×

Malicious software detection in a computing system

  • US 10,728,277 B2
  • Filed: 10/01/2018
  • Issued: 07/28/2020
  • Est. Priority Date: 11/06/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer system for detecting malicious software, the computer system comprising:

  • one or more computer-readable storage devices including computer executable instructions; and

    one or more processors configured to execute the computer executable instructions in order to;

    access connection records that include respective locational references to computerized resources external to a local network which computerized devices within the local network have accessed or attempted to access;

    perform one or more filtering operations on the connection records, wherein the one or more filtering operations include;

    identifying, within the connection records, a first subset of the connection records associated with a first locational reference;

    determining first n-gram distribution data indicating a frequency of each n-length character combination that occurs as an n-length window moves across at least parts of one or more filepaths associated with the first subset of the connection records, the n-lengths being two or more characters;

    accessing second n-gram distribution data representing an expected n-gram distribution associated with likely non-malicious locational references;

    comparing the first n-gram distribution data with the second n-gram distribution data to determine a variance; and

    at least in part in response to the variance exceeding a threshold, transmitting an indicator for display, the indicator indicating the first locational reference is likely to compromise security;

    score at least some of the first subset of the connection records using a machine learning model incorporating a factor relating to the first locational reference; and

    perform one or more additional filtering operations on the scored first subset of the connection records to identify a second subset of the scored first subset of the connection records,wherein the one or more additional filtering operations identify, within the scored first subset of the connection records, the second subset of the scored first subset of the connection records, and the second subset of the scored first subset of the connection records are more likely to be malicious than locational references associated with connection records in the scored first subset of the connection records that are not included in the second subset of the scored first subset of the connection records.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×