Movatterモバイル変換


[0]ホーム

URL:


US20160323304A1 - Information processing apparatus, method and computer-readable medium - Google Patents

Information processing apparatus, method and computer-readable medium
Download PDF

Info

Publication number
US20160323304A1
US20160323304A1US15/208,905US201615208905AUS2016323304A1US 20160323304 A1US20160323304 A1US 20160323304A1US 201615208905 AUS201615208905 AUS 201615208905AUS 2016323304 A1US2016323304 A1US 2016323304A1
Authority
US
United States
Prior art keywords
terminal
communication
phase
malware
activity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/208,905
Inventor
Seigo Terada
Kazuhiro Koide
Takashi Kobayashi
Keiji Michine
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PFU Ltd
Original Assignee
PFU Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PFU LtdfiledCriticalPFU Ltd
Assigned to PFU LIMITEDreassignmentPFU LIMITEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KOBAYASHI, TAKASHI, KOIDE, KAZUHIRO, MICHINE, KEIJI, TERADA, Seigo
Publication of US20160323304A1publicationCriticalpatent/US20160323304A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An information processing apparatus includes: a specification unit that specifies a phase of activity of terminals by comparing communication between terminals with a pattern held in advance; and a correlation analysis unit that determines whether or not a first terminal and a second terminal are carrying out activity cooperatively, by performing a correlation analysis of communication by the first terminal and communication by the second terminal, when the phase specified currently or in the past in respect of the first terminal and the phase specified currently or in the past in respect of the second terminal are the same.

Description

Claims (10)

What is claimed is:
1. An information processing apparatus, comprising:
a comparison unit that compares a communication by a plurality of terminals with a pattern held in advance;
a specification unit that specifies a phase of activity of the terminals, in accordance with a comparison result of comparison by the comparison unit; and
a correlation analysis unit that determines whether or not a first terminal and a second terminal included in the plurality of terminals are carrying out activity cooperatively, by performing a correlation analysis of communication by the first terminal and communication by the second terminal, when a phase specified currently or in the past in respect of the first terminal is the same as a phase specified currently or in the past in respect of the second terminal.
2. The information processing apparatus according toclaim 1, wherein the correlation analysis unit determines whether or not the first terminal and the second terminal are carrying out activity cooperatively, by determining the presence or extent of continuity or relationship between the communication by the first terminal and the communication by the second terminal.
3. The information processing apparatus according toclaim 1, further comprising a role estimation unit that estimates a role of the activity in the phase of the first terminal or the second terminal which are determined to be operating cooperatively by the correlation analysis unit.
4. The information processing apparatus according toclaim 3, further comprising a communication blocking unit that blocks communication relating to the terminal, when a role of the terminal has been estimated.
5. The information processing apparatus according toclaim 4, wherein the communication blocking unit blocks, when a role of the terminal has been estimated, communication with a prescribed terminal related to the role of the terminal, regardless of whether or not a source of communication with the prescribed terminal is infected with malware.
6. The information processing apparatus according toclaim 5, wherein the prescribed terminal is a terminal which transmits software for performing the role to the terminal, the role of which has been estimated, or a terminal with which the terminal, the role of which has been estimated, communicates in order to perform the role.
7. The information processing apparatus according toclaim 1, wherein
the phase indicates a transitional state of a prescribed activity by the terminal; and
the specification unit specifies, as a phase relating to the communication, a phase pre-established in respect of a pattern which is matching or similar to the communication, as the comparison result.
8. The information processing apparatus according toclaim 1, further comprising a communication acquisition unit that acquires a communication by a terminal connected to a network,
wherein the comparison unit compares the acquired communication with a pattern held in advance.
9. A method, to be executed by a computer, comprising:
comparing a communication by a plurality of terminals with a pattern held in advance;
specifying a phase of activity of the terminals, in accordance with a comparison result of the comparing; and
determining whether or not a first terminal and a second terminal included in the plurality of terminals are performing activity cooperatively, by performing a correlation analysis of communication by the first terminal and communication by the second terminal, when a phase specified currently or in the past in respect of the first terminal is the same as a phase specified currently or in the past in respect of the second terminal.
10. A computer-readable non-transitory medium on which is recorded a program, causing a computer to function as:
a comparison unit that compares a communication by a plurality of terminals with a pattern held in advance;
a specification unit that specifies a phase of activity of the terminals, in accordance with a comparison result of comparison by the comparison unit; and
a correlation analysis unit that determines whether or not a first terminal and a second terminal included in the plurality of terminals are performing activity cooperatively, by performing a correlation analysis of communication by the first terminal and communication by the second terminal, when a phase specified currently or in the past in respect of the first terminal is the same as a phase specified currently or in the past in respect of the second terminal.
US15/208,9052014-01-142016-07-13Information processing apparatus, method and computer-readable mediumAbandonedUS20160323304A1 (en)

