[go: up one dir, main page]

FR2954547B1 - Procede de detection d?un detournement de ressources informatiques - Google Patents

Procede de detection d?un detournement de ressources informatiques

Info

Publication number
FR2954547B1
FR2954547B1 FR0959335A FR0959335A FR2954547B1 FR 2954547 B1 FR2954547 B1 FR 2954547B1 FR 0959335 A FR0959335 A FR 0959335A FR 0959335 A FR0959335 A FR 0959335A FR 2954547 B1 FR2954547 B1 FR 2954547B1
Authority
FR
France
Prior art keywords
misuse
detecting
computer resources
resources
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
FR0959335A
Other languages
English (en)
Other versions
FR2954547A1 (fr
Inventor
Laurent Clevy
Antony Martin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alcatel Lucent SAS
Original Assignee
Alcatel Lucent SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to FR0959335A priority Critical patent/FR2954547B1/fr
Application filed by Alcatel Lucent SAS filed Critical Alcatel Lucent SAS
Priority to KR1020127016005A priority patent/KR101443472B1/ko
Priority to JP2012545374A priority patent/JP5699162B2/ja
Priority to PCT/FR2010/052639 priority patent/WO2011083226A1/fr
Priority to EP10805798A priority patent/EP2517139A1/fr
Priority to US13/515,316 priority patent/US9104874B2/en
Priority to CN201080057935.3A priority patent/CN102792306B/zh
Publication of FR2954547A1 publication Critical patent/FR2954547A1/fr
Application granted granted Critical
Publication of FR2954547B1 publication Critical patent/FR2954547B1/fr
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/144Detection or countermeasures against botnets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)
  • Small-Scale Networks (AREA)
  • Computer And Data Communications (AREA)
FR0959335A 2009-12-21 2009-12-21 Procede de detection d?un detournement de ressources informatiques Expired - Fee Related FR2954547B1 (fr)

Priority Applications (7)

Application Number Priority Date Filing Date Title
FR0959335A FR2954547B1 (fr) 2009-12-21 2009-12-21 Procede de detection d?un detournement de ressources informatiques
JP2012545374A JP5699162B2 (ja) 2009-12-21 2010-12-08 コンピュータ資源の乗っ取りを検出する方法
PCT/FR2010/052639 WO2011083226A1 (fr) 2009-12-21 2010-12-08 Procédé de détection d'un détournement de ressources informatiques
EP10805798A EP2517139A1 (fr) 2009-12-21 2010-12-08 Procédé de détection d'un détournement de ressources informatiques
KR1020127016005A KR101443472B1 (ko) 2009-12-21 2010-12-08 컴퓨터 리소스의 하이재킹 검출 방법
US13/515,316 US9104874B2 (en) 2009-12-21 2010-12-08 Method for detecting the hijacking of computer resources
CN201080057935.3A CN102792306B (zh) 2009-12-21 2010-12-08 用于检测计算机资源劫持的方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0959335A FR2954547B1 (fr) 2009-12-21 2009-12-21 Procede de detection d?un detournement de ressources informatiques

Publications (2)

Publication Number Publication Date
FR2954547A1 FR2954547A1 (fr) 2011-06-24
FR2954547B1 true FR2954547B1 (fr) 2012-10-12

Family

ID=42291509

Family Applications (1)

Application Number Title Priority Date Filing Date
FR0959335A Expired - Fee Related FR2954547B1 (fr) 2009-12-21 2009-12-21 Procede de detection d?un detournement de ressources informatiques

Country Status (7)

Country Link
US (1) US9104874B2 (fr)
EP (1) EP2517139A1 (fr)
JP (1) JP5699162B2 (fr)
KR (1) KR101443472B1 (fr)
CN (1) CN102792306B (fr)
FR (1) FR2954547B1 (fr)
WO (1) WO2011083226A1 (fr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9191399B2 (en) * 2012-09-11 2015-11-17 The Boeing Company Detection of infected network devices via analysis of responseless outgoing network traffic
US9407647B2 (en) * 2014-03-11 2016-08-02 Vectra Networks, Inc. Method and system for detecting external control of compromised hosts
US9396332B2 (en) 2014-05-21 2016-07-19 Microsoft Technology Licensing, Llc Risk assessment modeling
CN108737327B (zh) * 2017-04-14 2021-11-16 阿里巴巴集团控股有限公司 拦截恶意网站的方法、装置、系统和存储器
US11159538B2 (en) * 2018-01-31 2021-10-26 Palo Alto Networks, Inc. Context for malware forensics and detection
US10764309B2 (en) 2018-01-31 2020-09-01 Palo Alto Networks, Inc. Context profiling for malware detection
US11956212B2 (en) 2021-03-31 2024-04-09 Palo Alto Networks, Inc. IoT device application workload capture
US12212583B2 (en) 2021-09-30 2025-01-28 Palo Alto Networks, Inc. IoT security event correlation

