×

Distributed systems and methods for automatically detecting unknown bots and botnets

  • US 10,200,384 B1
  • Filed: 08/29/2016
  • Issued: 02/05/2019
  • Est. Priority Date: 03/14/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system for detecting malicious callbacks from malicious code, comprising:

  • a first local analyzer to capture packets that are part of communications over a network, generate a signature from information obtained from at least one captured packet of the captured packets, determine whether the signature matches any signature of a first plurality of signatures stored in a first storage device that is accessible to the first local analyzer, and determine whether the at least one captured packet includes an anomaly in response to the signature failing to match any of the signatures of the first plurality of signatures; and

    a central analyzer, including a processor and a memory, remotely located and communicatively coupled to the first local analyzer, the central analyzer to receive a portion of the information and the signature from the first local analyzer in response to the signature failing to match any of the signatures stored in the first storage device, the central analyzer including logic that, upon execution by the processor, is configured to determine whether the signature matches a verified callback signature being a signature associated with malware callback stored within a second storage device that is accessible to the central analyzer, the second storage device including a second plurality of signatures that is greater in number than the first plurality of signatures, whereinin response to the signature failing to match any verified callback signature stored within the second data storage device, the central analysis to (i) perform an analysis on the portion of the information obtained from the at least one captured packet that is provided to the central analyzer;

    (ii) determine whether the at least one captured packet is associated with a malicious callback; and

    (iii) store a designation identifying that the at least one captured packet is associated with the malicious callback with the signature associated with the at least one captured packet in the second storage device.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×