attaching information to words of a trie
US6745367B1 (en) 1999-09-27 2004-06-01 International Business Machines Corporation Method and computer program product for implementing parental supervision for internet browsing
US6839680B1 (en) * 1999-09-30 2005-01-04 Fujitsu Limited Internet profiling
US6792458B1 (en) * 1999-10-04 2004-09-14 Urchin Software Corporation System and method for monitoring and analyzing internet traffic
US6516337B1 (en) 1999-10-14 2003-02-04 Arcessa, Inc. Sending to a central indexing site meta data or signatures from objects on a computer network
US6434662B1 (en) 1999-11-02 2002-08-13 Juniper Networks, Inc. System and method for searching an associative memory utilizing first and second hash functions
WO2001033371A1 (en) 1999-11-05 2001-05-10 Surfmonkey.Com, Inc. System and method of filtering adult content on the internet
US6954783B1 (en) 1999-11-12 2005-10-11 Bmc Software, Inc. System and method of mediating a web page
JP4279427B2 (ja) 1999-11-22 2009-06-17 富士通株式会社 通信支援方法及びシステム
US20020049883A1 (en) * 1999-11-29 2002-04-25 Eric Schneider System and method for restoring a computer system after a failure
US20020069368A1 (en) 1999-12-07 2002-06-06 Keith Hines Data farming of network access
US6832230B1 (en) 1999-12-22 2004-12-14 Nokia Corporation Apparatus and associated method for downloading an application with a variable lifetime to a mobile terminal
US6574660B1 (en) 1999-12-28 2003-06-03 Intel Corporation Intelligent content delivery system based on user actions with client application data
US6606659B1 (en) 2000-01-28 2003-08-12 Websense, Inc. System and method for controlling access to internet sites
AU771963B2 (en) 2000-01-28 2004-04-08 Websense, Inc. System and method for controlling access to internet sites
WO2001055905A1 (en) 2000-01-28 2001-08-02 Websense, Inc. Automated categorization of internet data
US7185361B1 (en) * 2000-01-31 2007-02-27 Secure Computing Corporation System, method and computer program product for authenticating users using a lightweight directory access protocol (LDAP) directory server
EP1122929A1 (en) * 2000-02-07 2001-08-08 TELEFONAKTIEBOLAGET LM ERICSSON (publ) Push of information from a server to a client
US20010044818A1 (en) 2000-02-21 2001-11-22 Yufeng Liang System and method for identifying and blocking pornogarphic and other web content on the internet
GB2377308B (en) * 2000-03-03 2004-03-17 Dun And Bradstreet Inc Facilitating a transaction in electronic commerce
US7565403B2 (en) 2000-03-16 2009-07-21 Microsoft Corporation Use of a bulk-email filter within a system for classifying messages for urgency or importance
GB0006721D0 (en) 2000-03-20 2000-05-10 Mitchell Thomas A Assessment methods and systems
US20010032258A1 (en) 2000-03-31 2001-10-18 Kabushiki Kaisha Free Bit.Com System for internet connections, system for providing internet user information, method for providing internet user preference information, and method for distributing digital contents using the internet
US7418440B2 (en) 2000-04-13 2008-08-26 Ql2 Software, Inc. Method and system for extraction and organizing selected data from sources on a network
US6772214B1 (en) 2000-04-27 2004-08-03 Novell, Inc. System and method for filtering of web-based content stored on a proxy cache server
US20030158923A1 (en) 2000-05-04 2003-08-21 Reed Burkhart System and method for automated negotiation for and allocation of a broadcast satellite, communication and caching system resource
US7274667B2 (en) 2000-05-19 2007-09-25 Scientific-Atlanta, Inc. Monitoring and allocating access across a shared communications medium
US20040034794A1 (en) * 2000-05-28 2004-02-19 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20040073617A1 (en) 2000-06-19 2004-04-15 Milliken Walter Clark Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US6981281B1 (en) 2000-06-21 2005-12-27 Microsoft Corporation Filtering a permission set using permission requests associated with a code assembly
US6618717B1 (en) 2000-07-31 2003-09-09 Eliyon Technologies Corporation Computer method and apparatus for determining content owner of a website
US6785732B1 (en) 2000-09-11 2004-08-31 International Business Machines Corporation Web server apparatus and method for virus checking
US6886099B1 (en) 2000-09-12 2005-04-26 Networks Associates Technology, Inc. Computer virus detection
US6701317B1 (en) 2000-09-19 2004-03-02 Overture Services, Inc. Web page connectivity server construction
US6571249B1 (en) * 2000-09-27 2003-05-27 Siemens Aktiengesellschaft Management of query result complexity in hierarchical query result data structure using balanced space cubes
US20020073089A1 (en) 2000-09-29 2002-06-13 Andrew Schwartz Method and system for creating and managing relational data over the internet
