×

Method of malware detection and system thereof

  • US 10,664,596 B2
  • Filed: 06/15/2017
  • Issued: 05/26/2020
  • Est. Priority Date: 08/11/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of detecting malware in real-time in an operating system of an environment, the method comprising:

  • monitoring, by a computer system, a sequence of linked operations performed by a program running in the operating system;

    generating, by the computer system, an event data characterizing each monitored operation, wherein the event data comprises, for each monitored operation, at least an operation type and a source of the operation;

    building, by the computer system, a stateful model in accordance with the event data, wherein the stateful model comprises a data structure representing a real-time updated system state resulting from the sequence of linked operations, and wherein the building the stateful model comprises;

    retrieving one or more objects associated with the event data, each of the one or more objects representing an entity involved in one of the monitored operations, the retrieved one or more objects comprising at least one object for each monitored operation that represents the source of the operation;

    determining one or more relationships among the one or more objects in accordance with the event data, the determined relationships comprising at least the type of each monitored operation and one or more interconnections between the objects of one monitored operation and the objects of another monitored operation;

    inferring an event context comprising the one or more objects and the determined relationships thereof; and

    generating a stateful model comprising the event context if the monitored operation is a first monitored operation or otherwise updating an existing stateful model based at least in part on the event context, thereby building an updated stateful model representing a hierarchical structure comprising one or more entities involved in the sequence of linked operations and interconnections between the one or more entities resulting from the linked operations;

    analyzing, by the computer system, the updated stateful model in accordance with one or more predefined behavioral logics that are indicative of specific behavioral patterns;

    identifying, by the computer system, from the updated stateful model, one or more kernel related operations as operations of interest, wherein the one or more kernel related operations comprise one or more operations performed in a kernel space of the operating system;

    monitoring, by the computer system, the operations of interest by registering one or more kernel filter drivers for the one or more kernel related operations via one or more callback functions using an Out-of-Band monitoring module; and

    determining, by the computer system, part or all of the program to be malicious based at least in part on the monitored operations of interest, wherein determining part or all of the program to be malicious comprises;

    determining a presence of at least one behavior upon any of the predefined behavioral logics being met, the at least one behavior related to a sequence of events of the stateful model;

    determining a behavior score for the at least one behavior;

    assigning a weight factor to each behavior score associated with the at least one behavior, wherein the behavior score indicates the likelihood of the presence of malware based on the at least one behavior;

    searching if there is a previous stateful model score associated with the existing stateful model;

    if not, determining a sum of respective weighted behavioral scores assigned for each of the at least one behavior as the stateful model score associated with the stateful models;

    otherwise increasing the previous stateful model score with the sum, giving rise to the stateful model score; and

    comparing the stateful model score with a predefined threshold and determining the presence of malware if the stateful model score passes the predefined threshold,wherein the computer system comprises a computer processor and an electronic storage medium.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×