Embodiments of the disclosure relate to the field of cybersecurity. More specifically, one embodiment of the disclosure relates to a system, apparatus and method for automatically triaging submitted security-related data.
Over the last decade, malicious software (malware) has become a pervasive problem for Internet users. Often, malware is a program or file that is embedded within downloadable content and designed to adversely influence (e.g., attack) normal operations of a computer. Examples of different types of malware may include bots, computer viruses, worms, Trojan horses, spyware, adware, or any other programming that operates within the computer without permission.
For instance, malicious content may be embedded within objects associated with a web page hosted by a web site. By downloading and processing this malware (i.e. malicious content) another web page may be requested from a malicious web site and unknowingly installed on the computer. Similarly, malware may also be installed on a computer upon receipt, or opening, of an electronic mail (email) message. For example, an email message may contain an attachment, such as a Portable Document Format (PDF) document, with embedded executable malware. Also, malware may exist in files infected through any of a variety of attack vectors, which are uploaded from the infected computer onto a networked storage device such as a file share.
Over the past few years, various types of cybersecurity methods have been deployed that have attempted to find malware within files or other network content. Often, these methods evaluate objects suspected of being malicious and subsequently make a determination if the evaluated object is either a threat (i.e. malicious) or not a threat (i.e. benign). In certain circumstances, this evaluation process may yield false negative (a malicious object is deemed to be benign) or false positive (a benign object is deemed to be malicious) results. Such incorrect determinations can lead to users being otherwise exposed to potential threats.
In order to minimize such false positives and negatives, many systems can employ a team of human analysts to further evaluate objects for potential threats. In certain instances, users and/or system administrators of security system products submit an object to a security system vendor to ask for an evaluation or re-evaluation. These submissions may be items that are known to be benign that were deemed to be malicious by the security system during analysis or is perhaps a suspect item that was deemed benign by the security system. In these cases, the submissions are evaluated by the human analysts with a variety of tools to further understand how and/or why the security system came to the conclusion it did.
Such supplemental analysis can be time-consuming and an inefficient use of the human analysts' time as a multitude of analyses can occur simultaneously. In many cases, the human analyst is given the suspicious item without any further background information beyond what the customer provided in the submission process. Often, the lack of data provided by the user in the submission process creates further inefficiencies in the human analysts' time.
Embodiments of the invention are illustrated by way of example and not by way of limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
In light of the problems discussed above, a solution is needed to accelerate the supplemental analysis and classification of objects suspected of being falsely classified. Various embodiments of the disclosure relate to a system and/or process configured to analyze submitted objects and triage the analyzed objects. The triage process can occur by performing analytics on a submitted object, correlating any results, assigning a score and providing that information to an alert logic. The triaged objects can also be utilized to generate triage tickets which may aid human analysts by providing a preliminary set of data to aid in their analysis. Furthermore, the triage system and/or process may comprise a set of pre-determined thresholds or rules that can allow for automatic responses to be generated when presented with certain results without the need for intervention by a human analyst.
More generally, the cybersecurity triage system described herein can receive messages comprising object data and context data associated with classification of the object. The object data and context data are received from a submitter (e.g., a user, customer, etc.) and parsed for re-evaluation of a potential cybersecurity threat. The context data may include meta information about the submitter cybersecurity threat detection system as well as a classification (i.e. verdict) associated with the object. The cybersecurity triage system may reanalyze the received object data in a plurality of analyzers, the analyzers selected by a workflow selector based on at least the object and context data. Results from the selected analyzers are correlated and scored for cybersecurity threats based at least in part on stored, prior classifications. Consequently, triage data is generated. Based on the triage data, a response logic may determine if an alert can automatically be generated to provide (1) the submitter with confirmation of a submitted classification, (i.e. the submitted classification was correct and not a false positive or false negative) (2) the submitter with a correction of submitted classification (i.e. the submitted classification was incorrect and was thus a false positive or false negative), or (3) a cybersecurity analyst with at least the triage data and object data. The cybersecurity triage system thereby, provides an automated triage system based on reevaluation of the received object data to accelerate and improve the efficiency of cybersecurity threat detection support systems.
The cybersecurity triage system can exist within a larger network that may comprise a plurality of network devices having access to a cybersecurity system which may, among other things, analyze incoming objects to determine if a threat is posed to the cybersecurity system or network devices.
Often, the threat classification is based on the security content present in the customer's computing environment. The security content may include, but is not limited or restricted to, analyzer data, scanning rules, heuristics, other digital signatures indicative of threats or any combination thereof. In certain embodiments, the original classification may have been determined by a first cybersecurity system and the reevaluation is subsequently performed by a second and different cybersecurity system or at least by a cybersecurity system with an alternate configuration. In this way, the submission analysis system may attempt to verify the results of prior classifications for customers who are suspicious about the accuracy of such prior threat classifications.
In cases where the classification of a threat is considered to be incorrect by a cybersecurity system user (which may include general users or system administrators), an alert system may allow the cybersecurity system user to generate a submission message that may contain the suspect object (or a hash associated with the suspect object) and send it to a submission analysis system operated by a cybersecurity system vendor (such as, for example, a managed services provider) and/or manufacturer who may then reevaluate the suspicious object to determine if the cybersecurity system generated a false positive or false negative.
The submission message utilized for sending the suspicious object to the submission analysis system for a subsequent classification can be generated on a cybersecurity system configured to create the submission message. The message submission process may be realized through a variety of means including, but not limited to, specialized software agents running on a host computing device, web-based applications hosted on a local cybersecurity system, web-based applications hosted on a remote submission analysis system, and/or hardware interfaces or appliances located within the network. It should also be apparent to those skilled in the art that submission messages may be generated manually or through an automated process (typically in response to at least one pre-determined rule). Additionally, further data relating to the system context can be generated relating to the current operating environment (computer model/operating system/system settings/network settings/etc.) and software related data (file type/associated software/software version/software settings/etc.). Such context data can be packaged with the submission message.
The submission analysis system can receive and parse the incoming submission message data in a manner that allows the system to evaluate and manipulate the suspected object embedded within the submission message data. In many embodiments, this manipulation includes generating and/or instantiating a number of (e.g., one or more) analyzers that can process the object data to evaluate threats and/or determine the methods by which a threat determination was made on the system which submitted the data. The various system and software settings available within the context data can be utilized during evaluation to aid the analyzer logic which may then select and generate analyzers that can mimic the context data settings from the system submitting the message in order to analyze the submitted object similarly to how it may have been processed within the submitting system.
Typically, analyzers are generated by the system to perform analytics on a suspicious object, which may comprise inspecting, identifying and analysis. Such analysis may further comprise examining behaviors of the object that may occur through processing the suspicious object within a virtualized environment and/or through an emulation process, comparing the hash of the suspicious object with hashes of other known malicious and/or benign objects, examining the content of the object to explore its code and structure, as well as looking at any context or metadata that may provide further insight into the suspicious object.
Furthermore, certain embodiments may generate additional analyzers to evaluate the same object data under different computing and/or software environments to determine if similar findings would have occurred. By way of example and not limitation, an object that underwent analytics operating within a first version of a software package may yield a different threat determination than the same object analyzed operating within a second version of the same software. In this way, the submission analysis system may compare threat analyses of objects under a number of different system and software settings. This evaluation under different environments and settings may yield significant insights into the causes of false positive and/or false negative determinations, which can be utilized to generate triage data usable by a human analyst in further evaluations or by the submission analysis system to undertake an automatic remedial action without the need for intervention by a human analyst.
One practical feature of the invention is to automatically generate triage data that can be utilized by human analysts. In this way, the use of the submission analysis system can save the time needed by the human analyst when evaluating the submitted object. Another practical feature is to allow the cybersecurity triage system to process the triage data and automatically generate reports or undertake remedial action based on at least one pre-determined rule without the need for human analysts By having triaging data generated automatically prior to intervention by a human analyst, potential solutions can be provided to the submitting user with a shortened turnaround time, avoiding further potential threats that were deemed benign and allowing the human analyst to focus on other analyses that cannot otherwise be automatically determined by the system.
I. Terminology
In the following description, certain terminology is used to describe features of the invention. For example, in certain situations, the terms “logic” and “engine” are representative of hardware, firmware or software that is configured to perform one or more functions. As hardware, logic may include circuitry such as processing circuitry (e.g., a microprocessor, one or more processor cores, a programmable gate array, a microcontroller, an application specific integrated circuit, etc.), wireless receiver, transmitter and/or transceiver circuitry, semiconductor memory, combinatorial logic, or other types of electronic components.
As software, logic may be in the form of one or more software modules, such as executable code in the form of an executable application, an application programming interface (API), a subroutine, a function, a procedure, an applet, a servlet, a routine, source code, object code, a shared library/dynamic load library, or one or more instructions. These software modules may be stored in any type of a suitable non-transitory storage medium, or transitory storage medium (e.g., electrical, optical, acoustical or other form of propagated signals such as carrier waves, infrared signals, or digital signals). Examples of non-transitory storage medium may include, but is not limited or restricted to a programmable circuit; semiconductor memory; non-persistent storage such as volatile memory (e.g., any type of random access memory “RAM”); persistent storage such as non-volatile memory (e.g., read-only memory “ROM”, power-backed RAM, flash memory, phase-change memory, etc.), a solid-state drive, hard disk drive, an optical disc drive, or a portable memory device. As firmware, the executable code is stored in persistent storage.
The term “network content” generally refers to information transmitted over a network as one or more messages, namely a grouping of information that comprises a header and a payload, such as any of the following: a packet; a frame; a stream being a sequence of packets or frames; or any other series of bits having a prescribed format. The “payload” is generally defined as including the data associated with the message such as text, software, an image, an object, audio, video, a Uniform Resource Locator (URL), or other types of digital data. The “header” is generally defined as including control information. However, the specific types of control information depend on the network content type.
Other examples of network content include web traffic Hypertext Transfer Protocol (HTTP), email, which may be transmitted using an email protocol such as Simple Mail Transfer Protocol (SMTP), Post Office Protocol version 3 (POP3), or Internet Message Access Protocol (IMAP4). A further example of network content includes an Instant Message, which may be transmitted using Session Initiation Protocol (SIP) or Extensible Messaging and Presence Protocol (XMPP) for example. Yet another example of network content includes one or more files that are transferred using a data transfer protocol such as File Transfer Protocol (FTP) for subsequent storage on a file share. Where the network content is email, Instant Message or a file, the header may include the sender/recipient address, the sender/recipient phone number, or a targeted network location of the file, respectively.
The term “malware” is directed to software that produces an undesirable behavior upon execution, where the behavior is deemed to be “undesirable” based on customer-specific rules, manufacturer-based rules, or any other type of rules formulated by public opinion or a particular governmental or commercial entity. This undesired behavior may include a communication-based anomaly or an execution-based anomaly that (1) alters the functionality of an electronic device executing that application software in a malicious manner; (2) alters the functionality of an electronic device executing that application software without any malicious intent; and/or (3) provides an unwanted functionality which is generally acceptable in other context.
The term “object” generally refers to content in the form of an item of information having a logical structure or organization that enables it to be classified for purposes of analysis for malware. One example of the object may include an email message or a portion of the email message. Another example of the object may include a storage file or a document such as a Portable Document Format (PDF) document, a word processing document such as Word® document, or other information that may be subjected to cybersecurity analysis. The object may also include an executable such as an application, program, code segment, a script, dynamic link library “dll,” URL link, or any other element having a format that can be directly executed or interpreted by logic within the electronic device. Network content may be an example of an object and used for malware detection.
Logic (or component or module) may be software that includes code being one or more instructions, commands or other data structures that, when processed (e.g., executed) to perform a particular operation or a series of operations. Examples of software include an application, a process, an instance, Application Programming Interface (API), subroutine, plug-in, function, applet, servlet, routine, source code, object code, shared library/dynamic link library (dll), or a collection of HTML elements. This software may be stored in any type of a suitable non-transitory storage medium, or transitory storage medium (e.g., electrical, optical, acoustical or other form of propagated signals such as carrier waves, infrared signals, or digital signals). Examples of non-transitory storage medium may include, but are not limited or restricted to a programmable circuit; non-persistent storage such as volatile memory (e.g., any type of random access memory “RAM”); or persistent storage such as non-volatile memory (e.g., read-only memory “ROM”, power-backed RAM, flash memory, phase-change memory, etc.), a solid-state drive, hard disk drive, an optical disc drive, or a portable memory device. As firmware, the logic (or engine/component) may be stored in persistent storage.
The term “transmission medium” is a communication path between two or more systems (e.g. any electronic devices with data processing functionality such as, for example, a security appliance, server, mainframe, computer, netbook, tablet, smart phone, router, switch, bridge or router). The communication path may include wired and/or wireless segments. Examples of wired and/or wireless segments include electrical wiring, optical fiber, cable, bus trace, or a wireless channel using infrared, radio frequency (RF), or any other wired/wireless signaling mechanism.
The term “network device” should be generally construed as electronics with data processing capability and/or a capability of connecting to any type of network, such as a public network (e.g., Internet), a private network (e.g., a wireless data telecommunication network, a local area network “LAN”, etc.), or a combination of networks. Examples of a network device may include, but are not limited or restricted to, the following: a server, a mainframe, a cybersecurity device, a firewall, a router; an info-entertainment device, industrial controllers, vehicles, or an endpoint device (e.g., a laptop, a smartphone, a tablet, a desktop computer, a netbook, gaming console, a medical device, or any general-purpose or special-purpose, user-controlled electronic device). In many embodiments, network devices may contain cybersecurity logic that can generate submission messages.
The term “message” generally refers to signaling (wired or wireless) as either information placed in a prescribed format and transmitted in accordance with a suitable delivery protocol or information made accessible through a logical data structure such as an API. Examples of the delivery protocol include but are not limited or restricted to HTTP (Hypertext Transfer Protocol); HTTPS (HTTP Secure); Simple Mail Transfer Protocol (SMTP); File Transfer Protocol (FTP); iMessage; Instant Message Access Protocol (IMAP); or the like. Hence, each message may be in the form of one or more packets, frame, or any other series of bits having the prescribed, structured format.
Lastly, the terms “or” and “and/or” as used herein are to be interpreted as inclusive or meaning any one or any combination. Therefore, “A, B or C” or “A, B and/or C” mean “any of the following: A; B; C; A and B; A and C; B and C; A, B and C.” An exception to this definition will occur only when a combination of elements, functions, steps or acts are in some way inherently mutually exclusive.
As this invention is susceptible to embodiments of many different forms, it is intended that the present disclosure is to be considered as an example of the principles of the invention and not intended to limit the invention to the specific embodiments shown and described.
II. General Architecture
Referring to
Cybersecurity and network devices 1101-110N, 115 may communicate over private and/or public transmission mediums through the network 120 including the Internet, direct connections between the devices and/or via a wireless network access points. The cybersecurity devices 1101-110N and/or network devices 115 may be various computing devices such as, but not limited to, desktop computing systems, enterprise computing systems, electronic portable computers, or portable cellular phones.
Each submission analysis system device 130 can be adapted in many embodiments to receive submission messages and process the embedded code samples taken from network content for potential malicious code in real-time or at least near real-time. In certain embodiments, the submission messages can be provided in an offline process such as, but not limited to, a user presenting the data to be processed in the form of a drive coupled to the submission analysis system 130.
According to the embodiment depicted in
There are numerous methods in which a security appliance may classify objects as being malicious or benign. In some instances, determinations may depend on various settings within system software. At times, determinations may yield “malicious” or “benign” results. A user operated network device, security administrator, and/or an automated system relying on heuristics or thresholds of confidence in the classification system may suspect the classification is inaccurate (e.g. if the first classification was “malicious” however, the object is suspected of being benign, the object may be considered a “false positive”). This can lead to situations in which an end user is alerted to an object or network traffic being flagged as malicious, even when it is known that the flagged item is in fact benign. Alternatively, a user may still feel unsure of a suspicious item that was determined to be benign. In such situations a submission of these items to an external party such as, but not limited to, the security applicant vendor or manufacturer for reevaluation may be generated. Such submissions can be packaged via a submission message software and sent to a submission analysis system device 130 for evaluation prior to a human analyst looking at the submission.
The submission analysis system 130 can be comprised of a variety of logics and data stores that can be utilized to generate triage data based on received submission messages. In the embodiment depicted in
It is contemplated that the submission analysis system 130 may be deployed as a device but may also be implemented in a cloud computing service for analysis of the submitted data as described. Furthermore, it is contemplated that the functionality of one or more submission analysis system devices 130 may be incorporated into another management system when malware detection is to be conducted at a centralized resource (e.g. in a load balancing system). By way of example and not limitation, a private organization may incorporate a submission analysis system 130 to re-evaluate threat determinations done on its own systems in order to generate more threat analysis data, keep certain submission objects internal (e.g., where data privacy is an issue), and/or to reduce the time required by human analysts to evaluate the results by avoiding reliance on a third party for the reevaluation.
Referring now to
In additional embodiments, the object submission logic 205 can be utilized by the user to package, generate, and send a submission message containing objects for reevaluation by a submission analysis system. This process may be effected through the use of a user interface that prompts the user for information related to the object and reasons for submission. In certain embodiments, the object submission logic 205 may automatically generate the submission with data based on the initial evaluation by the cybersecurity system. In these instances, the system may automatically send the submission or could prompt the user to verify the automatically generated data prior to sending the submission. Additionally, the choice between manual and automatic submission message generation and sending may be determined through the use of a pre-determined rule which may include, but is not limited to, the type of threat, the number of evaluations done over a given period of time, time of day generation occurs, and/or the security level of the given user.
Context data logic 206 can be utilized to further add supplemental data to the submission message related to the state of the submitting computing system. In various embodiments, the added context data may aid in the determination of why certain evaluations occurred within the cybersecurity system. Context data may include a variety of computing environment data including, but not limited to, operating system data, operating system settings, network settings, network security settings, local evaluation data, software data, software settings, and/or software version. It would be obvious to those skilled in the art that context data may include other forms of data not specifically outlined above as long as said data may aid in the reevaluation of the object. In some embodiments, context data may include data derived from an external source including, but not limited to, a global data store system similar to those described in U.S. patent application Ser. No. 16/222,194 filed Dec. 17, 2018 and entitled “Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store” the disclosure of which is hereby incorporated by reference in its entirety.
Referring now to
The input/output interface 270 can enable communications with other components including other cybersecurity and network devices 1101-110N, 115 as depicted in of
In certain embodiments, the processor 250 can be communicatively coupled to persistent storage 260 over an external transmission medium via the I/O interface 270. According to one embodiment of the disclosure, the persistent storage 260 may load the submission analysis logic 240 within a volatile memory for execution. Of course, in embodiments where the logic is implemented as hardware, submission analysis logic 240, including the sub-components would be implemented separately from persistent memory 260.