US6650890B1 (en) 2000-09-29 2003-11-18 Postini, Inc. Value-added electronic messaging services and transparent implementation thereof using intermediate server
JP2002175010A (ja) 2000-09-29 2002-06-21 Shinu Ko ホームページ改竄防止システム
US7072951B2 (en) * 2000-10-03 2006-07-04 Sun Microsystems, Inc. HTTP transaction monitor with capacity to replay in debuggings session
CA2323883C (en) 2000-10-19 2016-02-16 Patrick Ryan Morin Method and device for classifying internet objects and objects stored oncomputer-readable media
US20030177187A1 (en) 2000-11-27 2003-09-18 Butterfly.Net. Inc. Computing grid for massively multi-player online games and other multi-user immersive persistent-state and session-based applications
US7209893B2 (en) * 2000-11-30 2007-04-24 Nokia Corporation Method of and a system for distributing electronic content
US6894991B2 (en) * 2000-11-30 2005-05-17 Verizon Laboratories Inc. Integrated method for performing scheduling, routing and access control in a computer network
WO2002050703A1 (en) * 2000-12-15 2002-06-27 The Johns Hopkins University Dynamic-content web crawling through traffic monitoring
US6928051B2 (en) 2000-12-18 2005-08-09 Intel Corporation Application based bandwidth limiting proxies
US20030028564A1 (en) 2000-12-19 2003-02-06 Lingomotors, Inc. Natural language method and system for matching and ranking documents in terms of semantic relatedness
US7096493B1 (en) 2000-12-21 2006-08-22 Gary G. Liu Internet file safety information center
JP4329264B2 (ja) 2000-12-27 2009-09-09 セイコーエプソン株式会社 アクセス権限レベル制御装置及び方法
US6782388B2 (en) 2000-12-29 2004-08-24 Bellsouth Intellectual Property Corporation Error usage investigation and disposal system
US20020138621A1 (en) * 2001-02-08 2002-09-26 Rutherford Jan R. System and method for displaying remotely stored content on a web page
US7213069B2 (en) * 2001-02-28 2007-05-01 Microsoft Corporation Category name service able to override the category name based on requestor privilege information
US7681032B2 (en) 2001-03-12 2010-03-16 Portauthority Technologies Inc. System and method for monitoring unauthorized transport of digital content
US7363657B2 (en) 2001-03-12 2008-04-22 Emc Corporation Using a virus checker in one file server to check for viruses in another file server
US7058663B2 (en) 2001-03-13 2006-06-06 Koninklijke Philips Electronics, N.V. Automatic data update
US7219298B2 (en) * 2001-03-15 2007-05-15 International Business Machines Corporation Method, system, and program for verifying network addresses included in a file
JPWO2002080448A1 (ja) 2001-03-29 2004-07-22 ソニー株式会社 情報処理装置
US7114184B2 (en) 2001-03-30 2006-09-26 Computer Associates Think, Inc. System and method for restoring computer systems damaged by a malicious computer program
US6947935B1 (en) 2001-04-04 2005-09-20 Microsoft Corporation Training, inference and user interface for guiding the caching of media content on local stores
US20020152284A1 (en) 2001-04-13 2002-10-17 John Cambray System and method for performing real time monitoring and control of an interactive network
US7895445B1 (en) 2001-04-26 2011-02-22 Nokia Corporation Token-based remote data access
US7228565B2 (en) 2001-05-15 2007-06-05 Mcafee, Inc. Event reporting between a reporting computer and a receiving computer
US20030182420A1 (en) 2001-05-21 2003-09-25 Kent Jones Method, system and apparatus for monitoring and controlling internet site content access
US6898737B2 (en) * 2001-05-24 2005-05-24 Microsoft Corporation Automatic classification of event data
US7188368B2 (en) 2001-05-25 2007-03-06 Lenovo (Singapore) Pte. Ltd. Method and apparatus for repairing damage to a computer system using a system rollback mechanism
JP4598308B2 (ja) 2001-05-31 2010-12-15 トレンドマイクロ株式会社 データ通信システム及びデータ通信方法
US7289980B2 (en) 2001-06-12 2007-10-30 International Business Machines Corporation Method and system for managing preferred web site links
US6741997B1 (en) * 2001-06-14 2004-05-25 Oracle International Corporation Instantiating objects in distributed database systems
EP1410258A4 (en) 2001-06-22 2007-07-11 Inc Nervana SYSTEM AND METHOD FOR RECALLING, MANAGING, DELIVERING AND PRESENTING KNOWLEDGE
US6934745B2 (en) * 2001-06-28 2005-08-23 Packeteer, Inc. Methods, apparatuses and systems enabling a network services provider to deliver application performance management services
US20030009495A1 (en) * 2001-06-29 2003-01-09 Akli Adjaoute Systems and methods for filtering electronic content
US7225430B2 (en) * 2001-07-26 2007-05-29 Landesk Software Limited Software code management method and apparatus
US7310817B2 (en) 2001-07-26 2007-12-18 Mcafee, Inc. Centrally managed malware scanning
AU2002321795A1 (en) * 2001-07-27 2003-02-17 Quigo Technologies Inc. System and method for automated tracking and analysis of document usage
