[go: up one dir, main page]

WO2006065882A3 - System and method for deterring rogue users from attacking protected legitimate users - Google Patents

System and method for deterring rogue users from attacking protected legitimate users Download PDF

Info

Publication number
WO2006065882A3
WO2006065882A3 PCT/US2005/045200 US2005045200W WO2006065882A3 WO 2006065882 A3 WO2006065882 A3 WO 2006065882A3 US 2005045200 W US2005045200 W US 2005045200W WO 2006065882 A3 WO2006065882 A3 WO 2006065882A3
Authority
WO
WIPO (PCT)
Prior art keywords
rogue
rus
users
plu
complying
Prior art date
Application number
PCT/US2005/045200
Other languages
French (fr)
Other versions
WO2006065882A2 (en
Inventor
Eran Reshef
Amir Hirsh
Original Assignee
Blue Security Inc
Eran Reshef
Amir Hirsh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/302,507 external-priority patent/US7756933B2/en
Priority claimed from US11/302,508 external-priority patent/US20060161989A1/en
Application filed by Blue Security Inc, Eran Reshef, Amir Hirsh filed Critical Blue Security Inc
Publication of WO2006065882A2 publication Critical patent/WO2006065882A2/en
Publication of WO2006065882A3 publication Critical patent/WO2006065882A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An active deterrence method and system (100) deter rogue cyber activity (201) targeting one or more protected legitimate users (PLUs) (104a-104n). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings (206) to one or more rogue users (RUs) (106a-106n) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms (209) against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
PCT/US2005/045200 2004-12-13 2005-12-13 System and method for deterring rogue users from attacking protected legitimate users WO2006065882A2 (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US63580204P 2004-12-13 2004-12-13
US60/635,802 2004-12-13
US11/302,507 US7756933B2 (en) 2004-12-13 2005-12-12 System and method for deterring rogue users from attacking protected legitimate users
US11/302,507 2005-12-12
US11/302,508 2005-12-12
US11/302,508 US20060161989A1 (en) 2004-12-13 2005-12-12 System and method for deterring rogue users from attacking protected legitimate users

Publications (2)

Publication Number Publication Date
WO2006065882A2 WO2006065882A2 (en) 2006-06-22
WO2006065882A3 true WO2006065882A3 (en) 2007-11-15

Family

ID=36588495

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/045200 WO2006065882A2 (en) 2004-12-13 2005-12-13 System and method for deterring rogue users from attacking protected legitimate users

Country Status (1)

Country Link
WO (1) WO2006065882A2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7540021B2 (en) 2000-04-24 2009-05-26 Justin Page System and methods for an identity theft protection bot
CN102722680B (en) * 2012-06-07 2014-11-05 腾讯科技(深圳)有限公司 Method and system for removing rogue programs
CN114089711B (en) * 2022-01-21 2022-05-17 深圳艾灵网络有限公司 Industrial equipment control management method, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6330590B1 (en) * 1999-01-05 2001-12-11 William D. Cotten Preventing delivery of unwanted bulk e-mail
US20020073338A1 (en) * 2000-11-22 2002-06-13 Compaq Information Technologies Group, L.P. Method and system for limiting the impact of undesirable behavior of computers on a shared data network
US20040003283A1 (en) * 2002-06-26 2004-01-01 Goodman Joshua Theodore Spam detector with challenges
US20040243844A1 (en) * 2001-10-03 2004-12-02 Reginald Adkins Authorized email control system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6330590B1 (en) * 1999-01-05 2001-12-11 William D. Cotten Preventing delivery of unwanted bulk e-mail
US20020073338A1 (en) * 2000-11-22 2002-06-13 Compaq Information Technologies Group, L.P. Method and system for limiting the impact of undesirable behavior of computers on a shared data network
US20040243844A1 (en) * 2001-10-03 2004-12-02 Reginald Adkins Authorized email control system
US20040003283A1 (en) * 2002-06-26 2004-01-01 Goodman Joshua Theodore Spam detector with challenges

Also Published As

Publication number Publication date
WO2006065882A2 (en) 2006-06-22

Similar Documents

Publication Publication Date Title
Vanderheiden Eco-terrorism or justified resistance? Radical environmentalism and the “war on terror”
EP1708114A3 (en) Aggregating the knowledge base of computer systems to proactively protect a computer from malware
WO2011018414A3 (en) Physically unclonable function with tamper prevention and anti-aging system
WO2004088477A3 (en) Apparatus and method for network vulnerability detection and compliance assessment
EP2198941A4 (en) Network game system, server, unauthorized behavior prevention method, unauthorized behavior detection method, information recording medium, and program
PH12015500984A1 (en) Fire-sensor, fire detection system, fire suppression system, and combinations thereof
WO2008097377A3 (en) Systems and methods for area denial
WO2004111760A3 (en) Application layer security method and system
WO2007117635A3 (en) Malware modeling detection system and method for mobile platforms
WO2008033236A3 (en) System and methods for an identity theft protection bot
EP1839046A4 (en) ENZYMATIC ELECTROCHEMICAL DETECTION ASSAY USING PROTECTIVE MONOLAYER AND DEVICE FOR IMPLEMENTING SAID METHOD
SG119237A1 (en) An intrusion protection system and method
WO2007041625A3 (en) Vehicle incursion inhibitors
NO20052403D0 (en) System and method for intrusion detection.
WO2006065882A3 (en) System and method for deterring rogue users from attacking protected legitimate users
FR2934070B1 (en) DEVICE AND METHOD FOR PROTECTING AN ELECTRONIC SYSTEM AGAINST UNAUTHORIZED ACCESS
WO2009088823A3 (en) Methods and systems for policy and setting administration
WO2010144105A3 (en) Integrated airport domain awareness response system, system for ground-based transportable defense of airports against manpads, and methods
Merilaita et al. What is camouflage through distractive markings?
GB2404262B (en) System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
FR2884088B1 (en) METHOD AND CRYPTOGRAPHIC DEVICE FOR PROTECTING THE LOGIC OF PUBLIC KEYS AGAINST FAULT ATTACKS
WO2008127360A3 (en) Real time threat detection system
Png Hackers, users, information security
WO2008031079A8 (en) Method of automatically defining and monitoring internal connections in a real-time environment to protect private access network connections from public access network connections within a 32/64-bit microsoft pc or server operating system network environment
CN103716289A (en) Attack control method for protecting service system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05854000

Country of ref document: EP

Kind code of ref document: A2