The submission analysis logic 240 may be comprised of many sub-components or sub-systems with internal logic suited for particular tasks. In one embodiment illustrated in
In many embodiments, the object parsing logic 140 can accept submission messages and parse them for processing and evaluation. The parsing process can identify both the object that is to be evaluated and any context and/or other meta information that may aid in the evaluation of the submission message. By way of example and not limitation, the object parsing logic 140 may accept a submission message comprising object data and context data. The object parsing logic 140 may then determine, for example, that the object data comprises a portable document format (“PDF”) file as the object to be evaluated as well as context data that was generated by the agent on the cybersecurity device 110 or network device 115 which informs the submission analysis device about the computing environment the PDF was obtained from. It would be known to those skilled in the art that numerous types of objects may be parsed from the submission message.
The software agent utilized for the generation of the submission messages can vary based on the type of device it operates. In a number of embodiments, the submission message agent may operate automatically on an intermediary network device. In other embodiments, the submission message agent may allow for more direct feedback and formatting from a user when located on an endpoint network device. It would be apparent to those skilled in the art that such software agents can be configured to a variety of configurations based upon the application desired and may even be deployed as a single software package that can adapt based on the type of device and/or computing environment it operates within.
Workflow selector logic 145, in a variety of embodiments, can receive and analyze object and context data to select analyzers for evaluation. In certain embodiments, the workflow selector logic 145 may examine the object data for an object data type and select a first sub-set of analyzers for use in the analyzer logic 150. Furthermore, the workflow selector logic 145 may also examine the context data to select a second sub-set of analyzers from within the selection of analyzer logic 150. By way of example and not limitation, the workflow selector logic 145 can analyze received object data and determine that the object is an email type, which yields a first selection of analyzers from within the analyzer logic 150. In many embodiments, the workflow selector logic 145 may implement an ordered analysis of the object. In various embodiments, the analysis may be done in parallel among a plurality of analyzers with their results able to be correlated by the correlation engine logic 155. In response, the workflow selector logic 145 may then analyze the context data and determine what version of email client the cybersecurity device was using or evaluating. In response to this, the workflow selector logic 145 may select a second set of analyzers from within the analyzer logic 150 that correspond to different versions of the email client. Selected analyzers may analyze the object within multiple environments wherein the software versions are different. Through this process, the differences between the processing of the object through different versions may yield data related to why the cybersecurity device came to the threat determination it previously did. In this way, the submission analysis system can utilize the differences within the data generated from the analyzers to generate triaging data which may be utilized to make further determinations regarding the validity of the first determination.
Similarly, it is contemplated that other types of selections may be made based on the contents of the object and/or context data. These other selections may be in response to a variety of factors including, but not limited to, application settings, operating system, operating system settings, file source, and/or file destination. Selection data can be generated by the workflow selector logic 145, which may then be passed to the analyzer logic 150 for implementation. In some embodiments, selection data may comprise data indicating particular analyzers that can be utilized by the analyzer logic 150.
In a number of embodiments, the analyzer logic 150 includes a plurality of different analyzers that may be utilized to evaluate object data. The analyzer logic 150 can receive selection data from the workflow selector logic 145 and launch or utilize the selected analyzers. In some embodiments, the analyzer logic 150 may utilize pre-generated analyzers available in other systems. In certain embodiments, the analyzers may be behavioral analyzers comprising instrumented virtual machines to process the object. The analyzers can be configured according to the context data on which to base the settings of the analyzer. In additional embodiments, the analyzers may emulate the computing environment selected in the selection data and monitor various settings such as, but not limited to, buffer, memory reads/writes, and/or function calls and returns. It is contemplated that the analyzers utilized by the analyzer logic may include a variety of analyzers and may also include other analyzer types based upon the application needed.
The composition or type of analyzers may be updated or otherwise changed periodically or aperiodically to allow for improved analyzers, new analyzers, or removal of ineffective analyzers. The updates may be remotely pushed or can be locally updated through a network connection or a physical connection with an update drive. The output of the analyzers can be passed to the correlation engine logic 155 in the form of results data. Results data may comprise descriptions of any changed states, variables, or behaviors within the analyzed objects.
In a variety of embodiments, correlation engine logic 155 examines and scores the results data from the analyzers into a set of score data. In further embodiments, the score data may be generated by examining the differences between the various analyzers. By way of example and not limitation, the results data can be generated from a variety of analyzers that were instantiated to emulate or simulate a number of different configuration settings within the same email client program used by the cybersecurity device 1101 that flagged the email as a threat. Examining the results of the various analyzers may indicate the many analyzers had come to the same conclusion as the cybersecurity device 1101; however, it may also indicate that certain analyzers with particular configuration settings changed determined the email was not a threat. In this way, the score data may be formatted and adapted to reflect that various differences in the ultimate processing results in the set of analyzers, which data can be further processed to yield additional insights, such as data indicating accuracy of the various analyzers.
Triage ticket generation logic 160, in certain embodiments, can accept the score data and determine if a triage ticket should be generated. A set of pre-defined thresholds relating to the circumstances warranting a triage ticket to be generated can be pre-loaded into the submission analysis system 130. It would be known to those skilled in the art that the pre-defined threshold may, in additional embodiments, be variable or otherwise updatable through a variety of means including updated rule sets, machine learning, and/or neural networks that can update the weights or rules based on a given input data set. By settings these thresholds and rules, the triage ticket generation logic 160 can evaluate when insightful data was gained from the analyzers and can generate and format a triage ticket reflecting the insightful data which can be reported to a human analyst for further analysis. In this way, the generation of a triage ticket can alert the human analyzer to focus on a specific area of concern based upon the results data generated by the analyzers, thus saving time and effort.
There may be instances where a remedial action may need to be taken before a human analyzer has time to read and analyze a triage ticket. In these embodiments, the submission analysis logic 240 may comprise an alert logic 180 that can take remedial actions without human intervention. In many embodiments, the submission analysis device 130 may be given a set of pre-defined thresholds and/or rules that may empower the submission analysis device 130 to take remedial actions immediately based on the score data derived from the results data. By way of example and not limitation, the correlation engine logic 155 may generate score data that indicates that a simple change in the settings of the computing environment or software suite of the cybersecurity device 1101 can yield a satisfactory result for the user. The alert logic 180 can then auto-generate a report, email, or other communication to the user informing them of these findings and providing a suggestion to change the setting that was causing the negative outcome. In other cases, the alert logic 180 may respond to the determination that the score data indicates that a false negative occurred and that it would be advantageous to notify all potentially affected parties as soon as possible in case a human analyst was not immediately available to evaluate. Thus, the alert logic could report out to not only users, but also to outside or third parties that may benefit from this information.
III. Basic Triage Data Generation
Referring to
The submission analysis system can take the submitted data, once parsed, and analyze it to select a workflow that may best process the data (block 340). In a number of embodiments, the workflow selection is a selection of particular analyzers within the analyzer logic. In further embodiments, the selection may examine the object to determine the file type or contents of the object data and select an analyzer that has been designed to best analyze that file type or contents. By way of example and not limitation, the selection may be based on the determination that the object data for reevaluation contains a text file, which then selects an analyzer that is best suited to analyze text files.
Once selected, the process 300 may then process the object with the selected analyzers (block 350). In certain embodiments, the analyzers may include a virtual machine that attempts to open, process, or otherwise operate the object by common (or otherwise expected) means. In additional embodiments, the analyzers may analyze the object data in an emulated environment. In further additional embodiments, the analyzers may generate a hash of the object data for further comparison/analysis.
In certain instances, the object data, upon analysis in the analyzer, may generate or locate an embedded object that itself may need to be evaluated. By way of example and not limitation, a text file may contain a link to an external website, which itself should be evaluated as part of the overall threat analysis. As such, the process 300 determines if new objects have been found in process within the analyzed object (block 360). When embedded objects are found, the process 300 can send the newly determined object data to the workflow selector to then again select a workflow based upon the embedded object (block 340). When all objects have been found and no further embedded objects are determined, the process 300 may then correlate the results and generate a score (block 370). Such correlation may include examining the analyzed results with results previously provided in the context data of the submitting machine. The correlation of the results can be quantified as a series of score data. Upon completion of the results correlation, the process 300 may classify the object based on the score which can then be utilized to make a reevaluation (block 380). The classification can be realized through a variety of means including comparison to a set of pre-determined thresholds or rules
In many embodiments, the process 300 determines if the triage ticket should be generated based upon the classification of the score data (block 385). In certain cases, the score may be classified in a way that does not warrant the generation of a triage ticket. In more embodiments, score data can be utilized to generate a triage ticket (block 390). The exact type of triage ticket generated can depend on a plurality of pre-determined rules that may interpret and/or classify the score data. In response to the score being classified such that a triage ticket does not need to be generated (and consequently not analyzed by a human analyst), an automatic response may be generated and sent back to the submitting user (block 395). By way of illustrative example, the results may yield a determination that the suspicious object is benign and generated a false positive result due to differences in how the submitter's software version handles the object. In these cases, no direct involvement of the human analyst is needed and an automatic response with remedial actions to take may be generated and sent to the submitter. In this way, the human analyst may increase the amount of time spent on other undetermined threat analyses. The flow of the various logics of the submission analysis system is described in more detail in
IV. Submission Message Data Flow
Referring now to
Upon submission through any of a variety of transmission mediums, the parsing logic 420 can then parse and process the submission message into its constituent object data and context data parts in a format that can be utilized within the submission analysis logic. Parsed data is then sent to workflow selection logic 430 that can then determine the most suitable analyzer for the object data. In certain cases, the object data may have multiple objects that require multiple analyzers of different types.