US7243369B2 (en) * 2001-08-06 2007-07-10 Sun Microsystems, Inc. Uniform resource locator access management and control system and method
JP3653242B2 (ja) 2001-08-06 2005-05-25 デジタルア−ツ株式会社 インターネットへのアクセスを管理する方法、そのシステム及びそのコンピュータ・プログラム
US20060036874A1 (en) 2001-08-08 2006-02-16 Igt Data pattern verification in a gaming machine environment
ITMI20011757A1 (it) * 2001-08-09 2003-02-09 Nuovo Pignone Spa Mezzi di collegamwnto tra asta e testa a croce in un compressore alternativo
US7370365B2 (en) * 2001-09-05 2008-05-06 International Business Machines Corporation Dynamic control of authorization to access internet services
US20040019656A1 (en) * 2001-10-04 2004-01-29 Smith Jeffrey C. System and method for monitoring global network activity
US7526654B2 (en) * 2001-10-16 2009-04-28 Marc Charbonneau Method and system for detecting a secure state of a computer system
US20030120543A1 (en) * 2001-11-06 2003-06-26 Carey Matthew S. System, method, and product for use in supplying information via the internet
US7680892B2 (en) * 2001-11-06 2010-03-16 Ihance, Inc. Method and system for monitoring email and website behavior of an email recipient
US6947985B2 (en) 2001-12-05 2005-09-20 Websense, Inc. Filtering techniques for managing access to internet sites or other software applications
US7194464B2 (en) 2001-12-07 2007-03-20 Websense, Inc. System and method for adapting an internet filter
US20030110272A1 (en) 2001-12-11 2003-06-12 Du Castel Bertrand System and method for filtering content
US7096500B2 (en) 2001-12-21 2006-08-22 Mcafee, Inc. Predictive malware scanning of internet data
US6944772B2 (en) 2001-12-26 2005-09-13 D'mitri Dozortsev System and method of enforcing executable code identity verification over the network
US20030126139A1 (en) 2001-12-28 2003-07-03 Lee Timothy A. System and method for loading commercial web sites
US20030135611A1 (en) 2002-01-14 2003-07-17 Dean Kemp Self-monitoring service system with improved user administration and user access control
US6792510B1 (en) 2002-02-14 2004-09-14 Novell, Inc. System and method for updating a cache
JPWO2003069470A1 (ja) 2002-02-15 2005-06-09 株式会社イマージュ アプリケーション作成システム、作成装置、および作成方法、並びにアプリケーション提供システム、提供装置、および提供方法、並びにアプリケーション運用システム、運用装置、および運用方法
US7089246B1 (en) 2002-02-28 2006-08-08 America Online, Inc. Overriding content ratings and restricting access to requested resources
US7903549B2 (en) 2002-03-08 2011-03-08 Secure Computing Corporation Content-based policy compliance systems and methods
US7870203B2 (en) 2002-03-08 2011-01-11 Mcafee, Inc. Methods and systems for exposing messaging reputation to an end user
US7512649B2 (en) 2002-03-22 2009-03-31 Sun Microsytems, Inc. Distributed identities
JP2004013258A (ja) 2002-06-04 2004-01-15 Matsushita Electric Ind Co Ltd 情報フィルタリングシステム
US6993713B2 (en) 2002-06-06 2006-01-31 International Business Machines Corporation Web content management software utilizing a workspace aware JSP servlet
AU2003238908A1 (en) 2002-06-06 2003-12-22 Green Border Technologies Method and system for implementing a secure application execution environment using derived user accounts for internet content
CA2432588C (en) * 2002-06-12 2007-12-18 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for fast change of internet protocol headers compression mechanism
US20040006621A1 (en) * 2002-06-27 2004-01-08 Bellinson Craig Adam Content filtering for web browsing
US7631318B2 (en) * 2002-06-28 2009-12-08 Microsoft Corporation Secure server plug-in architecture for digital rights management systems
US7568002B1 (en) 2002-07-03 2009-07-28 Sprint Spectrum L.P. Method and system for embellishing web content during transmission between a content server and a client station
US7203706B2 (en) 2002-08-01 2007-04-10 Oracle International Corporation Buffered message queue architecture for database management systems with memory optimizations and “zero copy” buffered message queue
US7159119B2 (en) 2002-09-06 2007-01-02 United States Postal Service Method and system for efficiently retrieving secured data by securely pre-processing provided access information
US20040049514A1 (en) * 2002-09-11 2004-03-11 Sergei Burkov System and method of searching data utilizing automatic categorization
FI113499B (fi) 2002-09-12 2004-04-30 Jarmo Talvitie Turvajärjestelmä, menetelmä ja laite tietokonevirusten torjumiseksi sekä tiedon eristämiseksi
JP4038717B2 (ja) 2002-09-13 2008-01-30 富士ゼロックス株式会社 テキスト文比較装置
US7203691B2 (en) * 2002-09-27 2007-04-10 Ncr Corp. System and method for retrieving information from a database
US20040068479A1 (en) * 2002-10-04 2004-04-08 International Business Machines Corporation Exploiting asynchronous access to database operations
