Malware detection verification and enhancement by coordinating endpoint and malware detection systems
First Claim
1. A system to determine maliciousness of an object, comprising:
- a first endpoint, including at least one processor, configured with a first software profile, further configured to detect one or more features exhibited by an object during processing by the first endpoint and determine if the features detected are suspicious;
a malware detection system, including at least one processor, communicatively coupled directly or indirectly to the first endpoint over a network, the malware detection system configured to process a received object in a virtual machine of one or more virtual machines that operate within the malware detection system to detect one or more features in response to the first endpoint determining the features of the object are suspicious, the virtual machine being provisioned with the first software profile;
a security logic engine configured to (i) receive information associated with features detected, during processing of the object, by the first endpoint and by the virtual machine of the malware detection system, (ii) correlate the received information associated with the received features, (iii) generate a first determination of maliciousness of the object, and (iv) in response to the generation of the first determination of maliciousness of the object, issue an alert,wherein the security logic engine is further configured to direct the malware detection system to process the object within a second virtual machine of the one or more virtual machines that is provisioned with a second software profile, in response to receipt of information associated with features from a second endpoint with the second software profile.
7 Assignments
0 Petitions
Accused Products
Abstract
Computerized techniques to determine and verify maliciousness of an object are described. An endpoint device, during normal processing of an object, identifies the object as suspicious in response to detected features of the object and coordinates further analysis with a malware detection system. The malware detection system processes the object, collects features related to processing, and analyzes the features of the suspicious object to classify as malicious or benign. Correlation of the features captured by the endpoint device and the malware detection system may verify a classification by the malware detection system of maliciousness of the content. The malware detection system may communicate with the one or more endpoint devices to influence detection and reporting of behaviors by those device(s).
-
Citations
19 Claims
-
1. A system to determine maliciousness of an object, comprising:
-
a first endpoint, including at least one processor, configured with a first software profile, further configured to detect one or more features exhibited by an object during processing by the first endpoint and determine if the features detected are suspicious; a malware detection system, including at least one processor, communicatively coupled directly or indirectly to the first endpoint over a network, the malware detection system configured to process a received object in a virtual machine of one or more virtual machines that operate within the malware detection system to detect one or more features in response to the first endpoint determining the features of the object are suspicious, the virtual machine being provisioned with the first software profile; a security logic engine configured to (i) receive information associated with features detected, during processing of the object, by the first endpoint and by the virtual machine of the malware detection system, (ii) correlate the received information associated with the received features, (iii) generate a first determination of maliciousness of the object, and (iv) in response to the generation of the first determination of maliciousness of the object, issue an alert, wherein the security logic engine is further configured to direct the malware detection system to process the object within a second virtual machine of the one or more virtual machines that is provisioned with a second software profile, in response to receipt of information associated with features from a second endpoint with the second software profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computerized method to determine maliciousness of an object, comprising:
-
conducting an analysis of the object determined to be suspicious based on a first set of features associated with the object, by a first virtual machine of a malware detection system, in response to a first endpoint of a plurality of endpoints determining the object is suspicious, the analysis comprising (i) receiving the object by the malware detection system, and (ii) identifying a second set of features associated with the object during analysis by the malware detection system, the first virtual machine being provisioned with a first software profile; receiving information associated with the first set of features and information associated with the second set of features by a security logic engine; generating a first determination of maliciousness of the object, by correlating the received information associated with the first set of features and the second set of features with features of known malicious and benign objects and classifying the object in response to the correlation of the received information, by the security logic engine; generating a first alert to report the first determination of maliciousness; and conducting an analysis of the object by a second virtual machine of the malware detection system in response to the security logic engine identifying a threat vector associated with at least a second endpoint of the plurality of endpoints different than the first endpoint, the second virtual machine being provisioned with a second software profile different than the first software profile. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification