×

Identifying malware-suspect end points through entropy changes in consolidated logs

  • US 10,440,037 B2
  • Filed: 03/31/2017
  • Issued: 10/08/2019
  • Est. Priority Date: 03/31/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method to detect a malware attack, the method comprising:

  • monitoring an event log of a first device, the event log to identify events associated with the first device;

    determining, by executing an instruction with at least one hardware processor, an expected rate of log entries during a time window;

    identifying, by executing an instruction with the at least one hardware processor, that an actual rate of log entries during the time window satisfies a threshold;

    in response to the identifying that the actual rate of log entries during the time window satisfies the threshold, (i) calculating, by executing an instruction with the at least one hardware processor, a confidence value associated with the first device being compromised, the confidence value calculated based on the expected rate of log entries, the actual rate of log entries, and a standard deviation of the actual rate of log entries, and (ii) determining, by executing an instruction with the at least one hardware processor, whether the first device is compromised based on the confidence value; and

    performing an action in response to determining that the first device is compromised.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×