US7437760B2 (en) 2002-10-10 2008-10-14 International Business Machines Corporation Antiviral network system
JP4217455B2 (ja) * 2002-10-15 2009-02-04 キヤノン株式会社 周辺装置、情報処理方法、および制御プログラム
US6850943B2 (en) * 2002-10-18 2005-02-01 Check Point Software Technologies, Inc. Security system and methodology for providing indirect access control
US7194531B2 (en) * 2002-12-02 2007-03-20 International Business Machines Corporation System and method for determining the availability of a web page
US7600234B2 (en) 2002-12-10 2009-10-06 Fisher-Rosemount Systems, Inc. Method for launching applications
WO2004055632A2 (en) 2002-12-13 2004-07-01 Wholesecurity, Inc. Method, system, and computer program product for security within a global computer network
US7533148B2 (en) 2003-01-09 2009-05-12 Microsoft Corporation Framework to enable integration of anti-spam technologies
US7171450B2 (en) 2003-01-09 2007-01-30 Microsoft Corporation Framework to enable integration of anti-spam technologies
FI20030104A0 (fi) 2003-01-23 2003-01-23 Stonesoft Oyj Ilkivaltaisten yhteyksien ilmaisu ja estäminen
US20040153305A1 (en) 2003-02-03 2004-08-05 Enescu Mircea Gabriel Method and system for automated matching of text based electronic messages
US20040153644A1 (en) 2003-02-05 2004-08-05 Mccorkendale Bruce Preventing execution of potentially malicious software
US7206814B2 (en) 2003-10-09 2007-04-17 Propel Software Corporation Method and system for categorizing and processing e-mails
US7366761B2 (en) 2003-10-09 2008-04-29 Abaca Technology Corporation Method for creating a whitelist for processing e-mails
US7529754B2 (en) 2003-03-14 2009-05-05 Websense, Inc. System and method of monitoring and controlling application files
US7185015B2 (en) * 2003-03-14 2007-02-27 Websense, Inc. System and method of monitoring and controlling application files
US20060168006A1 (en) 2003-03-24 2006-07-27 Mr. Marvin Shannon System and method for the classification of electronic communication
GB2400931B (en) 2003-04-25 2006-09-27 Messagelabs Ltd A method of, and system for, replacing external links in electronic documents
US7739494B1 (en) 2003-04-25 2010-06-15 Symantec Corporation SSL validation and stripping using trustworthiness factors
US7272853B2 (en) 2003-06-04 2007-09-18 Microsoft Corporation Origination/destination features and lists for spam prevention
US8145710B2 (en) 2003-06-18 2012-03-27 Symantec Corporation System and method for filtering spam messages utilizing URL filtering module
US20050132042A1 (en) 2003-07-07 2005-06-16 Martin Cryer HTTP protocol-based internet document rating system
US20050015626A1 (en) * 2003-07-15 2005-01-20 Chasin C. Scott System and method for identifying and filtering junk e-mail messages or spam based on URL content
JP4218451B2 (ja) * 2003-08-05 2009-02-04 株式会社日立製作所 ライセンス管理システム、サーバ装置および端末装置
US7444515B2 (en) 2003-08-14 2008-10-28 Washington University Method and apparatus for detecting predefined signatures in packet payload using Bloom filters
US20050044156A1 (en) 2003-08-22 2005-02-24 David Kaminski Verified registry
US7421498B2 (en) 2003-08-25 2008-09-02 Microsoft Corporation Method and system for URL based filtering of electronic communications and web pages
US20050058972A1 (en) 2003-08-27 2005-03-17 Mcdole Michael E. Method for censorship
US7376154B2 (en) * 2003-08-29 2008-05-20 Agilent Technologies, Inc. Non-intrusive method for routing policy discovery
US20050060140A1 (en) 2003-09-15 2005-03-17 Maddox Paul Christopher Using semantic feature structures for document comparisons
US7587488B2 (en) 2003-09-15 2009-09-08 Blue Coat Systems, Inc. Dynamic background rater for internet content
US7631181B2 (en) * 2003-09-22 2009-12-08 Canon Kabushiki Kaisha Communication apparatus and method, and program for applying security policy
US7610342B1 (en) 2003-10-21 2009-10-27 Microsoft Corporation System and method for analyzing and managing spam e-mail
US20050091535A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Application identity for software products
US7373385B2 (en) 2003-11-03 2008-05-13 Cloudmark, Inc. Method and apparatus to block spam based on spam reports from a community of users
US7219299B2 (en) 2003-11-19 2007-05-15 Microsoft Corporation Method for blocking dereferencing elements in messages
CA2452269A1 (en) 2003-12-03 2005-06-03 Jin Li Method and system for standard bookmark classification of web sites
US7797443B1 (en) 2003-12-03 2010-09-14 Microsoft Corporation System and method for detecting spam e-mail
US7082429B2 (en) 2003-12-10 2006-07-25 National Chiao Tung University Method for web content filtering
US7398399B2 (en) 2003-12-12 2008-07-08 International Business Machines Corporation Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network
US8301702B2 (en) 2004-01-20 2012-10-30 Cloudmark, Inc. Method and an apparatus to screen electronic communications
JP2005208780A (ja) * 2004-01-21 2005-08-04 Nec Corp メールフィルタリングシステム及びそれに用いるurlブラックリスト動的構築方法
US7647383B1 (en) 2004-03-11 2010-01-12 Microsoft Corporation Intelligent message deletion
US9106694B2 (en) * 2004-04-01 2015-08-11 Fireeye, Inc. Electronic message analysis for malware detection
US7966658B2 (en) 2004-04-08 2011-06-21 The Regents Of The University Of California Detecting public network attacks using signatures and fast content analysis
US20050235036A1 (en) * 2004-04-19 2005-10-20 Nielsen Jim R Intelligent URL redirector
US20050262063A1 (en) * 2004-04-26 2005-11-24 Watchfire Corporation Method and system for website analysis
US7627670B2 (en) 2004-04-29 2009-12-01 International Business Machines Corporation Method and apparatus for scoring unsolicited e-mail
US7457823B2 (en) * 2004-05-02 2008-11-25 Markmonitor Inc. Methods and systems for analyzing data related to possible online fraud
US8769671B2 (en) 2004-05-02 2014-07-01 Markmonitor Inc. Online fraud solution
US8041769B2 (en) * 2004-05-02 2011-10-18 Markmonitor Inc. Generating phish messages
US20070299915A1 (en) 2004-05-02 2007-12-27 Markmonitor, Inc. Customer-based detection of online fraud
US7870608B2 (en) * 2004-05-02 2011-01-11 Markmonitor, Inc. Early detection and monitoring of online fraud
US7992204B2 (en) * 2004-05-02 2011-08-02 Markmonitor, Inc. Enhanced responses to online fraud
US7941490B1 (en) 2004-05-11 2011-05-10 Symantec Corporation Method and apparatus for detecting spam in email messages and email attachments
US6984991B2 (en) * 2004-05-11 2006-01-10 International Business Machines Corporation Initialization of a bidirectional, self-timed parallel interface with automatic testing of AC differential wire pairs
US7818377B2 (en) 2004-05-24 2010-10-19 Microsoft Corporation Extended message rule architecture
WO2005116851A2 (en) 2004-05-25 2005-12-08 Postini, Inc. Electronic message source information reputation system
US7756930B2 (en) 2004-05-28 2010-07-13 Ironport Systems, Inc. Techniques for determining the reputation of a message sender
US7849142B2 (en) 2004-05-29 2010-12-07 Ironport Systems, Inc. Managing connections, messages, and directory harvest attacks at a server
US7870200B2 (en) 2004-05-29 2011-01-11 Ironport Systems, Inc. Monitoring the flow of messages received at a server
US7941491B2 (en) 2004-06-04 2011-05-10 Messagemind, Inc. System and method for dynamic adaptive user-based prioritization and display of electronic messages
US7748038B2 (en) 2004-06-16 2010-06-29 Ironport Systems, Inc. Method and apparatus for managing computer virus outbreaks
US7971245B2 (en) 2004-06-21 2011-06-28 Ebay Inc. Method and system to detect externally-referenced malicious data for access and/or publication via a computer system
US7664819B2 (en) 2004-06-29 2010-02-16 Microsoft Corporation Incremental anti-spam lookup and update service
US7693945B1 (en) 2004-06-30 2010-04-06 Google Inc. System for reclassification of electronic messages in a spam filtering system
US7428530B2 (en) * 2004-07-01 2008-09-23 Microsoft Corporation Dispersing search engine results by using page category information
US20060036966A1 (en) * 2004-08-10 2006-02-16 Slava Yevdayev Method and system for presenting links associated with a requested website
GB2418037B (en) * 2004-09-09 2007-02-28 Surfcontrol Plc System, method and apparatus for use in monitoring or controlling internet access
WO2006027590A1 (en) 2004-09-09 2006-03-16 Surfcontrol Plc System, method and apparatus for use in monitoring or controlling internet access
GB2418999A (en) * 2004-09-09 2006-04-12 Surfcontrol Plc Categorizing uniform resource locators
WO2006036170A1 (en) 2004-09-15 2006-04-06 Pcsafe, Inc. Methods and systems for filtering urls, webpages, and content
GB0420548D0 (en) 2004-09-15 2004-10-20 Streamshield Networks Ltd Network-based security platform
GB2418330B (en) 2004-09-17 2006-11-08 Jeroen Oostendorp Platform for intelligent Email distribution
US20060064469A1 (en) 2004-09-23 2006-03-23 Cisco Technology, Inc. System and method for URL filtering in a firewall
US8037527B2 (en) * 2004-11-08 2011-10-11 Bt Web Solutions, Llc Method and apparatus for look-ahead security scanning
US7454778B2 (en) 2004-09-30 2008-11-18 Microsoft Corporation Enforcing rights management through edge email servers
US7287279B2 (en) * 2004-10-01 2007-10-23 Webroot Software, Inc. System and method for locating malware
US20060075494A1 (en) * 2004-10-01 2006-04-06 Bertman Justin R Method and system for analyzing data for potential malware
US20060095459A1 (en) * 2004-10-29 2006-05-04 Warren Adelman Publishing domain name related reputation in whois records
