The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 23, 2015

Filed:

Dec. 09, 2010
Applicants:

Wei Wang, Hoboken, NJ (US);

Gang Xu, Piscataway, NJ (US);

Inventors:

Wei Wang, Hoboken, NJ (US);

Gang Xu, Piscataway, NJ (US);

Assignee:
Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); G06F 12/14 (2006.01); G06F 12/16 (2006.01); G08B 23/00 (2006.01); G06F 21/56 (2013.01); H04L 12/58 (2006.01); G06F 21/55 (2013.01); H04L 29/06 (2006.01); H04W 12/12 (2009.01);
U.S. Cl.
CPC ...
G06F 21/56 (2013.01); H04L 51/12 (2013.01); H04L 51/38 (2013.01); G06F 21/554 (2013.01); H04L 63/1491 (2013.01); H04W 12/12 (2013.01); G06F 2221/2123 (2013.01);
Abstract

Devices, systems, and methods are disclosed which utilize lightweight agents on a mobile device to detect message-based attacks. In exemplary configurations, the lightweight agents are included as contacts on the mobile device addressed to an agent server on a network. A malware onboard the mobile device, intending to propagate, unknowingly addresses the lightweight agents, sending messages to the agent server. The agent server analyzes the messages received from the mobile device of the deployed lightweight agents. The agent server then generates attack signatures for the malware. Using malware propagation models, the system estimates how many active mobile devices are infected as well as the total number of infected mobile devices in the network. By understanding the malware propagation, the service provider can decide how to deploy a mitigation plan on crucial locations. In further configurations, the mechanism may be used to detect message and email attacks on other devices.


Find Patent Forward Citations

Loading…