×

Multiplexed—proactive resiliency system

  • US 10,430,584 B2
  • Filed: 09/11/2017
  • Issued: 10/01/2019
  • Est. Priority Date: 09/11/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for machine-learned detection and removal of malicious software within a network, the method comprising:

  • recording, within a trace data repository, environment behavior of;

    a network application; and

    a plurality of network components that communicate with the application;

    based on the recorded environment behavior, generating a baseline dataset within the trace data repository,scheduling a plurality of snapshots of the application, each of the snapshots occurring at a predetermined periodic interval;

    capturing a first snapshot of the application and the plurality of components, the first snapshot corresponding to one of the plurality of scheduled snapshots;

    storing the first snapshot in the trace data repository;

    monitoring the application and the plurality of components, using the stored snapshots and the baseline dataset, for any deviation in the environment behavior;

    detecting a first deviation in the environment behavior of the application or the plurality of components;

    in response to detecting a first deviation, capturing a second snapshot of the application and the plurality of components, the second snapshot being inconsistent with the plurality of scheduled snapshots;

    transmitting the second snapshot as an alert to one or more stakeholders associated with the application;

    receiving a flag from the one or more stakeholders relating to the first deviation, the flag identifying the first deviation as intended or unwarranted;

    detecting a second deviation included in the application or the plurality of components;

    identifying a second deviation as intended or unwarranted based on the received flag;

    upon determining that the second deviation is unwarranted, and, therefore, is directed to malicious software, reverting the application and the plurality of components back to a previous version of the application and the plurality of components, thereby removing the malicious software; and

    upon determining that the second deviation is intended, storing the intended deviation in a log of verified intended deviations.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×