SYSTEMS AND METHODS FOR COMPUTER WORM DEFENSE
5 Assignments
0 Petitions
Accused Products
Abstract
A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. In various embodiments, the computer worm may be transported from a production network, where the computer worm is not readily identifiable, to an alternate network in the worm sensor where the computer worm may be readily identifiable. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems.
144 Citations
50 Claims
-
1-30. -30. (canceled)
-
31. An unauthorized activity defense system comprising:
-
one or more traffic analysis devices that are configured to perform an analysis of network traffic propagating over a communication network, the analysis includes identifying and filtering network communications characteristics associated with potential malware; and a malicious traffic sensor implemented in a computing device and communicatively coupled to the one or more traffic analysis devices, the malicious traffic sensor to receive a portion of the analyzed network traffic, the malicious traffic sensor comprises one or more virtual machines that perform network activities in response to a processing of the received portion of the analyzed network traffic, and a controller configured communicatively coupled to the one or more virtual machines, the controller to orchestrate operations of the one or more virtual machine and determine whether the received portion of the analyzed network traffic comprises malware by at least (i) monitoring behaviors of the one or more virtual machines during processing of the portion of the analyzed network traffic, (ii) determining whether the behaviors are anomalous that denote a communication anomaly or an execution anomaly, and (iii) determining that a probability of the portion of the analyzed network traffic including malware exceeds a predetermined threshold, and (iv) responsive to the probability of the portion of the analyzed network traffic including malware exceeds a predetermined threshold, generating an identifier for the malicious traffic based on the anomalous behaviors caused during the processing of the portion of the analyzed network traffic. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A method comprising:
-
monitoring communications traffic from a communication network; filtering the communications traffic from the communication network, the filtered communications traffic comprises one or more suspicious characteristics associated with malicious traffic, wherein the one or more suspicious characteristics indicating that the filtered communication traffic should be analyzed to determine whether or not the filtered communications traffic comprises malicious traffic; determining whether the filtered communications traffic comprises malicious traffic by analyzing the filtered communications traffic, the analyzing of the filtered communications traffic comprises monitoring a processing of the filtered communications traffic within an analysis environment of a first unauthorized activity detection system; and responsive to the filtered communications traffic being determined to comprise malicious traffic, generating an identifier for the malicious traffic based on anomalous behavior caused within the analysis environment during the processing of the filtered communications traffic. - View Dependent Claims (43, 44, 45, 46, 47, 48)
-
-
49. A non-transitory machine readable medium having embodied thereon executable code, the executable code being executable by a processor to perform an unauthorized activity defense method comprising:
-
monitoring communications traffic from a communication network; filtering the communications traffic from the communication network, the filtered communications traffic comprises one or more suspicious characteristics of malicious traffic, wherein the one or more suspicious characteristics identifying whether the filtered communication traffic should be analyzed to determine whether or not the filtered communications traffic comprises malicious traffic; determining whether the filtered communications traffic comprises malicious traffic by analyzing the filtered communications traffic, the analyzing comprising monitoring a processing of the filtered communications traffic within an analysis environment of an unauthorized activity detection system; and responsive to the filtered communications traffic being determined to comprise malicious traffic, generating an identifier for the malicious traffic based on anomalous behavior caused within the analysis environment during the processing of the filtered communications traffic. - View Dependent Claims (50)
-
Specification