Apparatus and methods for shortening user exposure to malicious websites
First Claim
1. A method for enhancing computer security, the method comprising:
- receiving a first dataset including a first plurality of websites that have been identified as potentially including malicious software by an application running on a user'"'"'s computer device and a second dataset including a second plurality of websites, the second plurality of websites comprising whitelisted websites;
executing a first set of instructions, the first set of instructions including;
accessing each of the first plurality of websites and, based on the accessing, assigning a confidence score to each of the websites;
executing a second set of instructions, the second set of instructions including;
creating a third dataset including a third list of websites having a URL that includes a predetermined term; and
removing from the third dataset the second plurality of websites to create a modified third dataset;
extracting from the first dataset all websites having an assigned confidence score greater than a predetermined value;
combining the extracted data from the first dataset and the modified third dataset to create a fourth dataset including a fourth list of potentially malicious websites;
initiating a take-down procedure for the fourth list of potentially malicious websites by sending a take-down request to one or more remote servers to take down the fourth list of potentially malicious websites, each of the one or more remote servers hosting one or more websites included in the fourth dataset; and
sending a blocking instruction to a central server, the blocking instruction initiating a browser-based blocking of the fourth list of websites.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for enhancing computer security is provided. The method may include receiving a first dataset including a first plurality of web sites and a second dataset including a second plurality of web sites. The second plurality of web sites may comprise whitelisted websites. The method may include executing a first set of instructions, the first set of instructions including accessing each of the first plurality of websites and, based on the accessing, assigning a confidence score to each of the websites. The method may also include executing a second set of instructions. The second set of instructions may include creating a third dataset including a third list of web sites having a URL that includes a predetermined term. The second set of instructions may also include removing from the third dataset the second plurality of websites to create a modified third dataset.
-
Citations
18 Claims
-
1. A method for enhancing computer security, the method comprising:
-
receiving a first dataset including a first plurality of websites that have been identified as potentially including malicious software by an application running on a user'"'"'s computer device and a second dataset including a second plurality of websites, the second plurality of websites comprising whitelisted websites; executing a first set of instructions, the first set of instructions including; accessing each of the first plurality of websites and, based on the accessing, assigning a confidence score to each of the websites; executing a second set of instructions, the second set of instructions including; creating a third dataset including a third list of websites having a URL that includes a predetermined term; and removing from the third dataset the second plurality of websites to create a modified third dataset; extracting from the first dataset all websites having an assigned confidence score greater than a predetermined value; combining the extracted data from the first dataset and the modified third dataset to create a fourth dataset including a fourth list of potentially malicious websites; initiating a take-down procedure for the fourth list of potentially malicious websites by sending a take-down request to one or more remote servers to take down the fourth list of potentially malicious websites, each of the one or more remote servers hosting one or more websites included in the fourth dataset; and sending a blocking instruction to a central server, the blocking instruction initiating a browser-based blocking of the fourth list of websites. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for enhancing computer security, the method comprising:
-
receiving a first dataset including a first plurality of websites that have been identified as potentially including malicious software by an application running on a user'"'"'s computer device and a second dataset including a second plurality of websites, the second plurality of websites comprising whitelisted websites; executing a first set of instructions, the first set of instructions including; modifying the first dataset by removing all websites from the first dataset that are included in the second plurality of websites; and accessing each of the plurality of websites included in the modified first dataset and, based on the accessing, assigning a confidence score to each of the websites; executing a second set of instructions, the second set of instructions including; creating a third dataset including a third list of websites having a URL, that includes a predetermined term; and removing from the third dataset the second plurality of websites to create a modified third dataset; extracting from the modified first dataset all websites having an assigned confidence score greater than a predetermined value; combining the extracted data from the modified first dataset and the modified third dataset to create a fourth dataset including a fourth list of potentially malicious websites; initiating a take-down procedure for the fourth list of potentially malicious websites sending a take-down request to one or more remote servers to take down the fourth list of potentially malicious websites, each of the one or more remote servers hosting one or more websites included in the fourth dataset; and sending a blocking instruction to a central server, the blocking instruction initiating a browser-based blocking of the fourth list of websites. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification