Automated software installation using a click area prediction model

    公开(公告)号:US10996937B2

    公开(公告)日:2021-05-04

    申请号:US15332507

    申请日:2016-10-24

    摘要: A device may receive an instruction to automatically install a program using a click area prediction model. The click area prediction model may be associated with predicting a click area of a user interface that, when selected, causes a program installation procedure to proceed. The device may identify an installation user interface associated with installing the program. The device may determine a group of regions included in the installation user interface. The device may identify sets of features associated with the group of regions. The device may determine, based on the sets of features and the click area prediction model, a group of scores associated with the group of regions. The device may identify a particular region as a predicted click area based on the group of scores. The device may select the predicted click area to attempt to cause the program installation procedure to proceed.

    Providing policy information on an existing communication channel

    公开(公告)号:US10110496B2

    公开(公告)日:2018-10-23

    申请号:US14674787

    申请日:2015-03-31

    摘要: A device may receive or generate a message for routing to a destination on a communication channel. The communication channel may have been established between a source and the destination. The device may perform a first determination of policy information related to at least one of the message, the destination, or the source of the message. The policy information may describe an action for a network device to perform. The device may associate a policy token with the message. The policy token may describe or identify the policy information. The device may provide the message with the associated policy token to the network device on the communication channel to cause the network device to perform a second determination of the policy information based on the policy token, to perform the action described by the policy information, and to provide the message on the communication channel.

    Detecting keylogging
    3.
    发明授权

    公开(公告)号:US10089468B2

    公开(公告)日:2018-10-02

    申请号:US15620350

    申请日:2017-06-12

    摘要: A device may detect or emulate a sequence of keystrokes to be used to detect a keystroke logger application. The device may determine a sequence of characters associated with the sequence of keystrokes. The sequence of characters may correspond to the sequence of keystrokes or a portion of the sequence of keystrokes. The device may search a memory for the sequence of characters. The device may determine that the sequence of characters is stored in the memory based on searching the memory for the sequence of characters. The device may perform an action to counteract the keystroke logger application based on determining that the sequence of characters is stored in the memory.

    Detecting and breaking CAPTCHA automation scripts and preventing image scraping

    公开(公告)号:US09813441B2

    公开(公告)日:2017-11-07

    申请号:US14972552

    申请日:2015-12-17

    发明人: Kyle Adams

    摘要: A security device may receive a request from a client device and intended for a server device. The security device may identify the request as being associated with a malicious activity. The malicious activity may include one or more undesirable tasks directed to the server device. The security device may generate a challenge-response test based on identifying the request as being associated with the malicious activity. The challenge-response test may be generated using one or more construction techniques. The security device may provide the challenge-response test to the client device. The security device may receive, from the client device, a proposed solution to the challenge-response test. The security device may identify the proposed solution as being generated using an optical character recognition (OCR) program. The security device may protect the server device from the client device based on identifying the solution as being generated using an OCR program.

    Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes
    6.
    发明授权
    Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes 有权
    使用远程访问连接工具在客户端设备上确认恶意软件感染,以基于模糊散列来识别恶意文件

    公开(公告)号:US09594906B1

    公开(公告)日:2017-03-14

    申请号:US14675274

    申请日:2015-03-31

    IPC分类号: G06F21/56 G06F21/53 H04L29/06

    摘要: A device may receive a trigger to determine whether one or more client devices, of a set of client devices, are infected by a malicious file. The device may generate file identification information associated with the malicious file based on receiving the trigger to determine whether the one or more client devices are infected by the malicious file. The device may obtain remote access to the one or more client devices using a connection tool based on receiving the trigger to determine whether the one or more client devices are infected by the malicious file. The device may obtain information, associated with the one or more client devices, using the remote access. The device may provide information indicating whether the one or more client devices are infected by the malicious file based on the file identification information and the information associated with the one or more client devices.

    摘要翻译: 设备可以接收触发器以确定一组客户端设备中的一个或多个客户端设备是否被恶意文件感染。 该装置可以基于接收到触发来生成与恶意文件相关联的文件识别信息,以确定一个或多个客户机设备是否被恶意文件感染。 所述设备可以基于接收到所述触发来使用连接工具来获得对所述一个或多个客户端设备的远程访问,以确定所述一个或多个客户端设备是否被所述恶意文件感染。 设备可以使用远程访问获得与一个或多个客户端设备相关联的信息。 设备可以基于文件标识信息和与一个或多个客户端设备相关联的信息来提供指示一个或多个客户端设备是否被恶意文件感染的信息。

    Analyzing a password-protected file for malware
    7.
    发明授权
    Analyzing a password-protected file for malware 有权
    分析恶意软件的受密码保护的文件

    公开(公告)号:US09594902B2

    公开(公告)日:2017-03-14

    申请号:US14674262

    申请日:2015-03-31

    摘要: A device may receive a password-protected file to be accessed for analysis. The device may identify a contextual term, associated with the password-protected file, to be used as a password to attempt to access the password-protected file. The contextual term may be identified based on at least one of: metadata associated with the password-protected file, metadata associated with a source from which the password-protected file is received, or text associated with the source from which the password-protected file is received. The device may apply the contextual term as the password to attempt to access the password-protected file.

    摘要翻译: 设备可能会收到受密码保护的文件进行访问以进行分析。 设备可以标识与密码保护的文件相关联的上下文术语,以用作密码来尝试访问受密码保护的文件。 可以基于以下中的至少一个来识别上下文术语:与受密码保护的文件相关联的元数据,与从其接收受密码保护的文件的源相关联的元数据,或与该密码保护文件的来源相关联的文本 被收到。 该设备可以应用上下文术语作为密码来尝试访问受密码保护的文件。

    Identifying malicious devices within a computer network

    公开(公告)号:US09497163B2

    公开(公告)日:2016-11-15

    申请号:US14984884

    申请日:2015-12-30

    IPC分类号: H04L29/06 G06F21/55 H04L29/08

    摘要: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.

    Limiting the efficacy of a denial of service attack by increasing client resource demands
    9.
    发明授权
    Limiting the efficacy of a denial of service attack by increasing client resource demands 有权
    通过增加客户资源需求来限制拒绝服务攻击的功效

    公开(公告)号:US09392018B2

    公开(公告)日:2016-07-12

    申请号:US14042221

    申请日:2013-09-30

    摘要: A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack, a computationally expensive problem to be provided to the client device, where the computationally expensive problem requires a computation by the client device to solve the computationally expensive problem. The device may instruct the client device to provide a solution to the computationally expensive problem. The device may receive, from the client device, the solution to the computationally expensive problem. The device may selectively provide the client device with access to the resource based on the solution.

    摘要翻译: 设备可能会检测到攻击。 设备可以从客户端设备接收对资源的请求。 该设备可以基于检测到攻击来确定要提供给客户端设备的计算上昂贵的问题,其中计算上昂贵的问题需要客户端设备的计算来解决计算上昂贵的问题。 该设备可以指示客户端设备为计算上昂贵的问题提供解决方案。 设备可以从客户端设备接收解决方案到计算上昂贵的问题。 该设备可以基于该解决方案选择性地向客户端设备提供对资源的访问。

    Preventing extraction of secret information over a compromised encrypted connection
    10.
    发明授权
    Preventing extraction of secret information over a compromised encrypted connection 有权
    防止在受损的加密连接上提取秘密信息

    公开(公告)号:US09386104B2

    公开(公告)日:2016-07-05

    申请号:US14024336

    申请日:2013-09-11

    IPC分类号: G06F15/16 H04L29/08 H04L29/06

    CPC分类号: H04L67/142 H04L63/1475

    摘要: A device may receive, from a first device, a first message that includes a first random cookie and a session cookie. The device may provide the first message to a second device. The device may receive, from the second device, a second message that includes a response to the first message. The device may generate a second random cookie. The second random cookie may be different from the first random cookie. The device may provide, to the first device, the second random cookie, the session cookie, and the response.

    摘要翻译: 设备可以从第一设备接收包括第一随机cookie和会话cookie的第一消息。 设备可以向第二设备提供第一消息。 设备可以从第二设备接收包括对第一消息的响应的第二消息。 该设备可以生成第二个随机cookie。 第二个随机cookie可能与第一个随机cookie不同。 设备可以向第一设备提供第二随机cookie,会话cookie和响应。