GB201903788D0 - Malware barrier - Google Patents
Malware barrierInfo
- Publication number
- GB201903788D0 GB201903788D0 GBGB1903788.6A GB201903788A GB201903788D0 GB 201903788 D0 GB201903788 D0 GB 201903788D0 GB 201903788 A GB201903788 A GB 201903788A GB 201903788 D0 GB201903788 D0 GB 201903788D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- malware
- barrier
- malware barrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB1804776.1A GB201804776D0 (en) | 2018-03-25 | 2018-03-25 | Malware Barrier |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB201903788D0 true GB201903788D0 (en) | 2019-05-01 |
| GB2574093A GB2574093A (en) | 2019-11-27 |
| GB2574093B GB2574093B (en) | 2020-10-07 |
Family
ID=62067957
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GBGB1804776.1A Ceased GB201804776D0 (en) | 2018-03-25 | 2018-03-25 | Malware Barrier |
| GB1903788.6A Active GB2574093B (en) | 2018-03-25 | 2019-03-20 | Malware barrier |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GBGB1804776.1A Ceased GB201804776D0 (en) | 2018-03-25 | 2018-03-25 | Malware Barrier |
Country Status (1)
| Country | Link |
|---|---|
| GB (2) | GB201804776D0 (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12526309B2 (en) | 2020-02-17 | 2026-01-13 | British Telecommunications Public Limited Company | Real-time malware propagation forecasting |
| EP4107919B1 (en) | 2020-02-17 | 2024-06-19 | British Telecommunications public limited company | Malware propagation forecasting |
| EP4128694B1 (en) | 2020-04-03 | 2024-04-10 | British Telecommunications public limited company | Malware protection based on final infection size |
| CN112469041B (en) * | 2020-11-30 | 2022-11-04 | 广州大学 | A wireless sensor network-based malicious program isolation and control method |
| GB2602628B (en) | 2020-12-31 | 2023-03-29 | British Telecomm | Identifying Computer Systems for Malware Infection Mitigation |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2007249579A (en) * | 2006-03-15 | 2007-09-27 | Fujitsu Ltd | Worm countermeasure parameter determination program, worm countermeasure parameter determination apparatus, node number determination program, node number determination apparatus, and node number restriction system |
| CN104166708A (en) * | 2014-08-11 | 2014-11-26 | 肇庆学院 | Mobile phone virus spreading modeling method based on social network and semi-Markov process |
| CN106027513B (en) * | 2016-05-15 | 2019-01-08 | 广东技术师范学院 | Propagation characteristic analysis method of the computer virus under SDN mobile environment |
| KR101825911B1 (en) * | 2016-09-26 | 2018-02-07 | 국방과학연구소 | Worm attack modeling and simulation for data transport network having hierarchical structure |
| CN106656571A (en) * | 2016-11-09 | 2017-05-10 | 天津大学 | Clustering wireless sensor network malicious program propagation model based on evolution game |
| CN106936855B (en) * | 2017-05-12 | 2020-01-10 | 中国人民解放军信息工程大学 | Network security defense decision-making determination method and device based on attack and defense differential game |
-
2018
- 2018-03-25 GB GBGB1804776.1A patent/GB201804776D0/en not_active Ceased
-
2019
- 2019-03-20 GB GB1903788.6A patent/GB2574093B/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| GB201804776D0 (en) | 2018-05-09 |
| GB2574093A (en) | 2019-11-27 |
| GB2574093B (en) | 2020-10-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IL267949A (en) | Altered virus | |
| GB202018989D0 (en) | Malware detection | |
| GB2575052B (en) | Phishing detection | |
| GB2574093B (en) | Malware barrier | |
| IL271529A (en) | Barrier | |
| GB201711744D0 (en) | Barrier system | |
| GB2555384B (en) | Preventing phishing attacks | |
| GB201717370D0 (en) | Barrier | |
| GB201820983D0 (en) | Virus | |
| GB2580051B (en) | Barrier assembly | |
| GB2579509B (en) | Barrier system | |
| GB2594660B (en) | Barrier | |
| GB2555529B (en) | Barrier | |
| GB201703675D0 (en) | Barrier arrangement | |
| GB201713671D0 (en) | Barrier system | |
| CA194487S (en) | Barrier | |
| ZA202006468B (en) | Barrier | |
| ZA202004873B (en) | Barrier arrangement | |
| ZA201807645B (en) | Barrier | |
| GB201914157D0 (en) | Barrier | |
| GB201904877D0 (en) | Barrier | |
| GB2567437B (en) | Barrier | |
| GB201811225D0 (en) | Area denial | |
| GB2611724B (en) | Phishing detection | |
| GB201803562D0 (en) | Barrier assembly |