US20060095404A1 (en) * 2004-10-29 2006-05-04 The Go Daddy Group, Inc Presenting search engine results based on domain name related reputation
US8117339B2 (en) * 2004-10-29 2012-02-14 Go Daddy Operating Company, LLC Tracking domain name related reputation
US7716727B2 (en) * 2004-10-29 2010-05-11 Microsoft Corporation Network security device and method for protecting a computing device in a networked environment
US7574409B2 (en) 2004-11-04 2009-08-11 Vericept Corporation Method, apparatus, and system for clustering and classification
US8635690B2 (en) 2004-11-05 2014-01-21 Mcafee, Inc. Reputation based message processing
US8010685B2 (en) 2004-11-09 2011-08-30 Cisco Technology, Inc. Method and apparatus for content classification
US20060122957A1 (en) 2004-12-03 2006-06-08 Johnny Chen Method and system to detect e-mail spam using concept categorization of linked content
WO2006062546A2 (en) 2004-12-07 2006-06-15 Ayman, Llc System and method of filtering electronic messages
US7519818B2 (en) 2004-12-09 2009-04-14 Microsoft Corporation Method and system for processing a communication based on trust that the communication is not unwanted as assigned by a sending domain
US7580982B2 (en) 2004-12-14 2009-08-25 The Go Daddy Group, Inc. Email filtering system and method
US20060184655A1 (en) * 2004-12-30 2006-08-17 Brandon Shalton Traffic analysis
US7899866B1 (en) 2004-12-31 2011-03-01 Microsoft Corporation Using message features and sender identity for email spam filtering
US7487217B2 (en) 2005-02-04 2009-02-03 Microsoft Corporation Network domain reputation-based spam filtering
US7831834B2 (en) 2005-03-14 2010-11-09 Yahoo! Inc Associating a postmark with a message to indicate trust
US8316446B1 (en) * 2005-04-22 2012-11-20 Blue Coat Systems, Inc. Methods and apparatus for blocking unwanted software downloads
US7562304B2 (en) 2005-05-03 2009-07-14 Mcafee, Inc. Indicating website reputations during website manipulation of user information
EP1877905B1 (en) 2005-05-05 2014-10-22 Cisco IronPort Systems LLC Identifying threats in electronic messages
US20060259948A1 (en) 2005-05-12 2006-11-16 International Business Machines Corporation Integrated document handling in distributed collaborative applications
US7788723B2 (en) 2005-05-17 2010-08-31 Computer Associates Think, Inc. Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning
US7548922B2 (en) 2005-05-17 2009-06-16 International Business Machines Corporation Customized and consolidated bookmarks
US7937480B2 (en) 2005-06-02 2011-05-03 Mcafee, Inc. Aggregation of reputation data
GB2426887B (en) 2005-06-04 2009-01-07 Ibm Client responsibilities in messaging systems
US8010609B2 (en) 2005-06-20 2011-08-30 Symantec Corporation Method and apparatus for maintaining reputation lists of IP addresses to detect email spam
US7739338B2 (en) 2005-06-21 2010-06-15 Data Laboratory, L.L.C. System and method for encoding and verifying the identity of a sender of electronic mail and preventing unsolicited bulk email
US7660861B2 (en) 2005-06-21 2010-02-09 Data Laboratory, L.L.C. System and method for verifying the identity of a sender of electronic mail and preventing unsolicited bulk email
GB0512744D0 (en) 2005-06-22 2005-07-27 Blackspider Technologies Method and system for filtering electronic messages
US20070011739A1 (en) * 2005-06-28 2007-01-11 Shay Zamir Method for increasing the security level of a user machine browsing web pages
US20070028302A1 (en) * 2005-07-29 2007-02-01 Bit 9, Inc. Distributed meta-information query in a network
US7516184B2 (en) * 2005-11-22 2009-04-07 Cisco Technology, Inc. Method and system for a method for evaluating a message based in part on a registrar reputation
US8938515B2 (en) 2005-12-29 2015-01-20 Sap Se Master queue for messaging service
US20070204223A1 (en) 2006-02-27 2007-08-30 Jay Bartels Methods of and systems for personalizing and publishing online content
US7636703B2 (en) 2006-05-02 2009-12-22 Exegy Incorporated Method and apparatus for approximate pattern matching
US20080082662A1 (en) * 2006-05-19 2008-04-03 Richard Dandliker Method and apparatus for controlling access to network resources based on reputation
US20080016339A1 (en) * 2006-06-29 2008-01-17 Jayant Shukla Application Sandbox to Detect, Remove, and Prevent Malware
US8615800B2 (en) 2006-07-10 2013-12-24 Websense, Inc. System and method for analyzing web content
US20080077517A1 (en) 2006-09-22 2008-03-27 Robert Grove Sappington Reputation, Information & Communication Management
US20080086372A1 (en) 2006-10-10 2008-04-10 Anand Madhavan Contextual banner advertising
US20080267144A1 (en) 2007-04-26 2008-10-30 Motorola, Inc. System and method for managing broadcast and/or multicast based communication sessions for mobile nodes

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103870554A (zh) * 2009-12-11 2014-06-18 北京奇虎科技有限公司 一种实现浏览器地址栏铭牌的方法
CN102289456A (zh) * 2010-06-17 2011-12-21 微软公司 Web爬行的差异检测
CN102289456B (zh) * 2010-06-17 2016-12-07 微软技术许可有限责任公司 Web爬行的差异检测
CN101917443A (zh) * 2010-08-26 2010-12-15 北京天融信科技有限公司 一种安全网关及其控制敏感链接的方法
CN102843270A (zh) * 2011-09-02 2012-12-26 哈尔滨安天科技股份有限公司 基于url与本地文件关联的可疑url检测方法和装置
CN102843270B (zh) * 2011-09-02 2016-01-27 哈尔滨安天科技股份有限公司 基于url与本地文件关联的可疑url检测方法和装置
CN102571812A (zh) * 2011-12-31 2012-07-11 成都市华为赛门铁克科技有限公司 一种网络威胁的跟踪识别方法及装置
CN102571812B (zh) * 2011-12-31 2014-11-05 华为数字技术(成都)有限公司 一种网络威胁的跟踪识别方法及装置
TWI611308B (zh) * 2016-11-03 2018-01-11 財團法人資訊工業策進會 網頁資料擷取裝置及其網頁資料擷取方法
CN112134852A (zh) * 2020-08-31 2020-12-25 广州锦行网络科技有限公司 一种蜜罐系统攻击行为数据异步http发送方法及装置
CN112134852B (zh) * 2020-08-31 2021-08-13 广州锦行网络科技有限公司 一种蜜罐系统攻击行为数据异步http发送方法及装置