The object data is passed to the analyzer logic 440 which may then generate any number of selected analyzers A-N 441, 442, 443, 444 based on the type of object data submitted. As discussed above, object data analyzed within an analyzer may have another embedded object that must also have an analyzer selected. In these instances, the embedded object is sent back to the workflow selector logic for further evaluation and analyzer selection. In other instances, object data may be evaluated through several analyzers to determine differences in results.
By way of example and not limitation, object data may be emulated or run within a virtual environment or with a first version of a particular software application, along with a second or alternative version, etc. In some embodiments, the analyzer logic 440 may model a computing system to generate results data based on observed behaviors or instructions associated with the suspicious object. In certain embodiments, the analyzer logic 440 generate virtualized machines that simulate a run-time environment expected by the suspicious object in order to perform in-depth dynamic (behavioral) analysis on the object in efforts to detect one or more anomalous behaviors. The virtual machines may be configured with a software or computing environment profile corresponding to an image that can be configured or selected by workflow selector logic 430. The analyzers evaluate the processing of the object data and generate results data.
The results data can be passed through to correlation engine logic 460 that may then analyze the entire set of data between the plurality of analyzers 441, 442, 443, 444. The differences between the various analyzers 441, 442, 443, 444 may be utilized to generate score data. In many embodiments, score data can additionally be generated by evaluating the parsed context data 412 within the submission message 410. In some embodiments, the correlation engine logic 460 may be configured to receive an external data feed 450, which can be utilized to add further information (e.g. context) during correlation and added as part of the score data. By way of example and not limitation, the external data feed 450 may be comprised of newly discovered threats and/or issues related to updated computing/software environments and settings subsequently identified by any source including a third-party source. Similarly, in some embodiments, classifications associated with previously analyzed objects may be used by the correlation engine logic 460 to add further context to the score data.
Upon generation of score data, it can be utilized by the triage ticket generation logic 470 which can evaluate the score data to determine if a triage ticket should be generated, or some other method of reporting the results to a human analyst. In a number of embodiments, triage data generated may be generated and utilized to create a triage ticket as part of an auto-generated report that is readable by the human analyst. In response to at least one pre-determined rule, triage data may be utilized by alert logic 480 to auto-generate an alert that can be sent out to the human analyst for immediate review, to the user of the submitting device, and/or to third parties.
V. Detailed Triage Ticket Data Generation Process
Referring now to
The submission message, prior to sending, can be formatted with object data reflecting the object that is to be reevaluated and context data reflecting the computing environment of the cybersecurity device (block 510). It is contemplated that the submission message format may comprise additional types of data based upon the specific application needed. The submission message, once generated, is transmitted to the submission analysis system where it is parsed for further processing (block 515).
In a number of embodiments, the submission analysis system may make a pre-analysis determination if the submission message is satisfactory, eligible, and/or warrants a full submission analysis (block 520). This step may allow the submission analysis system to reject any messages that are not formatted correctly, or that have already previously been evaluated. It is contemplated that the submission analysis system can have access to a data store comprising data that relates to past message submissions and eventual results. Once the submission analysis system determines that the submission message should be fully processed, the parsed object and context data can be sent to the workflow selector logic.
The workflow selector logic accepts the object and context data and evaluates them to select at least one analyzer from the selection of analyzers available in the analyzer logic (block 525). The selection is typically done based on a combination of object and context data contents. In certain embodiments, the selection may be composed as an intersection of the object and context data contents, whereas other embodiments may determine an additive selection process may yield better potential results.
Once selected, the selection data is sent to the analyzer logic which in response generates (or instantiates) the selected analyzers (block 530). The analyzers can mimic certain computing environments that may be similar but are usually slightly different from the computing environment of the cybersecurity device that generated the submission message. As discussed above, analyzers can emulate various computing environments, operating systems, software applications, along with a variety of operating system/software settings and varying versions. Typically, multiple analyzers are utilized to parse a single object so that differences in the output or operation can be observed.
In certain instances, when parsing the object data, an embedded object is discovered that may link or contain another object that should be evaluated (block 535). In these instances, the process can send the newly discovered object back to the workflow selector logic for analysis to determine further analyzers to process the embedded object. In some embodiments, new context data may be extracted along with the embedded object that may be passed to the workflow selector logic. In the absence of additional context data specific to the embedded object, the parent object's context data may be utilized and sent to the workflow selector logic. This process may repeat either indefinitely, until all objects and embedded objects are analyzed, or when a certain number of iterations/levels are reached. It is contemplated that rules may be set up for this process that can maximize threat analysis while avoiding computing overload by a large number of nested/embedded objects.
The analyzers generate results data that is sent to a correlation engine machine to generate score data (block 540). As shown above in more detail in the discussion of
In certain embodiments where it is determined that a triage ticket should be generated the triage data can be then generated and passed into the alert logic which creates a triage ticket and reports it to the proper channels such that the newly generated triage ticket can be found and utilized by a human analyst for the purpose of determining the issues involved with the object threat detection in a more efficient manner. In certain embodiments, the triage data can be generated and utilized by the triage ticket generation logic to generate and distribute the triage ticket. In other embodiments, the triage data can be generated in response to every re-evaluation and utilized for other purposes not specific to triage ticket generation such as, but not limited to, analyzer testing, third party interactions, or other threshold evaluations.
