Method for detecting malware within network content
First Claim
1. A method for detecting malicious content within a data storage device, the method comprising:
- quarantining data associated with a first digital device by at least (i) redirecting at least a portion of the data that is transmitted from the first digital device to a controller remotely located from the second digital device for analysis;
receiving, by the controller, the redirected data from the first digital device;
analyzing the redirected data in accordance with a first analysis to determine whether the first digital device is associated with a malicious attack, the first analysis being selected from a plurality of analyses, including the first analysis and a second analysis having a different depth of analysis than the first analysis, based on an estimated amount of time needed for an analysis of the redirected data without exceeding a predetermined time allotted for the analysis; and
providing a warning signal based on a determination that the first digital device is associated with a malicious attack.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for detecting malicious content are provided. In an exemplary embodiment, a method for detecting malicious content is described that detects when a client device has access to a remote network server of a communication network. The client device includes one or more processors. Thereafter, a controller being a device separate from the client device, activates one or more security programs within the remote network server. The security programs enable the controller to analyze data stored within or transmitted from the remote network server. Lastly, the controller analyzing the data to determine whether the data includes malware.
-
Citations
20 Claims
-
1. A method for detecting malicious content within a data storage device, the method comprising:
-
quarantining data associated with a first digital device by at least (i) redirecting at least a portion of the data that is transmitted from the first digital device to a controller remotely located from the second digital device for analysis; receiving, by the controller, the redirected data from the first digital device; analyzing the redirected data in accordance with a first analysis to determine whether the first digital device is associated with a malicious attack, the first analysis being selected from a plurality of analyses, including the first analysis and a second analysis having a different depth of analysis than the first analysis, based on an estimated amount of time needed for an analysis of the redirected data without exceeding a predetermined time allotted for the analysis; and providing a warning signal based on a determination that the first digital device is associated with a malicious attack. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for detecting malicious content within a data storage device, the method comprising:
-
quarantining data associated with a first digital device by (i) redirecting at least a portion of the data, being transmitted from the first digital device to a second digital device, to a controller remotely located from the second digital device for analysis and (ii) intercepting one or more requests from the first digital device; receiving, by the controller, the redirected data from the first device; determining an estimated amount of time needed for an analysis of the redirected data; selecting a first analysis from a plurality of analysis, including the first analysis and a second analysis being independent of the first analysis, based on the estimated amount of time; analyzing the redirected data in accordance with the first analysis to determine whether the first digital device is associated with a malicious attack without exceeding a predetermined time allotted for the first analysis; and providing a warning signal based on a determination that the first digital device is associated with a malicious attack. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification