×

System and method for using timestamps to detect attacks

  • US 8,578,490 B2
  • Filed: 02/27/2007
  • Issued: 11/05/2013
  • Est. Priority Date: 08/30/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for detecting intrusions on a host, comprising:

  • a) a filesystem scanner, including at least one computer processor, configured to examine timestamps and signatures of files and directories in a filesystem;

    b) an analysis engine configured to compare timestamps and signatures of a directory of the filesystem and of files in the directory, and assign a weighted value out of a plurality of weighted values to the directory or at least one file of the files in the directory if the timestamps and signatures are inconsistent, and scan for inconsistencies between an entry in a log file and expected information of the filesystem, wherein the inconsistencies comprise an action recorded in the log file and a corresponding action not indicated in a corresponding filesytem file, wherein the weighted value is indicative of an attack;

    wherein the filesystem scanner is configured to examine timestamps and signatures of files and directories from a backup dump as an archival source of the directory of the filesystem and the files in the directory and to recover timestamp and signature information from the backup dump without restoring backup dump data to the filesystem, wherein the filesystem scanner is further configured to recover timestamp and signature information from a plurality of dump formats without restoring backup dump data to the filesystem, and wherein the analysis engine is further configured to compare the timestamps and signatures from the archival source to the timestamps and signatures of the directory and files in the directory.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×