Invention Grant
US08813236B1 Detecting malicious endpoints using network connectivity and flow information 有权
使用网络连接和流量信息检测恶意端点

Detecting malicious endpoints using network connectivity and flow information
Abstract:
A method for detecting hidden malicious network nodes. Starting from a pool of seed nodes that have previously been identified as malicious, a two-phase score propagation algorithm is employed to propagate threat scores from the seeded nodes to other nodes in an IP-address connectivity graph. Nodes with high threat score after propagation are declared to be malicious.
Information query
Patent Agency Ranking
0/0