In the foregoing description, the invention is described with reference to specific exemplary embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims.
This application claims the benefit of U.S. Provisional Application No. 62/787,050, filed Dec. 31, 2018, the entire contents are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
6898632 | Gordy et al. | May 2005 | B2 |
6941348 | Petry et al. | Sep 2005 | B2 |
7080407 | Zhao et al. | Jul 2006 | B1 |
7080408 | Pak et al. | Jul 2006 | B1 |
7243371 | Kasper et al. | Jul 2007 | B1 |
7308716 | Danford et al. | Dec 2007 | B2 |
7448084 | Apap et al. | Nov 2008 | B1 |
7458098 | Judge et al. | Nov 2008 | B2 |
7467408 | O'Toole, Jr. | Dec 2008 | B1 |
7496961 | Zimmer et al. | Feb 2009 | B2 |
7519990 | Xie | Apr 2009 | B1 |
7540025 | Tzadikario | May 2009 | B2 |
7639714 | Stolfo et al. | Dec 2009 | B2 |
7698548 | Shelest et al. | Apr 2010 | B2 |
7779463 | Stolfo et al. | Aug 2010 | B2 |
7854007 | Sprosts et al. | Dec 2010 | B2 |
7937387 | Frazier et al. | May 2011 | B2 |
7949849 | Lowe et al. | May 2011 | B2 |
8006305 | Aziz | Aug 2011 | B2 |
8020206 | Hubbard et al. | Sep 2011 | B2 |
8045458 | Alperovitch et al. | Oct 2011 | B2 |
8069484 | McMillan et al. | Nov 2011 | B2 |
8171553 | Aziz et al. | May 2012 | B2 |
8201246 | Wu et al. | Jun 2012 | B1 |
8204984 | Aziz et al. | Jun 2012 | B1 |
8214905 | Doukhvalov et al. | Jul 2012 | B1 |
8291499 | Aziz et al. | Oct 2012 | B2 |
8370938 | Daswani et al. | Feb 2013 | B1 |
8370939 | Zaitsev et al. | Feb 2013 | B2 |
8375444 | Aziz et al. | Feb 2013 | B2 |
8438644 | Watters et al. | May 2013 | B2 |
8464340 | Ahn et al. | Jun 2013 | B2 |
8494974 | Watters et al. | Jul 2013 | B2 |
8516593 | Aziz | Aug 2013 | B2 |
8528086 | Aziz | Sep 2013 | B1 |
8539582 | Aziz et al. | Sep 2013 | B1 |
8549638 | Aziz | Oct 2013 | B2 |
8561177 | Aziz et al. | Oct 2013 | B1 |
8566476 | Shiffer et al. | Oct 2013 | B2 |
8566946 | Aziz et al. | Oct 2013 | B1 |
8584239 | Aziz et al. | Nov 2013 | B2 |
8635696 | Aziz | Jan 2014 | B1 |
8689333 | Aziz | Apr 2014 | B2 |
8713681 | Silberman et al. | Apr 2014 | B2 |
8776229 | Aziz | Jul 2014 | B1 |
8793278 | Frazier et al. | Jul 2014 | B2 |
8793787 | Ismael et al. | Jul 2014 | B2 |
8813050 | Watters et al. | Aug 2014 | B2 |
8832829 | Manni et al. | Sep 2014 | B2 |
8850571 | Staniford et al. | Sep 2014 | B2 |
8881271 | Butler, II | Nov 2014 | B2 |
8881282 | Aziz et al. | Nov 2014 | B1 |
8898788 | Aziz et al. | Nov 2014 | B1 |
8935779 | Manni et al. | Jan 2015 | B2 |
8949257 | Shiffer et al. | Feb 2015 | B2 |
8984638 | Aziz et al. | Mar 2015 | B1 |
8990939 | Staniford et al. | Mar 2015 | B2 |
8990944 | Singh et al. | Mar 2015 | B1 |
8997219 | Staniford et al. | Mar 2015 | B2 |
9009822 | Ismael et al. | Apr 2015 | B1 |
9009823 | Ismael et al. | Apr 2015 | B1 |
9015846 | Watters et al. | Apr 2015 | B2 |
9027135 | Aziz | May 2015 | B1 |
9071638 | Aziz et al. | Jun 2015 | B1 |
9104867 | Thioux et al. | Aug 2015 | B1 |
9106630 | Frazier et al. | Aug 2015 | B2 |
9106694 | Aziz et al. | Aug 2015 | B2 |
9118715 | Staniford et al. | Aug 2015 | B2 |
9159035 | Ismael et al. | Oct 2015 | B1 |
9171160 | Vincent et al. | Oct 2015 | B2 |
9176843 | Ismael et al. | Nov 2015 | B1 |
9189627 | Islam | Nov 2015 | B1 |
9195829 | Goradia et al. | Nov 2015 | B1 |
9197664 | Aziz et al. | Nov 2015 | B1 |
9223972 | Vincent et al. | Dec 2015 | B1 |
9225740 | Ismael et al. | Dec 2015 | B1 |
9241010 | Bennett | Jan 2016 | B1 |
9251343 | Vincent et al. | Feb 2016 | B1 |
9262635 | Paithane | Feb 2016 | B2 |
9268936 | Butler | Feb 2016 | B2 |
9275229 | LeMasters | Mar 2016 | B2 |
9282109 | Aziz et al. | Mar 2016 | B1 |
9292686 | Ismael et al. | Mar 2016 | B2 |
9294501 | Mesdaq et al. | Mar 2016 | B2 |
9300686 | Pidathala et al. | Mar 2016 | B2 |
9306960 | Aziz | Apr 2016 | B1 |
9306974 | Aziz et al. | Apr 2016 | B1 |
9311479 | Manni et al. | Apr 2016 | B1 |
9355247 | Thioux et al. | May 2016 | B1 |
9356944 | Aziz | May 2016 | B1 |
9363280 | Rivlin et al. | Jun 2016 | B1 |
9367681 | Ismael et al. | Jun 2016 | B1 |
9398028 | Karandikar et al. | Jul 2016 | B1 |
9413781 | Cunningham | Aug 2016 | B2 |
9426071 | Caldejon et al. | Aug 2016 | B1 |
9430646 | Mushtaq et al. | Aug 2016 | B1 |
9432389 | Khalid et al. | Aug 2016 | B1 |
9438613 | Paithane et al. | Sep 2016 | B1 |
9438622 | Staniford et al. | Sep 2016 | B1 |
9438623 | Thioux et al. | Sep 2016 | B1 |
9459901 | Jung et al. | Oct 2016 | B2 |
9467460 | Otvagin et al. | Oct 2016 | B1 |
9483644 | Paithane et al. | Nov 2016 | B1 |
9495180 | Ismael | Nov 2016 | B2 |
9497213 | Thompson et al. | Nov 2016 | B2 |
9507935 | Ismael et al. | Nov 2016 | B2 |
9516057 | Aziz | Dec 2016 | B2 |
9519782 | Aziz et al. | Dec 2016 | B2 |
9536091 | Paithane et al. | Jan 2017 | B2 |
9537972 | Edwards et al. | Jan 2017 | B1 |
9560059 | Islam | Jan 2017 | B1 |
9565202 | Kindlund et al. | Feb 2017 | B1 |
9591015 | Amin et al. | Mar 2017 | B1 |
9591020 | Aziz | Mar 2017 | B1 |
9594904 | Jain et al. | Mar 2017 | B1 |
9594905 | Ismael et al. | Mar 2017 | B1 |
9594912 | Thioux et al. | Mar 2017 | B1 |
9609007 | Rivlin et al. | Mar 2017 | B1 |
9626509 | Khalid et al. | Apr 2017 | B1 |
9628498 | Aziz et al. | Apr 2017 | B1 |
9628507 | Haq et al. | Apr 2017 | B2 |
9633134 | Ross | Apr 2017 | B2 |
9635039 | Islam et al. | Apr 2017 | B1 |
9641546 | Manni et al. | May 2017 | B1 |
9654485 | Neumann | May 2017 | B1 |
9661009 | Karandikar et al. | May 2017 | B1 |
9661018 | Aziz | May 2017 | B1 |
9674298 | Edwards et al. | Jun 2017 | B1 |
9680862 | Ismael et al. | Jun 2017 | B2 |
9690606 | Ha et al. | Jun 2017 | B1 |
9690933 | Singh et al. | Jun 2017 | B1 |
9690935 | Shiffer et al. | Jun 2017 | B2 |
9690936 | Malik et al. | Jun 2017 | B1 |
9736179 | Ismael | Aug 2017 | B2 |
9740857 | Ismael et al. | Aug 2017 | B2 |
9747446 | Pidathala et al. | Aug 2017 | B1 |
9749343 | Watters et al. | Aug 2017 | B2 |
9749344 | Watters et al. | Aug 2017 | B2 |
9756074 | Aziz et al. | Sep 2017 | B2 |
9773112 | Rathor et al. | Sep 2017 | B1 |
9781144 | Otvagin et al. | Oct 2017 | B1 |
9787700 | Amin et al. | Oct 2017 | B1 |
9787706 | Otvagin et al. | Oct 2017 | B1 |
9792196 | Ismael et al. | Oct 2017 | B1 |
9824209 | Ismael et al. | Nov 2017 | B1 |
9824211 | Wilson | Nov 2017 | B2 |
9824216 | Khalid | Nov 2017 | B1 |
9825976 | Gomez et al. | Nov 2017 | B1 |
9825989 | Mehra | Nov 2017 | B1 |
9838408 | Karandikar et al. | Dec 2017 | B1 |
9838411 | Aziz | Dec 2017 | B1 |
9838416 | Aziz | Dec 2017 | B1 |
9838417 | Khalid et al. | Dec 2017 | B1 |
9846776 | Paithane et al. | Dec 2017 | B1 |
9876701 | Caldejon et al. | Jan 2018 | B1 |
9888016 | Amin et al. | Feb 2018 | B1 |
9888019 | Pidathala et al. | Feb 2018 | B1 |
9892261 | Joram et al. | Feb 2018 | B2 |
9904955 | Watters et al. | Feb 2018 | B2 |
9910988 | Vincent et al. | Mar 2018 | B1 |
9912644 | Cunningham | Mar 2018 | B2 |
9912681 | Ismael et al. | Mar 2018 | B1 |
9912684 | Aziz et al. | Mar 2018 | B1 |
9912691 | Mesdaq et al. | Mar 2018 | B2 |
9912698 | Thioux et al. | Mar 2018 | B1 |
9916440 | Paithane et al. | Mar 2018 | B1 |
9921978 | Chan et al. | Mar 2018 | B1 |
9934376 | Ismael | Apr 2018 | B1 |
9934381 | Kindlund et al. | Apr 2018 | B1 |
9946568 | Ismael et al. | Apr 2018 | B1 |
9954890 | Staniford et al. | Apr 2018 | B1 |
9973531 | Thioux | May 2018 | B1 |
10002252 | Ismael et al. | Jun 2018 | B2 |
10019338 | Goradia et al. | Jul 2018 | B1 |
10019573 | Silberman et al. | Jul 2018 | B2 |
10025691 | Ismael et al. | Jul 2018 | B1 |
10025927 | Khalid et al. | Jul 2018 | B1 |
