REVERSION OF SYSTEM OBJECTS AFFECTED BY A MALWARE
First Claim
1. A computerized method of reverting system data effected by a malware, comprising:
- monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device;
logging in an event log, in run time, said plurality of events;
classifying, in run time, a first process of said plurality of processes as a malware;
identifying a set of events of said first process from said plurality of events using said event log; and
reverting, in response to said classification, at least one system object hosted in said computing device to remove an effect of said set of events on said OS.
1 Assignment
0 Petitions
Accused Products
Abstract
A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.
-
Citations
16 Claims
-
1. A computerized method of reverting system data effected by a malware, comprising:
-
monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device; logging in an event log, in run time, said plurality of events; classifying, in run time, a first process of said plurality of processes as a malware; identifying a set of events of said first process from said plurality of events using said event log; and reverting, in response to said classification, at least one system object hosted in said computing device to remove an effect of said set of events on said OS. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system of reverting system data effected by a malware, comprising:
-
a memory hosting a an event log wherein a; a processor; a threat monitoring module which monitors, in run time, a plurality of events of a plurality of processes executed by an installed operating system (OS) running on a computing device and logs said plurality of events in said event log, said threat monitoring module uses said processor to classify, in run time, a first process of said plurality of processes as a malware and to identify a set of events of said first process from said plurality of events using said event log; and a data reverting module which reverts at least one system object hosted in said computing device and affected by said set of events in response to said classification. - View Dependent Claims (13, 14)
-
-
15. A computerized method of repairing damage caused by malware operations, comprising:
-
monitoring in run time a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device; classifying, in run time, a first process of said plurality of processes as a malware by an analysis of a set of events associated with said first process from said plurality of events; detecting, in run time, an additional event performed by said first process on said computing device; and reverting at least one system object hosted in said computing device and affected by said additional event.
-
-
16. A computer program product for reverting system data effected by a malware, comprising:
-
a computer readable storage medium; first program instructions to monitor, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on said computing device; second program instructions to log in an event log, in run time, said plurality of events; third program instructions to classify, in run time, a first process of said plurality of processes as a malware; fourth program instructions to identify a set of events of said first process from said plurality of events using said event log; and fifth program instructions to revert, in response to said classification, at least one system object hosted in said computing device to remove an effect of said set of events on said OS wherein said first, second, third, fourth, and fifth program instructions are stored on said computer readable storage medium.
-
Specification