SYSTEM, METHOD, AND APPARATUS FOR PROVIDING NETWORK SECURITY
First Claim
Patent Images
1. A method, comprising:
- proactively monitoring activity of a networked computing device in real-time;
in response to monitoring the activity of the networked computing device, determining that potential malware has been received at the networked computing device; and
in response to determining that potential malware has been received at the networked computing device, placing the potential malware into an isolation hypervisor for analysis.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatuses for proactively protecting a computing network are disclosed. A proactive security mechanism is disclosed, among other things, with the ability to monitor a protected domain in real-time and safely identify inoculation procedures for responding to threats introduced to the protected domain via malware. The proactive security mechanism includes an Artificial Neural Network Interface (ANNI) configured to execute at least some features of the proactive security mechanism.
-
Citations
11 Claims
-
1. A method, comprising:
-
proactively monitoring activity of a networked computing device in real-time; in response to monitoring the activity of the networked computing device, determining that potential malware has been received at the networked computing device; and in response to determining that potential malware has been received at the networked computing device, placing the potential malware into an isolation hypervisor for analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium comprising processor-executable instructions that, when executed by a processor, perform a method, the method comprising:
-
proactively monitoring activity of a networked computing device in real-time; in response to monitoring the activity of the networked computing device, determining that potential malware has been received at the networked computing device; and in response to determining that potential malware has been received at the networked computing device, placing the potential malware into an isolation hypervisor for analysis.
-
Specification