Correlation Of Advertising Content To Malicious Software

  • Published: Jan 24, 2017
  • Earliest Priority: Sep 08 2014
  • Family: 4
  • Cited Works: 9
  • Cited by: 0
  • Cites: 9
  • Additional Info: Cited Works Full text

Technologies are generally described for systems, methods and devices effective to analyze a file. In some examples, a processor may receive the file. The file may include content and instructions. The content may include data executable by a browser. The processor may analyze the instructions. The processor may identify an internet protocol (IP) address in the instructions based on the analysis. The processor may compare the identified IP address with a list of IP addresses associated with an attack. The processor may generate an alert based on the comparison.

Download PDF
Document Preview
Document History
  • Publication: Jan 24, 2017
  • Application: Sep 8, 2014
    US US 201414480041 A
  • Priority: Sep 8, 2014
    US US 201414480041 A

Download Citation

Sign in to the Lens