×

Method and apparatus for disrupting the command and control infrastructure of hostile programs

  • US 8,869,268 B1
  • Filed: 10/24/2007
  • Issued: 10/21/2014
  • Est. Priority Date: 10/24/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing a computer, comprising:

  • transmitting, by the computer, suspect command and control data to a control center, whereinthe suspect command and control data includes a reference to a domain name server (DNS) service, andthe control center is configured toanalyze the suspect command and control data, andupdate a command and control infrastructure library, if the suspect command and control data is identified as hostile;

    detecting by the computer, a hostile program stored on the computer, whereinthe hostile program is identified by detecting that the reference to the DNS service in the suspect command and control data matches information in the command and control infrastructure library,the detecting the reference to the DNS service in the suspect command and control data is performed prior to the suspect command and control data being submitted to a DNS server,the hostile program is configured to be controlled by a hostile command and control infrastructure, andthe hostile command and control infrastructure is associated with a hostile computer; and

    disrupting by the computer, the hostile command and control infrastructure, whereinthe disrupting comprises impairing communication with the hostile program.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×