×

Cybersecurity systems and techniques

  • US 10,423,787 B2
  • Filed: 02/23/2017
  • Issued: 09/24/2019
  • Est. Priority Date: 02/23/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented cybersecurity method comprising:

  • generating a log indicating a plurality of operations performed by a process and a plurality of respective times associated with the operations;

    generating a process fingerprint of the process, wherein the process fingerprint identifies the process based, at least in part, on dynamic features of the process;

    comparing the process fingerprint to a plurality of process fingerprints; and

    based, at least in part, on a result of the comparison indicating that the process fingerprint matches a process fingerprint included in the plurality of process fingerprints, performing a data reduction operation on data associated with the process, wherein performing the data reduction operation on the data associated with the process comprises deleting the log,wherein generating the process fingerprint comprises performing a cryptographic hash operation on data representing dynamic features of the process, andwherein the data representing dynamic features of the process comprises data characterizing modules loaded by the process, data characterizing file operations associated with the process, data characterizing registry operations performed by the process, data characterizing network activity associated with the process, and/or data characterizing inter-process operations performed by the process.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×