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
JP2014-0040552014-01-14
JP20140040552014-01-14
PCT/JP2014/084691WO2015107862A1 (en)2014-01-142014-12-26Information processing device, method, and program

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
PCT/JP2014/084691ContinuationWO2015107862A1 (en)2014-01-142014-12-26Information processing device, method, and program

Publications (1)

Publication NumberPublication Date
US20160323304A1true US20160323304A1 (en)2016-11-03

Family

ID=53522354

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US14/254,928Active2034-05-29US9288221B2 (en)2014-01-142014-04-17Information processing apparatus, method for determining unauthorized activity and computer-readable medium
US15/208,937Expired - Fee RelatedUS10277614B2 (en)2014-01-142016-07-13Information processing apparatus, method for determining activity and computer-readable medium
US15/208,905AbandonedUS20160323304A1 (en)2014-01-142016-07-13Information processing apparatus, method and computer-readable medium

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US14/254,928Active2034-05-29US9288221B2 (en)2014-01-142014-04-17Information processing apparatus, method for determining unauthorized activity and computer-readable medium
US15/208,937Expired - Fee RelatedUS10277614B2 (en)2014-01-142016-07-13Information processing apparatus, method for determining activity and computer-readable medium

Country Status (4)

CountryLink
US (3)US9288221B2 (en)
JP (2)JP6014280B2 (en)
CN (3)CN104778404B (en)
WO (2)WO2015107861A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180150633A1 (en)*2016-11-282018-05-31Fujitsu LimitedSoftware attack detection device, non-transitory computer-readable storage medium, and software attack detection method
US20180332061A1 (en)*2017-05-122018-11-15Pfu LimitedInformation processing apparatus, method and medium for classifying unauthorized activity
CN114422495A (en)*2022-01-252022-04-29北京浩瀚深度信息技术股份有限公司Safety supervision method for DNS over HTTP protocol
US11936666B1 (en)2016-03-312024-03-19Musarubra Us LlcRisk analyzer for ascertaining a risk of harm to a network and generating alerts regarding the ascertained risk
US11979428B1 (en)*2016-03-312024-05-07Musarubra Us LlcTechnique for verifying exploit/malware at malware detection appliance through correlation with endpoints
USRE50199E1 (en)*2016-02-112024-11-05Arista Networks, Inc.System and method for detecting a malicious activity in a computing environment

