Devices, systems, and methods for detecting proximity-based mobile propagation
First Claim
1. A mobile communication device comprising:
- a processor;
a transceiver in communication with the processor; and
a memory that stores a malware and an agent logic that, when executed by the processor, causes the processor to perform operations comprisingdiscovering a plurality of devices in a proximity,compiling a list of discovered devices in the proximity,creating a trigger by the agent logic, the trigger comprising a fake connection that, when selected, causes the agent logic to connect to an agent server on a network,inserting a trigger into the list of discovered devices, wherein the trigger, when selected, causes the agent logic to connect to the agent server, wherein the agent server collects malware signatures, and wherein the trigger appears to the malware to be one of the list of discovered devices,receiving, from the malware, a request to connect to the trigger, and in response to receiving the request to connect to the trigger, connecting to the agent server and reporting malware activity to the agent server.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider'"'"'s network. By attempting to connect through the trigger network connection, the malware reveals itself The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.
36 Citations
20 Claims
-
1. A mobile communication device comprising:
-
a processor; a transceiver in communication with the processor; and a memory that stores a malware and an agent logic that, when executed by the processor, causes the processor to perform operations comprising discovering a plurality of devices in a proximity, compiling a list of discovered devices in the proximity, creating a trigger by the agent logic, the trigger comprising a fake connection that, when selected, causes the agent logic to connect to an agent server on a network, inserting a trigger into the list of discovered devices, wherein the trigger, when selected, causes the agent logic to connect to the agent server, wherein the agent server collects malware signatures, and wherein the trigger appears to the malware to be one of the list of discovered devices, receiving, from the malware, a request to connect to the trigger, and in response to receiving the request to connect to the trigger, connecting to the agent server and reporting malware activity to the agent server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for tracking proximity-based mobile malware propagation, the system comprising:
-
an agent server that collects malware signatures; and a mobile communication device in communication with the agent server, wherein the mobile device stores a malware and an agent logic that, when executed by the mobile communication device, causes the mobile communication device to perform operations comprising; discovering a plurality of devices in a proximity of the mobile communication device, compiling a list of discovered devices in the proximity, creating a trigger with the agent logic, the trigger comprising a fake connection that, when selected, causes the agent logic to connect to the agent server, inserting the trigger into the list of discovered devices, wherein the trigger appears to the malware to be one of the list of discovered devices, receiving a request to connect to the trigger, and in response to receiving the request to connect to the trigger, connecting to the agent server and reporting malware activity to the agent server. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
discovering, by a mobile communications device that executes an agent logic and stores a mobile malware, a plurality of devices in a proximity of the mobile communications device; compiling, by the mobile communications device, a list of discovered devices in the proximity; creating, by the mobile device, a trigger comprising a fake connection that, when selected, causes the agent logic to connect to an agent server on a network, wherein the agent server collects malware signatures; inserting, by the mobile communications device, the trigger into the list of discovered devices; receiving, by the agent logic, a request to connect to the trigger; and in response to receiving the request to connect to trigger, connecting, by the mobile device, to the agent server and reporting malware activity to the agent server. - View Dependent Claims (17, 18, 19, 20)
-
Specification