SYSTEM AND METHOD FOR MALWARE DETECTION LEARNING
First Claim
1. A method, comprising:
- monitoring a protected computer network that is to be protected from malicious software, and an infected computer network that is known to be infected with malicious software;
extracting, from both the protected computer network and the infected computer network, first communication transactions that are known to be malicious;
extracting, only from the protected computer network, second communication transactions that are not known to be malicious; and
identifying one or more malicious communication transactions exchanged with the protected computer network, by processing the first and second communication transactions.
3 Assignments
0 Petitions
Accused Products
Abstract
Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The system distinguishes between malware transactions and innocent transactions using malware identification models, which it adapts using machine learning algorithms. However, the number and variety of malicious transactions that can be obtained from the protected network are often too limited for effectively training the machine learning algorithms. Therefore, the system obtains additional malicious transactions from another computer network that is known to be relatively rich in malicious activity. The system is thus able to adapt the malware identification models based on a large number of positive examples—The malicious transactions obtained from both the protected network and the infected network. As a result, the malware identification models are adapted with high speed and accuracy.
-
Citations
18 Claims
-
1. A method, comprising:
-
monitoring a protected computer network that is to be protected from malicious software, and an infected computer network that is known to be infected with malicious software; extracting, from both the protected computer network and the infected computer network, first communication transactions that are known to be malicious; extracting, only from the protected computer network, second communication transactions that are not known to be malicious; and identifying one or more malicious communication transactions exchanged with the protected computer network, by processing the first and second communication transactions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a network interface, which is configured to monitor a protected computer network that is to be protected from malicious software, and an infected computer network that is known to be infected with malicious software; and a processor, which is configured to extract, from both the protected computer network and the infected computer network, first communication transactions that are known to be malicious, to extract, only from the protected computer network, second communication transactions that are not known to be malicious, and to identify one or more malicious communication transactions exchanged with the protected computer network, by processing the first and second communication transactions. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification