WO2006065882A3 - System and method for deterring rogue users from attacking protected legitimate users - Google Patents

System and method for deterring rogue users from attacking protected legitimate users Download PDF

Info

Publication number
WO2006065882A3
WO2006065882A3 PCT/US2005/045200 US2005045200W WO2006065882A3 WO 2006065882 A3 WO2006065882 A3 WO 2006065882A3 US 2005045200 W US2005045200 W US 2005045200W WO 2006065882 A3 WO2006065882 A3 WO 2006065882A3
Authority
WO
WIPO (PCT)
Prior art keywords
rogue
rus
users
plu
complying
Prior art date
Application number
PCT/US2005/045200
Other languages
French (fr)
Other versions
WO2006065882A2 (en
Inventor
Eran Reshef
Amir Hirsh
Original Assignee
Blue Security Inc
Eran Reshef
Amir Hirsh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/302,508 external-priority patent/US20060161989A1/en
Priority claimed from US11/302,507 external-priority patent/US7756933B2/en
Application filed by Blue Security Inc, Eran Reshef, Amir Hirsh filed Critical Blue Security Inc
Publication of WO2006065882A2 publication Critical patent/WO2006065882A2/en
Publication of WO2006065882A3 publication Critical patent/WO2006065882A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Abstract

An active deterrence method and system (100) deter rogue cyber activity (201) targeting one or more protected legitimate users (PLUs) (104a-104n). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings (206) to one or more rogue users (RUs) (106a-106n) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms (209) against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
PCT/US2005/045200 2004-12-13 2005-12-13 System and method for deterring rogue users from attacking protected legitimate users WO2006065882A2 (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US63580204P 2004-12-13 2004-12-13
US60/635,802 2004-12-13
US11/302,508 2005-12-12
US11/302,508 US20060161989A1 (en) 2004-12-13 2005-12-12 System and method for deterring rogue users from attacking protected legitimate users
US11/302,507 US7756933B2 (en) 2004-12-13 2005-12-12 System and method for deterring rogue users from attacking protected legitimate users
US11/302,507 2005-12-12

Publications (2)

Publication Number Publication Date
WO2006065882A2 WO2006065882A2 (en) 2006-06-22
WO2006065882A3 true WO2006065882A3 (en) 2007-11-15

Family

ID=36588495

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/045200 WO2006065882A2 (en) 2004-12-13 2005-12-13 System and method for deterring rogue users from attacking protected legitimate users

Country Status (1)

Country Link
WO (1) WO2006065882A2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7540021B2 (en) 2000-04-24 2009-05-26 Justin Page System and methods for an identity theft protection bot
CN102722680B (en) 2012-06-07 2014-11-05 腾讯科技(深圳)有限公司 Method and system for removing rogue programs
CN114089711B (en) * 2022-01-21 2022-05-17 深圳艾灵网络有限公司 Industrial equipment control management method, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6330590B1 (en) * 1999-01-05 2001-12-11 William D. Cotten Preventing delivery of unwanted bulk e-mail
US20020073338A1 (en) * 2000-11-22 2002-06-13 Compaq Information Technologies Group, L.P. Method and system for limiting the impact of undesirable behavior of computers on a shared data network
US20040003283A1 (en) * 2002-06-26 2004-01-01 Goodman Joshua Theodore Spam detector with challenges
US20040243844A1 (en) * 2001-10-03 2004-12-02 Reginald Adkins Authorized email control system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6330590B1 (en) * 1999-01-05 2001-12-11 William D. Cotten Preventing delivery of unwanted bulk e-mail
US20020073338A1 (en) * 2000-11-22 2002-06-13 Compaq Information Technologies Group, L.P. Method and system for limiting the impact of undesirable behavior of computers on a shared data network
US20040243844A1 (en) * 2001-10-03 2004-12-02 Reginald Adkins Authorized email control system
US20040003283A1 (en) * 2002-06-26 2004-01-01 Goodman Joshua Theodore Spam detector with challenges

Also Published As

Publication number Publication date
WO2006065882A2 (en) 2006-06-22

Similar Documents

Publication Publication Date Title
EP1708114A3 (en) Aggregating the knowledge base of computer systems to proactively protect a computer from malware
WO2007084947A3 (en) Systems and methods for neutralizing unauthorized attempts to monitor user activity
EP2068215A3 (en) Apparatus and methods for protecting safety instrumented process control systems from intrusions
WO2007009009A3 (en) Systems and methods for identifying sources of malware
WO2012061663A3 (en) Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems
NO20052403D0 (en) System and method for intrusion detection.
EP1934925A4 (en) Identity theft and fraud protection system and method
WO2007005524A3 (en) Systems and methods for identifying malware distribution sites
WO2007117635A3 (en) Malware modeling detection system and method for mobile platforms
WO2006049841A3 (en) Inventory management-based computer vulnerability resolution system
CN108353088A (en) Advanced duration threat detection
WO2008033236A3 (en) System and methods for an identity theft protection bot
SG10201606947UA (en) Method and System for Identity Theft Prevention, Detection and Victim Assistance
ATE532159T1 (en) METHOD FOR PROTECTING MOVABLE PROPERTY, IN PARTICULAR A VEHICLE, AGAINST UNAUTHORIZED USE
WO2007089237A3 (en) Vacation mode security system and method
ATE490447T1 (en) SYSTEM AND METHOD FOR PROTECTING AIRCRAFT
SG119237A1 (en) An intrusion protection system and method
WO2006065882A3 (en) System and method for deterring rogue users from attacking protected legitimate users
WO2007041625A3 (en) Vehicle incursion inhibitors
FR2884088B1 (en) METHOD AND CRYPTOGRAPHIC DEVICE FOR PROTECTING THE LOGIC OF PUBLIC KEYS AGAINST FAULT ATTACKS
Heyns Extrajudicial, summary or arbitrary executions
WO2010144105A3 (en) Integrated airport domain awareness response system, system for ground-based transportable defense of airports against manpads, and methods
EP1962217A3 (en) Self-defensive protected software with suspended latent license enforcement
GB2404262B (en) System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
DE602004029829D1 (en) METHOD AND SYSTEM FOR RECOGNIZING TRY OF JEALAGING ACTIONS AGAINST A MONITORED INSTALLATION

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05854000

Country of ref document: EP

Kind code of ref document: A2