×

Traffic simulation to identify malicious activity

  • US 10,084,806 B2
  • Filed: 08/30/2013
  • Issued: 09/25/2018
  • Est. Priority Date: 08/31/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • using a dynamic analysis system comprising a processor in communication with a network;

    receiving, by the processor, a copy of a malware program;

    loading, using the processor, the copy of the malware program into a simulated endpoint;

    executing, using the processor, the copy of the malware program in the simulated endpoint, the simulated endpoint being within the dynamic analysis system;

    generating, based on the execution, network traffic at the simulated endpoint for the malware program, the traffic being generated by the malware program for communicating with a network infrastructure;

    receiving, using the processor, network traffic intended for the malware program at the simulated endpoint;

    monitoring, using the processor, the traffic to and from the malware program on the simulated endpoint;

    assessing, using the processor, the network traffic on the simulated endpoint to determine at least one of a source and a destination for the traffic on the simulated endpoint, and content of the traffic on the simulated endpoint; and

    capturing using the processor, metadata associated with the traffic on the simulated endpoint and storing the metadata in the database; and

    using a comparison system comprising a processor;

    comparing, using the processor of the comparison system, metadata associated with observed network traffic to the metadata associated with the traffic on the simulated endpoint to determine whether the metadata associated with the observed network traffic and the metadata associated with the traffic on the simulated endpoint are statistically similar;

    when the metadata associated with the observed network traffic and the metadata associated with the traffic on the simulated endpoint are not statistically similar, generating a low infection confidence score associated with the observed network traffic; and

    when the metadata associated with the suspicious network traffic and the metadata associated with the on the simulated endpoint are statistically similar, generating a high infection confidence score associated with the observed network traffic, the high infection confidence score being higher than the low infection confidence score.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×