×

System and method for determining summary events of an attack

  • US 10,291,634 B2
  • Filed: 12/08/2016
  • Issued: 05/14/2019
  • Est. Priority Date: 12/09/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method of using a particular computer to isolate certain events indicative of an attack on a computerized end point, comprising:

  • using the particular computer to generate an attack tree corresponding to an attack on a computerized end point, the attack tree comprising events based on processes performed by the computerized end point associated with the attack;

    using the particular computer to analyze the events of the attack tree by;

    a) isolating primary events, from the events of the attack tree, associated with the attack on the computerized end point, including events of the attack tree;

    1) where at least one of data, applications, and credentials, associated with the computerized end point, are at least one of maliciously;

    manipulated, altered or compromised;

    or,2) indicative of abnormal process behavior or known behaviors common to malicious activity;

    b) wherein each isolated primary event is unique from every other isolated primary event;

    c) isolating secondary events, from the remaining events of the attack tree, associated with the attack on the computerized end point including at least one of;

    network events, file create/delete/modify/rename/copy events, registry modification events, predefined events associated with potential malicious behaviors of interest, and, hook and code injections; and

    ,d) wherein each isolated secondary event is unique from every other isolated primary event and every other isolated secondary event; and

    ,using the particular computer to provide a description of the attack on the computerized end point by selectively using the unique isolated primary and unique isolated secondary events.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×