×

Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT Infrastructure

  • US 20150264077A1
  • Filed: 09/30/2014
  • Published: 09/17/2015
  • Est. Priority Date: 03/13/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • collecting, by a computer system, system calls and call parameters invoked by monitored applications for each of a plurality of target computer systems, where the system calls and call parameters are received from operating system kernels on the plurality of target computer systems, where the operating system kernels have been instrumented to report system calls and call parameters invoked by the monitored applications;

    correlating, by the computer system, sequences of systems calls and call parameters of the monitored applications among different target computer systems to deduce malicious activities; and

    performing, by the computer system, one or more remedial actions in response to one or more malicious activities being deduced as being malicious by the correlating.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×