×

Systems and methods for evaluating infection risks based on profiled user behaviors

  • US 10,116,680 B1
  • Filed: 06/21/2016
  • Issued: 10/30/2018
  • Est. Priority Date: 06/21/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for evaluating infection risks based on profiled user behaviors, at least a portion of the method being performed by a computing device comprising at least one hardware processor, the method comprising:

  • collecting, by the computing device comprising the at least one hardware processor, a plurality of user-behavior profiles that comprises at least one of;

    a plurality of labeled profiles that comprises at least one of;

    a plurality of infected profiles, wherein each of the plurality of infected profiles comprises a profile of user behaviors that occurred at an associated infected computing system that is known to have encountered malware;

    ora plurality of clean profiles, wherein each of the plurality of clean profiles comprises a profile of user behaviors that occurred at an associated clean computing system that is known to be free of malware;

    ora plurality of unlabeled profiles, wherein each of the plurality of unlabeled profiles comprises a profile of user behaviors that occurred at an associated computing system that is not known to have encountered malware and not known to be free of malware;

    training, using features and labels of the plurality of user-behavior profiles, a decision tree to distinguish infected profiles from clean profiles by;

    determining, at each internal node in the decision tree, whether there are any infected profiles, clean profiles, or unlabeled profiles at the internal node; and

    selecting, from a plurality of splitting rules based on whether there are any infected profiles, clean profiles, or unlabeled profiles at the internal node, a suitable splitting rule to apply at the internal node; and

    using the decision tree to predict at least one of;

    a likelihood that a computing system of a user will become infected based at least in part on a profile of user behaviors of the user;

    ora likelihood that a user behavior in the plurality of user-behavior profiles will result in a computing-system infection.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×