OPTIMIZED RESOURCE ALLOCATION FOR VIRTUAL MACHINES WITHIN A MALWARE CONTENT DETECTION SYSTEM
First Claim
Patent Images
1. A computerized method comprising:
- determining software profile information associated with incoming content;
determining, by virtual machine provisioning logic, whether a first virtual machine instance operating with a first software profile that corresponds to the software profile information is currently running, the first virtual machine instance being allocated resources to provide a first virtual execution environment at a prescribed virtual operating state;
instantiating a second virtual machine instance operating with the first software profile to conduct malware analysis on the incoming content, the second virtual machine instance being provided access to the resources allocated for use by the first virtual machine instance.
5 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, a computerized method comprises operations of instantiating a first virtual machine instance and a second virtual machine instance to run concurrently with the first virtual machine instance. The first virtual machine instance provides a first virtual operating environment while the second virtual machine instance is adapted to share the resources allocated to the first virtual machine instance. The second virtual machine instance is further adapted to allocate additional resources upon conducting a Copy-On Write operation.
343 Citations
27 Claims
-
1. A computerized method comprising:
-
determining software profile information associated with incoming content; determining, by virtual machine provisioning logic, whether a first virtual machine instance operating with a first software profile that corresponds to the software profile information is currently running, the first virtual machine instance being allocated resources to provide a first virtual execution environment at a prescribed virtual operating state; instantiating a second virtual machine instance operating with the first software profile to conduct malware analysis on the incoming content, the second virtual machine instance being provided access to the resources allocated for use by the first virtual machine instance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computerized method comprising:
-
determining software profile information associated with incoming content; instantiating a first set of virtual machine instances to conduct malware analysis on the incoming content, each virtual machine instance of the first set of virtual machine instances being placed into a first virtual operating state with shared access to a first resource; and instantiating a second set of virtual machine instances to conduct malware analysis on the incoming content, each virtual machine instance of the second set of virtual machine instances being placed into a second virtual operating state with access to a second resource different than the first resource. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. An electronic device, comprising:
-
a network port adapted to receive incoming content; and a controller coupled to the network port, the controller to (i) determine software profile information associated with the incoming content, (ii) determine whether a first virtual machine instance operating with a first software profile that corresponds to the software profile information is currently running, the first virtual machine instance being allocated resources to provide a first virtual execution environment at a prescribed virtual operating state, and (iii) instantiate a second virtual machine instance operating with the first software profile to conduct malware analysis on the incoming content, the second virtual machine instance being provided access to the resources allocated for use by the first virtual machine instance. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A malware content detection system, comprising:
-
a network port adapted to receive incoming content; and a controller coupled to the network port, the controller to (i) determine software profile information associated with the incoming content, (ii) instantiate a first virtual machine instance that is based on a first software profile corresponding to the software profile information to conduct malware analysis on incoming content, the first virtual machine instance being placed into an initial virtual operating state with access to a first resource allocated to be shared with other virtual machine instances that are based on the first software profile, and (iii) allocate access to a second resource different from the first resource through a Copy-On-Write operation if a portion of the first resource is to be written to during execution of the first virtual machine instance.
-
Specification