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100856149B1 (ko) * 1999-11-26 2008-09-03 네테카 인코포레이티드 전자 메일 서버 및 전자 메일 통신을 용이하게 하기 위한 방법
US7096498B2 (en) * 2002-03-08 2006-08-22 Cipher Trust, Inc. Systems and methods for message threat management
WO2005088938A1 (fr) * 2004-03-10 2005-09-22 Enterasys Networks, Inc. Procede de manipulation par symetrie de trafic de reseau avec confidentialite d'information
WO2005091107A1 (fr) * 2004-03-16 2005-09-29 Netcraft Limited Composant de securite pour application navigateur sur internet et procede et dispositif s'y rapportant
WO2007075813A2 (fr) 2005-12-23 2007-07-05 Advanced Digital Forensic Solutions, Inc. Systemes et procedes d'identification, partage, et gestion de donnees a l'echelle d'entreprises et procedes de recherche de donnees legistes
WO2007081960A2 (fr) * 2006-01-10 2007-07-19 Advanced Digital Forensic Solutions, Inc. Systèmes et procédés d'identification, partage et gestion des données à l'échelle de l'entreprise dans un contexte commercial
JP4287456B2 (ja) * 2006-10-26 2009-07-01 株式会社東芝 サービス不能攻撃を防止するサーバ装置、方法およびプログラム
US8352738B2 (en) * 2006-12-01 2013-01-08 Carnegie Mellon University Method and apparatus for secure online transactions
US8312536B2 (en) * 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
US8020207B2 (en) 2007-01-23 2011-09-13 Alcatel Lucent Containment mechanism for potentially contaminated end systems
US8677479B2 (en) * 2007-04-16 2014-03-18 Microsoft Corporation Detection of adversaries through collection and correlation of assessments
KR20090037540A (ko) * 2007-10-12 2009-04-16 한국정보보호진흥원 클라이언트 애플리케이션을 탐지하기 위한 복합형 네트워크탐지 방법
US7836142B2 (en) * 2008-02-22 2010-11-16 Time Warner Cable, Inc. System and method for updating a dynamic domain name server
US7921212B2 (en) * 2008-10-14 2011-04-05 At&T Intellectual Property I, L.P. Methods and apparatus to allocate bandwidth between video and non-video services in access networks

Also Published As

Publication number Publication date
US20120272316A1 (en) 2012-10-25
KR20120084806A (ko) 2012-07-30
FR2954547A1 (fr) 2011-06-24
CN102792306A (zh) 2012-11-21
JP5699162B2 (ja) 2015-04-08
CN102792306B (zh) 2016-05-25
US9104874B2 (en) 2015-08-11
EP2517139A1 (fr) 2012-10-31
WO2011083226A1 (fr) 2011-07-14
JP2013515419A (ja) 2013-05-02
KR101443472B1 (ko) 2014-09-22

Similar Documents

Publication Publication Date Title
EP2920688A4 (fr) Procédé et dispositif permettant de détecter une url malveillante
FR2979736B1 (fr) Procede de detection de messages sia
FR2954547B1 (fr) Procede de detection d?un detournement de ressources informatiques
GB2491987B (en) Method of searching data for objects identified by object detection
EP2837135A4 (fr) Système de détection de ressources informatiques
FR2989465B1 (fr) Procede de determination de parametres geomecaniques d'un echantillon de roche
BR112013012194A2 (pt) aparelho de detecção para a detecção de um objeto e programa de computador para a detecção de um objeto
EP2696332A4 (fr) Système de détection de présence, procédé de détection de présence et programme correspondant
EP2603363A4 (fr) Procédé et appareil de détection de recul
BRPI1008199A2 (pt) sistema de detecção capacitiva para detectar um objeto, método de deteção capacitiva para detectar um objeto e programa de computador para detectar um objeto
EP2700009A4 (fr) Analyse de messages électroniques pour la détection de logiciels malveillants
HK1199761A1 (zh) 用於檢測核小體的方法
BRPI0916173A2 (pt) método para detectar a queda de um objeto, aparelho para detectar a queda de um objeto e produto de programa de computador
BRPI0913494A2 (pt) sistema de detecção de queda e método de operação de um sistema de detecção de queda
FR2969359B1 (fr) Appareil de detection de toucher bimode et procede associe.
EP2407081A4 (fr) Système de détection de position et procédé de détection de position
EP2636195A4 (fr) Appareil et procédé de détection de signaux rfid
ZA201401130B (en) Methods and systems for detecting an analyte in a sample
EP2839296A4 (fr) Procédé pour détecter et quantifier des analytes en utilisant des dispositifs à base de papier tridimensionnels
EP2658691A4 (fr) Procédé, programme informatique et appareil permettant de déterminer un emplacement de saisie
EP2754393A4 (fr) Procédé et dispositif de détection de somnolence
GB2499872B (en) Method and apparatus for detecting and classifying signals
GB201410501D0 (en) Providing a malware analysis using a secure malware detection process
GB201120965D0 (en) System and method for detection of analytes
GB201115120D0 (en) Method and device for detecting an analyte

Legal Events

Date Code Title Description
GC Lien (pledge) constituted

Effective date: 20130923

RG Lien (pledge) cancelled

Effective date: 20141016

CA Change of address

Effective date: 20150521

CA Change of address

Effective date: 20150521

PLFP Fee payment

Year of fee payment: 7

PLFP Fee payment

Year of fee payment: 8

ST Notification of lapse

Effective date: 20180831