Please download the dossier by clicking on the dossier button x
×

MITIGATING MALICIOUS FILE PROPAGATION WITH PROGRESSIVE IDENTIFIERS

  • US 20110138465A1
  • Filed: 12/03/2009
  • Published: 06/09/2011
  • Est. Priority Date: 12/03/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of interdicting a propagation of a malicious file in a computer network, said method comprising:

  • a computer determining one or more segments of a first computer file and a final segment of said first file by determining a series of sizes of segments defined by a function ƒ

    , wherein said first file is being transferred to a first computer system via a network;

    said computer receiving said one or more segments of said first file;

    said computer determining one or more signatures that identify said one or more segments of said first file by applying a hash function to each segment of said one or more segments of said first file;

    said computer receiving said final segment of said first file;

    said computer determining a signature that identifies said final segment of said first file by applying said hash function to said final segment of said first file;

    said computer determining a complete match between a first progressive identifier (pID) of said first file and a second pID of another file (malicious file) by determining a first match between said one or more signatures that identify said one or more segments of said first file and one or more signatures that identify one or more segments of said malicious file and by determining a second match between said signature that identifies said final segment of said first file and a signature of a last segment of said malicious file, wherein said malicious file is another computer file identified as including malicious code, wherein said first pID includes a first series of signatures consisting of said one or more signatures that identify said one or more segments of said first file followed by said signature that identifies said final segment of said first file, and wherein said second pID includes a second series of signatures consisting of said one or more signatures that identify said one or more segments of said malicious file followed by said signature that identifies said final segment of said malicious file;

    responsive to the step of determining said first match and prior to the step of determining said second match, said computer transferring said one or more segments of said first file to said first computer system; and

    responsive to the step of determining said complete match, a processor of said computer identifying said first file as being said malicious file and interdicting a transfer of said final segment of said first file to said first computer system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×