DETECTION AND FILTERING OF MALWARE BASED ON TRAFFIC OBSERVATIONS MADE IN A DISTRIBUTED MOBILE TRAFFIC MANAGEMENT SYSTEM
First Claim
Patent Images
1. A method of detecting malicious traffic on a mobile device, the method, comprising:
- collecting information about a request or information about a response to the request initiated at the mobile device;
using the information collected about the request or the response to identify or to detect malicious traffic;
wherein the information collected about the request or response received for the request initiated at the mobile device is further used to determine cacheability of the response.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for detections and filtering of malware based on traffic observations made in a distributed mobile traffic management system are disclosed. One embodiment of a method which can be implemented on a system includes, collecting information about a request or information about a response to the request initiated at the mobile device and using the information collected about the request or the response to identify or to detect malicious traffic. The information that is collected about the request or response received for the request initiated at the mobile device can be further used to determine cacheability of the response.
-
Citations
30 Claims
-
1. A method of detecting malicious traffic on a mobile device, the method, comprising:
-
collecting information about a request or information about a response to the request initiated at the mobile device; using the information collected about the request or the response to identify or to detect malicious traffic; wherein the information collected about the request or response received for the request initiated at the mobile device is further used to determine cacheability of the response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for mobile network malware detection, the system, comprising:
-
means for, tracking a request generated by a client to identify associated locations of the request, means for, analyzing the associated locations of the request generated by the client; means for, blocking the request and other requests of the client in response to determining that the requests constitute malicious traffic or potentially malicious traffic based on the associated locations of the request; means for, notifying a network service provider of the malicious or potentially malicious traffic. - View Dependent Claims (17, 18, 19)
-
-
20. A system for malware detection and filtering on a mobile device, the method, comprising:
-
a proxy server able to use information about requests initiated at the mobile device, to determine whether any of incoming or outgoing traffic from a mobile device constitute malicious or potentially malicious traffic; wherein, the proxy server blocks the malicious or potentially malicious traffic that is incoming to the mobile device; wherein, the proxy server also manages cache on the mobile device; wherein, the proxy server is physically distinct from the mobile device and able to communicate wirelessly with the mobile device. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification