×

Identification of suspicious system processes

  • US 10,423,789 B2
  • Filed: 04/03/2017
  • Issued: 09/24/2019
  • Est. Priority Date: 04/03/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • based on receipt of a record of at least a first process executing on a first end-point device in an enterprise network, identifying a set of one or more parameters associated with the first process;

    identifying, corresponding to the identified set of one or more parameters, a first time pointer at which the first process was initiated;

    identifying a second time pointer at which a second process was initiated on the first end-point device by a first user associated with the first end-point device;

    determining that the second time pointer occurred before the first time pointer and that the first process was not initiated by the first user based, at least in part, on the set of one or more parameters;

    determining that the first process is registered in a list of authorized processes for the enterprise network;

    identifying the first process as a suspicious process based, at least in part, on the determinations that the second time pointer occurs prior to the first time pointer, that the first process is not registered in the list of authorized processes, and that the first process was not initiated by the first user; and

    generating an alert corresponding to identification of the first process as a suspicious process.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×