10027689 | Rathor et al. | Jul 2018 | B1 |
10027690 | Aziz et al. | Jul 2018 | B2 |
10027696 | Rivlin et al. | Jul 2018 | B1 |
10033747 | Paithane et al. | Jul 2018 | B1 |
10033748 | Cunningham et al. | Jul 2018 | B1 |
10033753 | Islam et al. | Jul 2018 | B1 |
10033759 | Kabra et al. | Jul 2018 | B1 |
10050998 | Singh | Aug 2018 | B1 |
10063583 | Watters et al. | Aug 2018 | B2 |
10068091 | Aziz et al. | Sep 2018 | B1 |
10075455 | Zafar et al. | Sep 2018 | B2 |
10083302 | Paithane et al. | Sep 2018 | B1 |
10084813 | Eyada | Sep 2018 | B2 |
10089461 | Ha et al. | Oct 2018 | B1 |
10097573 | Aziz | Oct 2018 | B1 |
10104102 | Neumann | Oct 2018 | B1 |
10108446 | Steinberg et al. | Oct 2018 | B1 |
10121000 | Rivlin et al. | Nov 2018 | B1 |
10122746 | Manni et al. | Nov 2018 | B1 |
10133863 | Bu et al. | Nov 2018 | B2 |
10133866 | Kumar et al. | Nov 2018 | B1 |
10146810 | Shiffer et al. | Dec 2018 | B2 |
10148693 | Singh et al. | Dec 2018 | B2 |
10165000 | Aziz et al. | Dec 2018 | B1 |
10169585 | Pilipenko et al. | Jan 2019 | B1 |
10176321 | Abbasi et al. | Jan 2019 | B2 |
10181029 | Ismael et al. | Jan 2019 | B1 |
10191861 | Steinberg et al. | Jan 2019 | B1 |
10192052 | Singh et al. | Jan 2019 | B1 |
10198574 | Thioux et al. | Feb 2019 | B1 |
10200384 | Mushtaq et al. | Feb 2019 | B1 |
10210329 | Malik et al. | Feb 2019 | B1 |
10216927 | Steinberg | Feb 2019 | B1 |
10218740 | Mesdaq et al. | Feb 2019 | B1 |
10242185 | Goradia | Mar 2019 | B1 |
10282548 | Aziz et al. | May 2019 | B1 |
10284574 | Aziz et al. | May 2019 | B1 |
10284575 | Paithane et al. | May 2019 | B2 |
10296437 | Ismael et al. | May 2019 | B2 |
10335738 | Paithane et al. | Jul 2019 | B1 |
10341363 | Vincent et al. | Jul 2019 | B1 |
10341365 | Ha | Jul 2019 | B1 |
10366231 | Singh et al. | Jul 2019 | B1 |
10380343 | Jung et al. | Aug 2019 | B1 |
10395029 | Steinberg | Aug 2019 | B1 |
10404725 | Rivlin et al. | Sep 2019 | B1 |
10417031 | Paithane et al. | Sep 2019 | B2 |
10430586 | Paithane et al. | Oct 2019 | B1 |
10432649 | Bennett et al. | Oct 2019 | B1 |
10445502 | Desphande et al. | Oct 2019 | B1 |
10447728 | Steinberg | Oct 2019 | B1 |
10454950 | Aziz | Oct 2019 | B1 |
10454953 | Amin et al. | Oct 2019 | B1 |
10462173 | Aziz et al. | Oct 2019 | B1 |
10467411 | Pidathala et al. | Nov 2019 | B1 |
10467414 | Kindlund | Nov 2019 | B1 |
10469512 | Ismael | Nov 2019 | B1 |
10474813 | Ismael | Nov 2019 | B1 |
10476906 | Siddiqui | Nov 2019 | B1 |
10476909 | Aziz et al. | Nov 2019 | B1 |
10491627 | Su | Nov 2019 | B1 |
10503904 | Singh et al. | Dec 2019 | B1 |
10505956 | Pidathala et al. | Dec 2019 | B1 |
10511614 | Aziz | Dec 2019 | B1 |
10515214 | Vincent et al. | Dec 2019 | B1 |
10523609 | Subramanian | Dec 2019 | B1 |
10528726 | Ismael | Jan 2020 | B1 |
10534906 | Paithane et al. | Jan 2020 | B1 |
10552610 | Vashisht et al. | Feb 2020 | B1 |
10554507 | Siddiqui et al. | Feb 2020 | B1 |
10565378 | Vincent et al. | Feb 2020 | B1 |
10567405 | Aziz | Feb 2020 | B1 |
10572665 | Jung et al. | Feb 2020 | B2 |
10581874 | Khalid et al. | Mar 2020 | B1 |
10581879 | Paithane et al. | Mar 2020 | B1 |
10581898 | Singh | Mar 2020 | B1 |
10587636 | Aziz et al. | Mar 2020 | B1 |
10587647 | Khalid et al. | Mar 2020 | B1 |
10592678 | Ismael et al. | Mar 2020 | B1 |
10601848 | Jeyaraman et al. | Mar 2020 | B1 |
10601863 | Siddiqui | Mar 2020 | B1 |
10601865 | Mesdaq et al. | Mar 2020 | B1 |
10616266 | Otvagin | Apr 2020 | B1 |
10621338 | Pfoh et al. | Apr 2020 | B1 |
10623434 | Aziz et al. | Apr 2020 | B1 |
10637880 | Islam et al. | Apr 2020 | B1 |
10642753 | Steinberg | May 2020 | B1 |
10657251 | Malik et al. | May 2020 | B1 |
10666686 | Singh et al. | May 2020 | B1 |
10671721 | Otvagin et al. | Jun 2020 | B1 |
10671726 | Paithane et al. | Jun 2020 | B1 |
10701091 | Cunningham et al. | Jun 2020 | B1 |
10706149 | Vincent | Jul 2020 | B1 |
10713358 | Sikorski et al. | Jul 2020 | B2 |
10713362 | Vincent et al. | Jul 2020 | B1 |
10715542 | Wei et al. | Jul 2020 | B1 |
10726127 | Steinberg | Jul 2020 | B1 |
10728263 | Neumann | Jul 2020 | B1 |
10735458 | Haq et al. | Aug 2020 | B1 |
10740456 | Ismael et al. | Aug 2020 | B1 |
10747872 | Ha et al. | Aug 2020 | B1 |
10757120 | Aziz et al. | Aug 2020 | B1 |
10757134 | Eyada | Aug 2020 | B1 |
10785255 | Otvagin et al. | Sep 2020 | B1 |
10791138 | Siddiqui et al. | Sep 2020 | B1 |
10795991 | Ross et al. | Oct 2020 | B1 |
10798112 | Siddiqui et al. | Oct 2020 | B2 |
10798121 | Khalid et al. | Oct 2020 | B1 |
10805340 | Goradia | Oct 2020 | B1 |
10805346 | Kumar et al. | Oct 2020 | B2 |
10812513 | Manni et al. | Oct 2020 | B1 |
10817606 | Vincent | Oct 2020 | B1 |
10826931 | Quan et al. | Nov 2020 | B1 |
10826933 | Ismael et al. | Nov 2020 | B1 |
10834107 | Paithane et al. | Nov 2020 | B1 |
10846117 | Steinberg | Nov 2020 | B1 |
10848397 | Siddiqui et al. | Nov 2020 | B1 |
10848521 | Thioux et al. | Nov 2020 | B1 |
10855700 | Jeyaraman et al. | Dec 2020 | B1 |
10868818 | Rathor et al. | Dec 2020 | B1 |
10868825 | Dominessy | Dec 2020 | B1 |
10872151 | Kumar et al. | Dec 2020 | B1 |
10873597 | Mehra et al. | Dec 2020 | B1 |
10887328 | Paithane et al. | Jan 2021 | B1 |
10893059 | Aziz et al. | Jan 2021 | B1 |
10893068 | Khalid et al. | Jan 2021 | B1 |
10902117 | Singh et al. | Jan 2021 | B1 |
10902119 | Vashisht et al. | Jan 2021 | B1 |
10904286 | Liu | Jan 2021 | B1 |
10929266 | Goradia et al. | Feb 2021 | B1 |
11038906 | Bingham | Jun 2021 | B1 |
20020038430 | Edwards et al. | Mar 2002 | A1 |
20020091819 | Melchione et al. | Jul 2002 | A1 |
20020095607 | Lin-Hendel | Jul 2002 | A1 |
20020169952 | DiSanto et al. | Nov 2002 | A1 |
20020184528 | Shevenell et al. | Dec 2002 | A1 |
20020188887 | Largman et al. | Dec 2002 | A1 |
20030084318 | Schertz | May 2003 | A1 |
20030188190 | Aaron et al. | Oct 2003 | A1 |
20030191957 | Hypponen et al. | Oct 2003 | A1 |
20040015712 | Szor | Jan 2004 | A1 |
20040019832 | Arnold et al. | Jan 2004 | A1 |
20040117478 | Triulzi et al. | Jun 2004 | A1 |
20040117624 | Brandt et al. | Jun 2004 | A1 |
20040236963 | Danford et al. | Nov 2004 | A1 |
20040255161 | Cavanaugh | Dec 2004 | A1 |
20040268147 | Wiederin et al. | Dec 2004 | A1 |
20050021740 | Bar et al. | Jan 2005 | A1 |
20050086523 | Zimmer et al. | Apr 2005 | A1 |
20050091513 | Mitomo et al. | Apr 2005 | A1 |
20050108562 | Khazan et al. | May 2005 | A1 |
20050125195 | Brendel | Jun 2005 | A1 |
20050149726 | Joshi et al. | Jul 2005 | A1 |
20050157662 | Bingham et al. | Jul 2005 | A1 |
20050238005 | Chen et al. | Oct 2005 | A1 |
20050262562 | Gassoway | Nov 2005 | A1 |
20050283839 | Cowburn | Dec 2005 | A1 |
20060010495 | Cohen et al. | Jan 2006 | A1 |
20060015715 | Anderson | Jan 2006 | A1 |
20060015747 | Van de Ven | Jan 2006 | A1 |
20060021029 | Brickell et al. | Jan 2006 | A1 |
20060031476 | Mathes et al. | Feb 2006 | A1 |
20060070130 | Costea et al. | Mar 2006 | A1 |
20060117385 | Mester et al. | Jun 2006 | A1 |
20060123477 | Raghavan et al. | Jun 2006 | A1 |
20060150249 | Gassen et al. | Jul 2006 | A1 |
20060161987 | Levy-Yurista | Jul 2006 | A1 |
20060173992 | Weber et al. | Aug 2006 | A1 |
20060191010 | Benjamin | Aug 2006 | A1 |
20060242709 | Seinfeld et al. | Oct 2006 | A1 |
20060251104 | Koga | Nov 2006 | A1 |
20060288417 | Bookbinder et al. | Dec 2006 | A1 |
20070006288 | Mayfield et al. | Jan 2007 | A1 |
20070006313 | Porras et al. | Jan 2007 | A1 |
20070011174 | Takaragi et al. | Jan 2007 | A1 |
20070016951 | Piccard et al. | Jan 2007 | A1 |
20070064689 | Shin et al. | Mar 2007 | A1 |
20070143827 | Nicodemus et al. | Jun 2007 | A1 |
20070157306 | Elrod et al. | Jul 2007 | A1 |
20070192858 | Lum | Aug 2007 | A1 |
20070208822 | Wang et al. | Sep 2007 | A1 |
20070240218 | Tuvell et al. | Oct 2007 | A1 |
20070240220 | Tuvell et al. | Oct 2007 | A1 |
20070240222 | Tuvell et al. | Oct 2007 | A1 |
20070250930 | Aziz et al. | Oct 2007 | A1 |
20080005782 | Aziz | Jan 2008 | A1 |
20080040710 | Chiriac | Feb 2008 | A1 |
20080072326 | Danford et al. | Mar 2008 | A1 |
20080077793 | Tan et al. | Mar 2008 | A1 |
20080134334 | Kim et al. | Jun 2008 | A1 |
20080141376 | Clausen et al. | Jun 2008 | A1 |
20080184367 | McMillan et al. | Jul 2008 | A1 |
20080189787 | Arnold et al. | Aug 2008 | A1 |
20080307524 | Singh et al. | Dec 2008 | A1 |
20080320594 | Jiang | Dec 2008 | A1 |
20090003317 | Kasralikar et al. | Jan 2009 | A1 |
20090064332 | Porras et al. | Mar 2009 | A1 |
20090083855 | Apap et al. | Mar 2009 | A1 |
20090125976 | Wassermann et al. | May 2009 | A1 |
20090126015 | Monastyrsky et al. | May 2009 | A1 |
20090144823 | Lamastra et al. | Jun 2009 | A1 |
20090158430 | Borders | Jun 2009 | A1 |
20090172815 | Gu et al. | Jul 2009 | A1 |
20090198651 | Shiffer et al. | Aug 2009 | A1 |
20090198670 | Shiffer et al. | Aug 2009 | A1 |
20090198689 | Frazier et al. | Aug 2009 | A1 |
20090199274 | Frazier et al. | Aug 2009 | A1 |
20090241190 | Todd et al. | Sep 2009 | A1 |
20090300589 | Watters et al. | Dec 2009 | A1 |
20100017546 | Poo et al. | Jan 2010 | A1 |
20100030996 | Butler, II | Feb 2010 | A1 |
20100058474 | Hicks | Mar 2010 | A1 |
20100077481 | Polyakov et al. | Mar 2010 | A1 |
20100115621 | Staniford et al. | May 2010 | A1 |
20100132038 | Zaitsev | May 2010 | A1 |
20100154056 | Smith et al. | Jun 2010 | A1 |
20100192223 | Ismael et al. | Jul 2010 | A1 |
20100281542 | Stolfo et al. | Nov 2010 | A1 |
20110078794 | Manni et al. | Mar 2011 | A1 |
20110093951 | Aziz | Apr 2011 | A1 |
20110099633 | Aziz | Apr 2011 | A1 |
20110099635 | Silberman et al. | Apr 2011 | A1 |
20110167493 | Song et al. | Jul 2011 | A1 |
20110173213 | Frazier et al. | Jul 2011 | A1 |
20110178942 | Watters et al. | Jul 2011 | A1 |
20110219450 | McDougal et al. | Sep 2011 | A1 |
20110225624 | Sawhney et al. | Sep 2011 | A1 |
20110247072 | Staniford et al. | Oct 2011 | A1 |
20110307954 | Melnik et al. | Dec 2011 | A1 |
20110307955 | Kaplan et al. | Dec 2011 | A1 |
20110307956 | Yermakov et al. | Dec 2011 | A1 |
20110314546 | Aziz et al. | Dec 2011 | A1 |
20120117652 | Manni et al. | May 2012 | A1 |
20120174186 | Aziz et al. | Jul 2012 | A1 |
20120174218 | McCoy et al. | Jul 2012 | A1 |
20120210423 | Friedrichs et al. | Aug 2012 | A1 |
20120222121 | Staniford et al. | Aug 2012 | A1 |
20120233698 | Watters et al. | Sep 2012 | A1 |
20120278886 | Luna | Nov 2012 | A1 |
20120331553 | Aziz et al. | Dec 2012 | A1 |
20130036472 | Aziz | Feb 2013 | A1 |
20130047257 | Aziz | Feb 2013 | A1 |
20130097706 | Titonis et al. | Apr 2013 | A1 |
20130185795 | Winn et al. | Jul 2013 | A1 |
20130227691 | Aziz et al. | Aug 2013 | A1 |
20130232577 | Watters et al. | Sep 2013 | A1 |
20130247186 | LeMasters | Sep 2013 | A1 |
20130282426 | Watters et al. | Oct 2013 | A1 |
20130291109 | Staniford et al. | Oct 2013 | A1 |
20130318038 | Shiffer et al. | Nov 2013 | A1 |
20130318073 | Shiffer et al. | Nov 2013 | A1 |
20130325791 | Shiffer et al. | Dec 2013 | A1 |
20130325792 | Shiffer et al. | Dec 2013 | A1 |
20130325871 | Shiffer et al. | Dec 2013 | A1 |
20130325872 | Shiffer et al. | Dec 2013 | A1 |
20140032875 | Butler | Jan 2014 | A1 |
20140181131 | Ross | Jun 2014 | A1 |
20140189687 | Jung et al. | Jul 2014 | A1 |
20140189866 | Shiffer et al. | Jul 2014 | A1 |
20140189882 | Jung et al. | Jul 2014 | A1 |
20140201836 | Amsler | Jul 2014 | A1 |
20140237600 | Silberman et al. | Aug 2014 | A1 |
20140259170 | Amsler | Sep 2014 | A1 |
20140280245 | Wilson | Sep 2014 | A1 |
20140283037 | Sikorski et al. | Sep 2014 | A1 |
20140283063 | Thompson et al. | Sep 2014 | A1 |
20140297494 | Watters et al. | Oct 2014 | A1 |
20140337836 | Ismael | Nov 2014 | A1 |
20140344926 | Cunningham et al. | Nov 2014 | A1 |
20140380473 | Bu et al. | Dec 2014 | A1 |
20140380474 | Paithane et al. | Dec 2014 | A1 |
20150007312 | Pidathala et al. | Jan 2015 | A1 |
20150096022 | Vincent et al. | Apr 2015 | A1 |
20150096023 | Mesdaq et al. | Apr 2015 | A1 |
20150096024 | Haq et al. | Apr 2015 | A1 |
20150096025 | Ismael | Apr 2015 | A1 |
20150180886 | Staniford et al. | Jun 2015 | A1 |
20150186645 | Aziz et al. | Jul 2015 | A1 |
20150199513 | Ismael et al. | Jul 2015 | A1 |
20150199531 | Ismael et al. | Jul 2015 | A1 |
20150199532 | Ismael et al. | Jul 2015 | A1 |
20150220735 | Paithane et al. | Aug 2015 | A1 |
20150372980 | Eyada | Dec 2015 | A1 |
20160004869 | Ismael et al. | Jan 2016 | A1 |
20160006756 | Ismael et al. | Jan 2016 | A1 |
20160044000 | Cunningham | Feb 2016 | A1 |
20160127393 | Aziz et al. | May 2016 | A1 |
20160191547 | Zafar et al. | Jun 2016 | A1 |
20160191550 | Ismael et al. | Jun 2016 | A1 |
20160241580 | Watters et al. | Aug 2016 | A1 |
20160241581 | Watters et al. | Aug 2016 | A1 |
20160261612 | Mesdaq et al. | Sep 2016 | A1 |
20160285914 | Singh et al. | Sep 2016 | A1 |
20160301703 | Aziz | Oct 2016 | A1 |
20160323295 | Joram et al. | Nov 2016 | A1 |
20160330219 | Hasan | Nov 2016 | A1 |
20160335110 | Paithane et al. | Nov 2016 | A1 |
20170083703 | Abbasi et al. | Mar 2017 | A1 |
20170331847 | Alexander | Nov 2017 | A1 |
20180013770 | Ismael | Jan 2018 | A1 |
20180048660 | Paithane et al. | Feb 2018 | A1 |
20180069891 | Watters et al. | Mar 2018 | A1 |
20180121316 | Ismael et al. | May 2018 | A1 |
20180124098 | Carver | May 2018 | A1 |
20180288077 | Siddiqui et al. | Oct 2018 | A1 |
20190104154 | Kumar et al. | Apr 2019 | A1 |
20190132334 | Johns et al. | May 2019 | A1 |
20190207966 | Vashisht et al. | Jul 2019 | A1 |
20190207967 | Vashisht et al. | Jul 2019 | A1 |
20190379705 | Murphy | Dec 2019 | A1 |
20200252428 | Gardezi et al. | Aug 2020 | A1 |
20200267170 | Mohanta | Aug 2020 | A1 |
20210136103 | Nishizuka | May 2021 | A1 |
Number | Date | Country |
---|---|---|
2439806 | Jan 2008 | GB |
2490431 | Oct 2012 | GB |
0206928 | Jan 2002 | WO |
0223805 | Mar 2002 | WO |
2007117636 | Oct 2007 | WO |
2008041950 | Apr 2008 | WO |
2011084431 | Jul 2011 | WO |
2011112348 | Sep 2011 | WO |
2012075336 | Jun 2012 | WO |
2012145066 | Oct 2012 | WO |
2013067505 | May 2013 | WO |
Entry |
---|
Venezia, Paul, “NetDetector Captures Intrusions”, InfoWorld Issue 27, (“Venezia”), (Jul. 14, 2003). |
Vladimir Getov: “Security as a Service in Smart Clouds—Opportunities and Concerns”, Computer Software and Applications Conference (COMPSAC), 2012 IEEE 36th Annual, IEEE, Jul. 16, 2012 (Jul. 16, 2012). |
Wahid et al., Characterising the Evolution in Scanning Activity of Suspicious Hosts, Oct. 2009, Third International Conference on Network and System Security, pp. 344-350. |
Whyte, et al., “DNS-Based Detection of Scanning Works in an Enterprise Network”, Proceedings of the 12th Annual Network and Distributed System Security Symposium, (Feb. 2005), 15 pages. |
Williamson, Matthew M., “Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code”, ACSAC Conference, Las Vegas, NV, USA, (Dec. 2002), pp. 1-9. |
Yuhei Kawakoya et al.: “Memory behavior-based automatic malware unpacking in stealth debugging environment”, Malicious and Unwanted Software (Malware), 2010 5th International Conference on, IEEE, Piscataway, NJ, USA, Oct. 19, 2010, pp. 39-46, XP031833827, ISBN:978-1-4244-8-9353-1. |
Zhang et al., The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation, Sep. 2009, IEEE 28th International Symposium on Reliable Distributed Systems, pp. 73-82. |