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP6421436B2 (en)*2014-04-112018-11-14富士ゼロックス株式会社 Unauthorized communication detection device and program
US9965627B2 (en)*2014-09-142018-05-08Sophos LimitedLabeling objects on an endpoint for encryption management
US10122687B2 (en)2014-09-142018-11-06Sophos LimitedFirewall techniques for colored objects on endpoints
US9537841B2 (en)2014-09-142017-01-03Sophos LimitedKey management for compromised enterprise endpoints
US9781131B2 (en)*2015-04-222017-10-03Aktiebolaget SkfSystems and methods for securing remote configuration
US9641543B2 (en)*2015-04-222017-05-02Aktiebolaget AKFSystems and methods for securing remote configuration
US9699202B2 (en)*2015-05-202017-07-04Cisco Technology, Inc.Intrusion detection to prevent impersonation attacks in computer networks
JP6258562B2 (en)*2015-06-022018-01-10三菱電機ビルテクノサービス株式会社 Relay device, network monitoring system, and program
US20170155667A1 (en)*2015-11-302017-06-01Symantec CorporationSystems and methods for detecting malware infections via domain name service traffic analysis
JP2017147575A (en)2016-02-162017-08-24富士通株式会社 Control program, control device, and control method
US10075456B1 (en)*2016-03-042018-09-11Symantec CorporationSystems and methods for detecting exploit-kit landing pages
US10050982B1 (en)*2016-05-192018-08-14Symantec CorporationSystems and methods for reverse-engineering malware protocols
JP6105792B1 (en)*2016-07-042017-03-29株式会社ラック Information processing apparatus, information processing method, and program
CN106682517B (en)*2017-01-162019-04-23西安电子科技大学 Activity inference method when Android application is running
JP6207784B1 (en)*2017-03-272017-10-04株式会社ラック Relay device, relay method, and program
IL251683B (en)2017-04-092019-08-29Yoseph KorenSystem and method for dynamic management of private data
US10174302B1 (en)2017-06-212019-01-08Xl-Protein GmbhModified L-asparaginase
JP6946829B2 (en)*2017-07-312021-10-13富士通株式会社 Programs, information processing methods and information processing equipment
JP7033467B2 (en)*2018-03-012022-03-10株式会社日立製作所 Fraudulent communication detection device and fraudulent communication detection program
CN108429746B (en)*2018-03-062020-01-03华中科技大学Privacy data protection method and system for cloud tenants
CN108632087B (en)*2018-04-262021-12-28深圳市华迅光通信有限公司Internet access management method and system based on router
US12045341B2 (en)*2018-06-132024-07-23Panasonic Intellectual Property Management Co., Ltd.Unauthorized communication detection device, unauthorized communication detection method and manufacturing system
JP7109391B2 (en)2019-02-262022-07-29株式会社日立製作所 Unauthorized communication detection device and unauthorized communication detection program
CN110995525A (en)*2019-10-312020-04-10北京直真科技股份有限公司Router detection method based on maintenance matrix
CN113051555A (en)*2020-09-072021-06-29沈建锋Service information detection method combining big data and cloud computing center
CN112019575B (en)*2020-10-222021-01-29腾讯科技(深圳)有限公司Data packet processing method and device, computer equipment and storage medium
DE102020213893A1 (en)*2020-11-042022-05-05Robert Bosch Gesellschaft mit beschränkter Haftung Procedure for detecting unauthorized physical access to a bus system
US11792209B2 (en)*2020-12-312023-10-17Imperva, Inc.Robust learning of web traffic
JP2023006953A (en)*2021-07-012023-01-18サイエンスパーク株式会社Malware detection method, electronic computer, program, and its recording medium
WO2023233580A1 (en)*2022-06-012023-12-07日本電信電話株式会社Detection countermeasure control system, detection countermeasure control method, hardware accelerator, controller, and program
US12353311B2 (en)*2022-07-202025-07-08Zscaler, Inc.Dynamic applicative session grouping

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070150957A1 (en)*2005-12-282007-06-28Microsoft CorporationMalicious code infection cause-and-effect analysis
US9311479B1 (en)*2013-03-142016-04-12Fireeye, Inc.Correlation and consolidation of analytic data for holistic view of a malware attack

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
DE60124295T8 (en)2000-11-302007-12-06Lancope, Inc. RIVER-BASED DETECTION OF AN INSERT INTO A NETWORK
WO2002101516A2 (en)*2001-06-132002-12-19Intruvert Networks, Inc.Method and apparatus for distributed network security
US7475426B2 (en)2001-11-302009-01-06Lancope, Inc.Flow-based detection of network intrusions
CA2606998C (en)*2005-05-052014-09-09Ironport Systems, Inc.Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources
JP2006350543A (en)2005-06-142006-12-28Mitsubishi Electric Corp Log analyzer
JP2006352543A (en)*2005-06-162006-12-28Iwatsu Electric Co Ltd SIP telephone switching system
US8955122B2 (en)2007-04-042015-02-10Sri InternationalMethod and apparatus for detecting malware infection
CN101414939B (en)*2008-11-282011-12-28武汉虹旭信息技术有限责任公司Internet application recognition method based on dynamical depth package detection
CN103581155B (en)*2012-08-082016-04-27贵州电网公司信息通信分公司Information security Situation analysis method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070150957A1 (en)*2005-12-282007-06-28Microsoft CorporationMalicious code infection cause-and-effect analysis
US9311479B1 (en)*2013-03-142016-04-12Fireeye, Inc.Correlation and consolidation of analytic data for holistic view of a malware attack

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
USRE50199E1 (en)*2016-02-112024-11-05Arista Networks, Inc.System and method for detecting a malicious activity in a computing environment
US11936666B1 (en)2016-03-312024-03-19Musarubra Us LlcRisk analyzer for ascertaining a risk of harm to a network and generating alerts regarding the ascertained risk
US11979428B1 (en)*2016-03-312024-05-07Musarubra Us LlcTechnique for verifying exploit/malware at malware detection appliance through correlation with endpoints
US20180150633A1 (en)*2016-11-282018-05-31Fujitsu LimitedSoftware attack detection device, non-transitory computer-readable storage medium, and software attack detection method
US10872147B2 (en)*2016-11-282020-12-22Fujitsu LimitedSoftware attack detection device, non-transitory computer-readable storage medium, and software attack detection method
US20180332061A1 (en)*2017-05-122018-11-15Pfu LimitedInformation processing apparatus, method and medium for classifying unauthorized activity
US10652259B2 (en)*2017-05-122020-05-12Pfu LimitedInformation processing apparatus, method and medium for classifying unauthorized activity
CN114422495A (en)*2022-01-252022-04-29北京浩瀚深度信息技术股份有限公司Safety supervision method for DNS over HTTP protocol

Also Published As

Publication numberPublication date
US20150200956A1 (en)2015-07-16
US9288221B2 (en)2016-03-15
CN105917348B (en)2019-04-05
WO2015107862A1 (en)2015-07-23
CN104778404B (en)2018-03-06
JP6097849B2 (en)2017-03-15
JP6014280B2 (en)2016-10-25
CN105934763A (en)2016-09-07
US20160323305A1 (en)2016-11-03
CN105917348A (en)2016-08-31
US10277614B2 (en)2019-04-30
JPWO2015107862A1 (en)2017-03-23
JPWO2015107861A1 (en)2017-03-23
WO2015107861A1 (en)2015-07-23
CN104778404A (en)2015-07-15

Similar Documents

PublicationPublication DateTitle
US20160323304A1 (en)Information processing apparatus, method and computer-readable medium
US10652259B2 (en)Information processing apparatus, method and medium for classifying unauthorized activity
US11057349B2 (en)Cloud-based multi-function firewall and zero trust private virtual network
US10200384B1 (en)Distributed systems and methods for automatically detecting unknown bots and botnets
EP3297248B1 (en)System and method for generating rules for attack detection feedback system
US8561177B1 (en)Systems and methods for detecting communication channels of bots
US9628498B1 (en)System and method for bot detection
US9398043B1 (en)Applying fine-grain policy action to encapsulated network attacks
US20080301810A1 (en)Monitoring apparatus and method therefor
Patel et al.Rule-based network intrusion detection system for port scanning with efficient port scan detection rules using snort
EP2713581A1 (en)Virtual honeypot
US10263975B2 (en)Information processing device, method, and medium
KR101553264B1 (en)System and method for preventing network intrusion
CN113612784A (en)Dynamic service handling using honeypots
Lin et al.Implementation of an SDN-based security defense mechanism against DDoS attacks
Sayyed et al.Intrusion detection system
Patel et al.A snort-based secure edge router for smart home
US10187414B2 (en)Differential malware detection using network and endpoint sensors
CN104579832B (en)A kind of OpenFlow network security detection methods and system
US10778708B1 (en)Method and apparatus for detecting effectiveness of security controls
US10454965B1 (en)Detecting network packet injection
KodituwakkuFederated Agentless Detection of Endpoints Using Behavioral and Characteristic Modeling
KR20200044210A (en)Abnormal behavior packet detector for wireless IoT device
Fida et al.IoTShield: Defending IoT Systems Against Prevalent Attacks Using Programmable Networks
AdrovićEnhancing Smart Home Security through IoT Device Fingerprinting Using Machine Learning: Enhancing Smart Home Security using ML

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:PFU LIMITED, JAPAN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TERADA, SEIGO;KOIDE, KAZUHIRO;KOBAYASHI, TAKASHI;AND OTHERS;REEL/FRAME:039149/0375

Effective date:20160614

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp