Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_26339c0363ec72621ceb90dbf459a8d8 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_c55fc2cbc0f351a95125a7c986cfae89 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_25000231996838c46266e72bec5734ab |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1408 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-56 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-145 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-55 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-566 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F15-16 |
filingDate |
2004-11-18-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_5d38f9ced705f4c83ef100bc7ca76ef0 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_71cd669f5da50ad4ea0261fddd0b1b68 |
publicationDate |
2005-07-14-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
WO-2005062707-A2 |
titleOfInvention |
Universal worm catcher |
abstract |
A method for detecting malicious code in a stream of data traffic input (400) to a gateway in a data network by monitoring for suspicious data in the stream of data traffic (407). Upon detecting the suspicious data, an attempt is made to disassemble the suspicious data (403) and a threat weight is assigned for each instruction. The attempt to disassemble is initiated at initial instructions each with a different offset within the suspicious portion of data. The threat weights are accumulated respectively for each branch option in the disassembled code (403), producing respectively an accumulated threat weight for each branch option. When the accumulated threat weight exceeds a previously defined threshold level, an alert is generated and/or traffic is blocked from the source of the malicious code. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9430452-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10282238-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-2223255-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-2473944-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-109068305-B http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-109068305-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-2223255-A4 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9830306-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-2473944-A4 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9830305-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10353751-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10248415-B2 |
priorityDate |
2003-12-30-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |