System and method for blocking persistent malware

作者: Michael Wood

DOI:

关键词: Kernel (image processing)Computer scienceTrusted ComputingSoftwareMalwareFirewall (construction)Network packetComputer network

摘要: Systems and methods for allowing blocking data packets sent to from browser software applications non-browser operated on a computing device are described. The systems can use whitelisting based the maker of application being trusted source or consensus by one more devices that connections made an URL open in correct trusted. system uses firewall block web addresses not owned application, devices, blocked selection user device. also include health monitor engine ensure kernel drive is operational disabled malware.

参考文章(18)
Steve Smith, Vlad Serban, Andy Walker, Greg Ogorek, None, Method and system for misuse detection ,(2015)
Lixin Li, James Edward Just, A diversity-based security system and method ,(2007)
Bill Joll, Keith Rhodes, James Deerman, Cyber Behavior Analysis and Detection Method, System and Architecture ,(2012)
Carey S. Nachenberg, IP-based blocking of malware ,(2010)
David Abzarian, Gerardo Diaz Cuellar, Eran Yariv, Incorporating network connection security levels into firewall rules ,(2007)
Leslie J. Arrow, Henk J. Bots, William E. Hunt, Mark R. Hoke, Bruce T. Huntley, Translating packet addresses based upon a user identifier ,(1998)
Robert L. Rounthwaite, Anthony P. Penta, Geoffrey J Hulten, Manav Mishra, Paul S Rehfuss, Kenneth G Richards, Aaron H Averbuch, Roderict C. Deyo, Joshua T. Goodman, Phishing Detection, Prevention, and Notification ,(2005)
Michael Price, Anthony John Bettini, Domingo J. Guerra, Kevin Watkins, In-line filtering of insecure or unwanted mobile device software components or communications ,(2013)