Correlation Of Advertising Content To Malicious Software

  • Published: Mar 10, 2016
  • Earliest Priority: Sep 08 2014
  • Family: 4
  • Cited Works: 0
  • Cited by: 0
  • Cites: 0
  • Additional Info: Full text

Technologies are generally described for a systems, methods and devices effective to analyze a file. In some examples, a processor may receive the file. The file may include content and instructions. The content may include data executable by a browser. The processor may analyze the instructions. The processor may identify an internet protocol (IP) address in the instructions based on the analysis. The processor may compare the identified IP address with a list of IP addresses associated with an attack. The processor may generate an alert based on the comparison.

Download PDF
Document Preview
Document History
  • Publication: Mar 10, 2016
  • Application: Sep 8, 2014
    US US 201414480041 A
  • Priority: Sep 8, 2014
    US US 201414480041 A

Download Citation

Sign in to the Lens