Also Published As

Publication number Publication date
US8978140B2 (en) 2015-03-10
WO2008008219A3 (en) 2008-02-28
US9723018B2 (en) 2017-08-01
US8020206B2 (en) 2011-09-13
CA2656571A1 (en) 2008-01-17
WO2008008219A2 (en) 2008-01-17
AU2007273085B2 (en) 2012-07-12
CN101517570B (zh) 2015-09-16
EP2044539A2 (en) 2009-04-08
US20110252478A1 (en) 2011-10-13
US20150180899A1 (en) 2015-06-25
AU2007273085A1 (en) 2008-01-17
US20080010368A1 (en) 2008-01-10

Similar Documents

Publication Publication Date Title
CN101512522B (zh) 分析网络内容的系统和方法
CN101517570B (zh) 分析网络内容的系统和方法
CN101971591B (zh) 分析网址的系统及方法
CN101622621B (zh) 阻止恶意网络内容的系统和方法
US8359651B1 (en) Discovering malicious locations in a public computer network
CN107688743B (zh) 一种恶意程序的检测分析方法及系统
CN103493061A (zh) 用于应对恶意软件的方法和装置
CN104901975A (zh) 网站日志安全分析方法、装置及网关
CN103473501A (zh) 一种基于云安全的恶意软件追踪方法
AU2013206427A1 (en) System and method of analyzing web addresses
CN110855612B (zh) web后门路径探测方法
Sajid Autonomous Malware Deception and Orchestration
KR20240021677A (ko) 사이버 위협 정보 처리 장치, 사이버 위협 정보 처리 방법 및 사이버 위협 정보 처리하는 프로그램을 저장하는 컴퓨터 판독 가능한 저장매체

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: Delaware, USA

Patentee after: Fospint joint holding Co.

Address before: Texas, USA

Patentee before: Fospint Ltd.

Address after: Delaware, USA

Patentee after: Wangsheng Co.,Ltd.

Address before: California, USA

Patentee before: WEBSENSE, Inc.

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20210623

Address after: Texas, USA

Patentee after: Fospint Ltd.

Address before: Delaware, USA

Patentee before: Fospint joint holding Co.

Effective date of registration: 20210623

Address after: Texas, USA

Patentee after: Fospint Ltd.

Address before: Delaware, USA

Patentee before: Wangsheng Co.,Ltd.

TR01 Transfer of patent right