System, method, and computer program product for detecting unwanted activity associated with an object, based on an attribute associated with the object
First Claim
Patent Images
1. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
- monitoring an operation performed by an object using an intrusion system;
labeling the object with an attribute of a predetermined behavior based on detection of the predetermined behavior in association with the object, the attribute including a uniform resource locator (URL) that is embedded into the object, and wherein the detection of the predetermined behavior includes matching a behavior associated with the object to a compound rule;
extracting a plurality of rules from the compound rule; and
extracting additional rules from the plurality of rules in iterations until each rule extracted has no further dependencies and a reaction to the object is resolved without storing an event associated with the object in a cache.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for detecting unwanted activity associated with an object, based on an attribute associated with the object. In use, an object is labeled with an attribute of a predetermined behavior based on detection of the predetermined behavior in association with the object. Additionally, unwanted activity associated with the object is detected, utilizing the attribute.
13 Citations
15 Claims
-
1. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
-
monitoring an operation performed by an object using an intrusion system; labeling the object with an attribute of a predetermined behavior based on detection of the predetermined behavior in association with the object, the attribute including a uniform resource locator (URL) that is embedded into the object, and wherein the detection of the predetermined behavior includes matching a behavior associated with the object to a compound rule; extracting a plurality of rules from the compound rule; and extracting additional rules from the plurality of rules in iterations until each rule extracted has no further dependencies and a reaction to the object is resolved without storing an event associated with the object in a cache. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
monitoring an operation performed by an object using an intrusion system; labeling the object with an attribute of a predetermined behavior based on detection of the predetermined behavior in association with the object, the attribute including a uniform resource locator (URL) that is embedded into the object, and wherein the detection of the predetermined behavior includes matching a behavior associated with the object to a compound rule; extracting a plurality of rules from the compound rule in; and extracting additional rules from the plurality of rules in iterations until each rule extracted has no further dependencies and a reaction to the object is resolved without storing an event associated with the object in a cache.
-
-
14. A system, comprising:
a processor coupled to a memory, the system being configured for; monitoring an operation performed by an object using an intrusion system; labeling the object with an attribute of a predetermined behavior based on detection of the predetermined behavior in association with the object, the attribute including a uniform resource locator (URL) that is embedded into the object, and wherein the detection of the predetermined behavior includes matching a behavior associated with the object to a compound rule; extracting a plurality of rules from the compound rule; and extracting additional rules from the plurality of rules in iterations until each rule extracted has no further dependencies and a reaction to the object is resolved without storing an event associated with the object in a cache. - View Dependent Claims (15)
Specification