[go: up one dir, main page]

WO2007101995A3 - Detecting malicious communication activity in communication networks - Google Patents

Detecting malicious communication activity in communication networks Download PDF

Info

Publication number
WO2007101995A3
WO2007101995A3 PCT/GB2007/000781 GB2007000781W WO2007101995A3 WO 2007101995 A3 WO2007101995 A3 WO 2007101995A3 GB 2007000781 W GB2007000781 W GB 2007000781W WO 2007101995 A3 WO2007101995 A3 WO 2007101995A3
Authority
WO
WIPO (PCT)
Prior art keywords
network
user devices
data
communication
detecting malicious
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/GB2007/000781
Other languages
French (fr)
Other versions
WO2007101995A2 (en
Inventor
Isabelle Ravot
Eric Gauthier
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
Orange SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orange SA filed Critical Orange SA
Priority to EP07731991A priority Critical patent/EP1991940A2/en
Publication of WO2007101995A2 publication Critical patent/WO2007101995A2/en
Publication of WO2007101995A3 publication Critical patent/WO2007101995A3/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for detecting malicious communication activity between user devices (22, 24, 26, 28) in an electronic communications network (30), said method comprising the steps of : receiving source and destination data for a first plurality of electronic communications made between user devices in said network; storing contact data for a plurality of user devices in said network, the contents of said contact data including identifying data for user devices in said network, said identifying data being derived from said received data; receiving further source and destination data for a second plurality of electronic communications made between user devices in said network; and analysing said further received data and said stored contact data for communication patterns indicative of malicious electronic communication activity between user devices in said network.
PCT/GB2007/000781 2006-03-07 2007-03-07 Detecting malicious communication activity in communication networks Ceased WO2007101995A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP07731991A EP1991940A2 (en) 2006-03-07 2007-03-07 Detecting malicious communication activity in communication networks

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0604605.6 2006-03-07
GB0604605A GB2436190B (en) 2006-03-07 2006-03-07 Detecting malicious communication activity in communications networks

Publications (2)

Publication Number Publication Date
WO2007101995A2 WO2007101995A2 (en) 2007-09-13
WO2007101995A3 true WO2007101995A3 (en) 2007-11-01

Family

ID=36241154

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2007/000781 Ceased WO2007101995A2 (en) 2006-03-07 2007-03-07 Detecting malicious communication activity in communication networks

Country Status (3)

Country Link
EP (1) EP1991940A2 (en)
GB (1) GB2436190B (en)
WO (1) WO2007101995A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323144B (en) * 2014-07-16 2020-05-29 腾讯科技(深圳)有限公司 Message abnormity prompting method and system in instant messaging

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1280039A2 (en) * 2001-07-26 2003-01-29 Networks Associates Technology, Inc. Detecting e-mail propagated malware
US20030154394A1 (en) * 2002-02-13 2003-08-14 Levin Lawrence R. Computer virus control
US6763462B1 (en) * 1999-10-05 2004-07-13 Micron Technology, Inc. E-mail virus detection utility

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1280298A1 (en) * 2001-07-26 2003-01-29 BRITISH TELECOMMUNICATIONS public limited company Method and apparatus of detecting network activity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6763462B1 (en) * 1999-10-05 2004-07-13 Micron Technology, Inc. E-mail virus detection utility
EP1280039A2 (en) * 2001-07-26 2003-01-29 Networks Associates Technology, Inc. Detecting e-mail propagated malware
US20030154394A1 (en) * 2002-02-13 2003-08-14 Levin Lawrence R. Computer virus control

Also Published As

Publication number Publication date
WO2007101995A2 (en) 2007-09-13
GB0604605D0 (en) 2006-04-19
GB2436190A (en) 2007-09-19
GB2436190B (en) 2011-02-02
EP1991940A2 (en) 2008-11-19

Similar Documents

Publication Publication Date Title
WO2007050872A3 (en) A method and apparatus for processing access related indications by an access network in idle state in wireless communication systems
WO2007089217A3 (en) Network discovery mechanisms
WO2006062915A3 (en) System and method for vital communications connectivity
AU2003250418A1 (en) A data network, user terminal and method for providing recommendations
WO2005104446A3 (en) Presence-based management in a communication network
WO2008048200A3 (en) Lan-based uma network controller with proxy connection
WO2007067848A3 (en) Service provider subsidy lock
WO2009057730A3 (en) System and method for selection of security algorithms
WO2008001344A3 (en) One way secure link
WO2008045656A3 (en) Upgrading mesh access points in a wireless mesh network
WO2008076163A3 (en) Techniques for managing security in next generation communication networks
WO2007101718A3 (en) A navigation device, server and method for communicating therebetween
TW200704012A (en) Apparatus and methods for determining connection quality of a wireless device on a wireless communications networks
WO2004088952A3 (en) Intelligent integrated network security device
TW200635396A (en) Method and apparatus for communicating scheduling information from a ue to a radio access network
WO2007008574A3 (en) Methods and devices for location determination and location-based services in wireless wide area networks, wireless local area networks and wireless personal area networks
WO2009060417A3 (en) Method, apparatus and computer program product for providing data management in a p2p network
WO2004100428A3 (en) Managing contacts in a communication network
FI20021020A7 (en) System, communication network and method for transmitting data
WO2010023432A8 (en) Method of providing data communication to a vehicle
WO2007081727A3 (en) Selecting application session services to process packet data streams based on profile information
EP1881723A3 (en) Call routing
WO2010021902A3 (en) Method and apparatus for multiple channel access and nav recovery
WO2001093069A3 (en) Internet communication
WO2010026430A3 (en) Mobile communications methods and associated systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2007731991

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE