Detecting application behavior

作者: Antti Tikkanen , Daavid Hentunen

DOI:

关键词:

摘要: There is provided a method including generating, by security application executed in processing device, an list one or more applications which are currently running the device; identifying at least network address fulfilling predetermined criteria; determining of criteria has been connected to device within predefined time period; and providing post-processing entity with indication on period.

参考文章(19)
Sang-lg Rho, Ho-Cheol Lee, Kyu-Ho Cho, Jun-Seok Hong, Seung-Min Baek, Jae-Jin Kim, Jong-Hun Kim, Apparatus and method for identifying application using packet in communication system ,(2013)
Angela Mele Anderson, Kristofer Hellick Reierson, Application execution in a restricted application execution environment ,(2011)
Michael Grant Kirkup, Michael Kenneth Brown, Michael Stephen Brown, Method and apparatus for processing digitally signed messages to determine address mismatches ,(2005)
Zhenyu Guo, Junfeng Yang, Mao Yang, Lintao Zhang, Lidong Zhou, Xuezheng Liu, Jian Tang, Distributed system checker ,(2008)
Neeraj Garg, Bimal Mehta, Deepak Rao, Aidan Downes, Rajesh Peddibhotla, Sukumar Rayan, Poornima Siddabattuni, Amrut Kale, J V Devi, Rahul Thatte, Vadim Eydelman, Ashish Srivastava, Suvarna Singh, Throttling of rogue entities to push notification servers ,(2012)