“Mining Specification of Malicious Behavior”—Jha et al., UCSB, Sep. 2007 httpsT/www.cs.ucsb.edu/.about.chris/research/doc/esec07.sub.-mining.pdf-. |
“Network Security: NetDetector—Network Intrusion Forensic System (NIFS) Whitepaper”, (“NetDetector Whitepaper”), (2003). |
“When Virtual is Better Than Real”, lEEEXplore Digital Library, available at, http://ieeexplore.ieee.org/xpl/articleDetails.isp?reload=true&arnumbe- r=990073, (Dec. 7, 2013). |
Abdullah, et al., Visualizing Network Data for Intrusion Detection, 2005 IEEE Workshop on Information Assurance and Security, pp. 100-108. |
Adetoye, Adedayo , et al., “Network Intrusion Detection & Response System”, (“Adetoye”), (Sep. 2003). |
Apostolopoulos, George; hassapis, Constantinos; “V-eM: A cluster of Virtual Machines for Robust, Detailed, and High-Performance Network Emulation”, 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Sep. 11-14, 2006, pp. 117-126. |
Aura, Tuomas, “Scanning electronic documents for personally identifiable information”, Proceedings of the 5th ACM workshop on Privacy in electronic society. ACM, 2006. |
Baecher, “The Nepenthes Platform: An Efficient Approach to collect Malware”, Springer-verlag Berlin Heidelberg, (2006), pp. 165-184. |
Bayer, et al., “Dynamic Analysis of Malicious Code”, J Comput Virol, Springer-Verlag, France., (2006), pp. 67-77. |
Boubalos, Chris , “extracting syslog data out of raw pcap dumps, seclists.org, Honeypots mailing list archives”, available at http://seclists.org/honeypots/2003/q2/319 (“Boubalos”), (Jun. 5, 2003). |
Chaudet, C., et al., “Optimal Positioning of Active and Passive Monitoring Devices”, International Conference on Emerging Networking Experiments and Technologies, Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, CoNEXT '05, Toulousse, France, (Oct. 2005), pp. 71-82. |
Chen, P. M. and Noble, B. D., “When Virtual is Better Than Real, Department of Electrical Engineering and Computer Science”, University of Michigan (“Chen”) (2001). |
Cisco “Intrusion Prevention for the Cisco ASA 5500-x Series” Data Sheet (2012). |
Cohen, M.I. , “PyFlag-An advanced network forensic framework”, Digital investigation 5, Elsevier, (2008), pp. S112-S120. |
Costa, M., et al., “Vigilante: End-to-End Containment of Internet Worms”, SOSP '05, Association for Computing Machinery, Inc., Brighton U.K , (Oct. 23-26, 2005). |
Didier Stevens, “Malicious PDF Documents Explained”, Security & Privacy, IEEE, IEEE Service Center, Los Alamitos, CA, US, vol. 9, No. 1, Jan. 1, 2011, pp. 80-82, XP011329453, ISSN: 1540-7993, DOI: 10 1109/MSP.2011.14. |
Distler, “Malware Analysis: An Introduction”, SANS Institute InfoSec Reading Room, SANS Institute, (2007). |
Dunlap, George W., et al., “ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay”, Proceeding of the 5th Symposium on Operating Systems Design and Implementation, USENIX Association, (“Dunlap”), (Dec. 9, 2002). |
FireEye Malware Analysis & Exchange Network, Malware Protection System, FireEye Inc., 2010. |
FireEye Malware Analysis, Modern Malware Forensics, FireEye Inc., 2010. |
FireEye v.6.0 Security Target, pp. 1-35, Version 1.1, FireEye Inc., May 2011. |
Goel, et al., Reconstructing System State for Intrusion Analysis, Apr. 2008 SIGOPS Operating Systems Review, vol. 42 Issue 3, pp. 21-28. |
Gregg Keizer: “Microsoft's HoneyMonkeys Show Patching Windows Works”, Aug. 8, 2005, XP055143386, Retrieved from the Internet: URL:http://www.informationweek.com/microsofts-honeymonkeys-show-patching-windows-works/d/d-id/1035069? [retrieved on Jun. 1, 2016]. |
Heng Yin et al, Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis, Research Showcase @ CMU, Carnegie Mellon University, 2007. |
Hiroshi Shinotsuka, Malware Authors Using New Techniques to Evade Automated Threat Analysis Systems, Oct. 26, 2012, http://www.symantec.com/connect/blogs/, pp. 1-4. |
Idika et al., A-Survey-of-Malware-Detection-Techniques, Feb. 2, 2007, Department of Computer Science, Purdue University. |
Isohara, Takamasa, Keisuke Takemori, and Ayumu Kubota. “Kernel-based behavior analysis for android malware detection.” Computational intelligence and Security (CIS), 2011 Seventh International Conference on. IEEE, 2011. |
Kaeo, Merike , “Designing Network Security”, (“Kaeo”), (Nov. 2003). |
Kevin A Roundy et al.: “Hybrid Analysis and Control of Malware”, Sep. 15, 2010, Recent Advances in Intrusion Detection, Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 317-338, XP019150454 ISBN:978-3-642-15511-6. |
Khaled Salah et al.: “Using Cloud Computing to Implement a Security Overlay Network”, SECURITY & Privacy, IEEE, IEEE Service Center, Los Alamitos, CA, US, vol. 11, No. 1, Jan. 1, 2013 (Jan. 1, 2013). |
Kim, H. , et al., “Autograph: Toward Automated, Distributed Worm Signature Detection”, Proceedings of the 13th Usenix Security Symposium (Security 2004), San Diego, (Aug. 2004), pp. 271-286. |
King, Samuel T., et al., “Operating System Support for Virtual Machines”, (“King”), (2003). |
Kreibich, C. , et al., “Honeycomb-Creating Intrusion Detection Signatures Using Honeypots”, 2nd Workshop on Hot Topics in Networks (HotNets-11), Boston, USA, (2003). |
Kristoff, J., “Botnets, Detection and Mitigation: DNS-Based Techniques”, NU Security Day, (2005), 23 pages. |
Lastline Labs, The Threat of Evasive Malware, Feb. 25, 2013, Lastline Labs, pp. 1-8. |
Li et al., A VMM-Based System Call Interposition Framework for Program Monitoring, Dec. 2010, IEEE 16th International Conference on Parallel and Distributed Systems, pp. 706-711. |
Lindorfer, Martina, Clemens Kolbitsch, and Paolo Milani Comparetti. “Detecting environment-sensitive malware.” Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2011. |
Marchette, David J., “Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint”, (“Marchette”), (2001). |
Moore, D. , et al., “Internet Quarantine: Requirements for Containing Self-Propagating Code”, INFOCOM, vol. 3, (Mar. 30-Apr. 3, 2003), pp. 1901-1910. |
Morales, Jose A., et al., ““Analyzing and exploiting network behaviors of malware.””, Security and Privacy in Communication Networks. Springer Berlin Heidelberg, 2010. 20-34. |
Mori, Detecting Unknown Computer Viruses, 2004, Springer-Verlag Berlin Heidelberg. |
Natvig, Kurt, “SANDBOXII: Internet”, Virus Bulletin Conference, (“Natvig”), (Sep. 2002). |
NetBIOS Working Group. Protocol Standard fora NetBIOS Service on a TCP/UDP transport: Concepts and Methods. STD 19, RFC 1001, Mar. 1987. |
Newsome, J. , et al., “Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software”, In Proceedings of the 12th Annual Network and Distributed System Security, Symposium (NDSS '05), (Feb. 2005). |
Nojiri, D. , et al., “Cooperation Response Strategies for Large Scale Attack Mitigation”, DARPA Information Survivability Conference and Exposition, vol. 1, (Apr. 22-24, 2003), pp. 293-302. |
Oberheide et al., CloudAV.sub.-N-Version Antivirus in the Network Cloud, 17th USENIX Security Symposium USENIX Security '08 Jul. 28-Aug. 1, 2008 San Jose, CA. |
Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Roonald Perez, Leendert van Doorn, John Linwood Griffin, Stefan Berger., sHype: Secure Hypervisor Appraoch to Trusted Virtualized Systems (Feb. 2, 2005) (“Sailer”). |
Silicon Defense, “Worm Containment in the Internal Network”, (Mar. 2003), pp. 1-25. |
Singh, S. , et al., “Automated Worm Fingerprinting”, Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, San Francisco, California, (Dec. 2004). |
Thomas H. Ptacek, and Timothy N. Newsham , “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”, Secure Networks, (“Ptacek”), (Jan. 1998). |
Number | Date | Country | |
---|---|---|---|
62787050 | Dec 2018 | US |