Method and computer program product for identifying or managing vulnerabilities within a data processing network
First Claim
Patent Images
1. A method comprising:
- computing a set of first hash values derived from and representing a plurality of replicas of a resource, wherein the replicas of the resource are stored on respective data processing systems within a network and the computing of the first hash values is at a first timestoring the computed set of first hash values;
after computing and storing the set of first hash values, computing second hash values for the replicas of the resource, wherein the computing of the second hash values is at a second time;
at a central server within the network, automatically comparing the first and second hash values to find new hash values changed between computing the first hash values and computing the second hash values;
statistically observing a creation pattern of the new hash values to evaluate likelihood of a virus infection; and
selecting replicas of the resource for virus scanning responsive to the statistically observed creation pattern;
wherein the statistically observed creation pattern includes a pattern wherein more than a certain predetermined number of the first hash values of the replicas of the resource have remained unchanged as compared to the second hash values and wherein a period defined by the difference between the first and second times is a period of more than a certain predetermined interval.
0 Assignments
0 Petitions
Accused Products
Abstract
Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.
94 Citations
16 Claims
-
1. A method comprising:
-
computing a set of first hash values derived from and representing a plurality of replicas of a resource, wherein the replicas of the resource are stored on respective data processing systems within a network and the computing of the first hash values is at a first time storing the computed set of first hash values; after computing and storing the set of first hash values, computing second hash values for the replicas of the resource, wherein the computing of the second hash values is at a second time; at a central server within the network, automatically comparing the first and second hash values to find new hash values changed between computing the first hash values and computing the second hash values; statistically observing a creation pattern of the new hash values to evaluate likelihood of a virus infection; and selecting replicas of the resource for virus scanning responsive to the statistically observed creation pattern; wherein the statistically observed creation pattern includes a pattern wherein more than a certain predetermined number of the first hash values of the replicas of the resource have remained unchanged as compared to the second hash values and wherein a period defined by the difference between the first and second times is a period of more than a certain predetermined interval. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product including at least one tangible, non-transitory computer readable medium, said at least one computer readable medium having instructions stored thereon for execution by at least one computer system, wherein the instructions, when executed by the at least one computer system, cause the at least one computer system to implement a method comprising the steps of:
-
computing a set of first hash values derived from and representing a plurality of replicas of a resource, wherein the replicas of the resource are stored on respective data processing systems within a network and the computing of the first hash values is at a first time storing the computed set of first hash values; after computing and storing the set of first hash values, computing second hash values for the replicas of the resource, wherein the computing of the second hash values is at a second time; at a central server within the network, automatically comparing the first and second hash values to find new hash values changed between computing the first hash values and computing the second hash values; statistically observing a creation pattern of the new hash values to evaluate the likelihood of a virus infection; and selecting replicas of the resource for virus scanning responsive to the statistically observed creation pattern; wherein the statistically observed creation pattern includes a pattern wherein more than a certain predetermined number of the first hash values of the replicas of the resource have remained unchanged as compared to the second hash values and wherein a period defined by the difference between the first and second times is a period of more than a certain predetermined interval. - View Dependent Claims (6, 7, 8)
-
-
9. A method comprising the steps of:
-
updating, at successive update times, virus definitions for scanning resources stored on a data processing system; scanning the stored resources for viruses in first and second scanning instances responsive to the virus definitions updated at respective first and second ones of the update times; computing hash values for the resources at the first and second update times; for a selected one of the resources, calculating a value indicative of how long the respective resource has remained unchanged between earliest and latest clear virus scans of the selected one of the resources; for the selected one of the resources, comparing the calculated value to a pre-selected reference value, the pre-selected reference value having been selected at least partially based on an expected time that a target virus may exist but remain undetected; prioritizing virus scanning of the selected one of the resources based at least partially on the result of comparing the calculated value to the pre-selected reference value and on whether more than a predetermined number of hash values for the selected one of the resources are equal for the earliest and latest clear virus scans; updating the virus definitions at a next update time; scanning at least one high-priority resource for viruses in a next scanning instance responsive to the virus definitions updated at the next time; and after scanning the at least one high-priority resource, deferring virus scanning of at least one low-priority resource until a period of low system activity. - View Dependent Claims (10, 11, 12, 15, 16)
-
-
13. A computer program product including at least one tangible, non-transitory computer readable medium, said at least one computer readable medium having instructions stored thereon for execution by at least one computer system, wherein the instructions, when executed by the at least one computer system, cause the at least one computer system to implement a method comprising the steps of:
-
updating, at successive update times, virus definitions for resources stored on a data processing system; scanning the stored resources for viruses in first and second scanning instances responsive to the virus definitions updated at respective first and second ones of the update times; computing hash values for the resources at the first and second update times; for a selected one of the resources, calculating a value indicative of how long the respective resource has remained unchanged between earliest and latest clear virus scans of the selected one of the resources; for the selected one of the resources, comparing the calculated value to a pre-selected reference value, the pre-selected reference value having been selected at least partially based on an expected time that a target virus may exist but remain undetected; prioritizing virus scanning of the selected one of the resources based at least partially on the result of comparing the calculated value to the pre-selected reference value and on whether hash values for the selected one of the resources are equal for the earliest and latest clear virus scans; updating the virus definitions at a next update time; scanning at least one high-priority resource for viruses in a next scanning instance responsive to the virus definitions updated at the next time; and after scanning at least one high-priority resource, deferring virus scanning of at least one low-priority resource until a period of low system activity. - View Dependent Claims (14)
-
Specification