Malicious uniform resource locator detection
F Xue, BB Zhu, W Chu - US Patent 9,178,901, 2015 - Google Patents
The techniques described herein use training data to train classification models to detect
malicious Uniform Resource Locators (URLs) that target authentic resources (eg, Web page …
malicious Uniform Resource Locators (URLs) that target authentic resources (eg, Web page …
System and method for detecting malicious links in electronic messages
V Pidathala, H Uyeno - US Patent 9,300,686, 2016 - Google Patents
William W. Schaal (57) ABSTRACT According to one embodiment, in response to receiving
a plurality of uniform resource locator (URL) links for mali cious determination, any known …
a plurality of uniform resource locator (URL) links for mali cious determination, any known …
Method and apparatus for detecting malicious software through contextual convictions, generic signatures and machine learning techniques
O Friedrichs, A Huger, AJ O'donnell - US Patent 9,088,601, 2015 - Google Patents
Novel methods, components, and systems that enhance traditional techniques for detecting
malicious software are presented. More specifically, methods, components, and systems that …
malicious software are presented. More specifically, methods, components, and systems that …
System and method for providing a secured operating system execution environment
AS Sallam - US Patent 9,087,199, 2015 - Google Patents
In one embodiment, a system for launching a security archi tecture includes an electronic
device comprising a processor and one or more operating systems, a security agent, and a …
device comprising a processor and one or more operating systems, a security agent, and a …
System and method for automated machine-learning, zero-day malware detection
BR Avasarala, JC Day, D Steiner - US Patent 9,292,688, 2016 - Google Patents
BACKGROUND Detection of cyber intrusion attempts is a key component to cyber security.
Current commercial anti-virus and intrusion detection software (IDS) rely largely on …
Current commercial anti-virus and intrusion detection software (IDS) rely largely on …
Network-based malware detection
S Karandikar, M Amin, S Deshpande… - US Patent 9,661,009, 2017 - Google Patents
In an embodiment, a system, device and method for detecting a malicious attack is
described. Herein, the system includes a security network device that conducts an analysis …
described. Herein, the system includes a security network device that conducts an analysis …
System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers
S Karandikar, M Amin, S Deshpande… - US Patent 9,838,408, 2017 - Google Patents
In an embodiment, a system, device and method for detecting a malicious attack is
described. Herein, the system includes a security network device that conducts an analysis …
described. Herein, the system includes a security network device that conducts an analysis …
Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
T Yousaf, D Dennison, P Thoren, K Pham… - US Patent …, 2020 - Google Patents
Embodiments of the present disclosure relate to a data analysis system that may receive
data comprising a plurality of raw data items from one or more data sources, such as a …
data comprising a plurality of raw data items from one or more data sources, such as a …
System and method for detecting malicious links in electronic messages
V Pidathala, H Uyeno - US Patent 9,888,019, 2018 - Google Patents
According to one embodiment, in response to receiving a plurality of uniform resource
locator (URL) links for malicious determination, any known URL links are removed from the …
locator (URL) links for malicious determination, any known URL links are removed from the …
Identification of malware sites using unknown URL sites and newly registered DNS addresses
N Zuk, R Lazzarato, H **e - US Patent 9,473,528, 2016 - Google Patents
In some embodiments, identification of malware sites using unknown URL sites and newly
registered DNS addresses includes performing a heuristic analysis for information …
registered DNS addresses includes performing a heuristic analysis for information …