×

Detecting malicious use of computer resources by tasks running on a computer system

  • US 8,931,096 B2
  • Filed: 12/09/2011
  • Issued: 01/06/2015
  • Est. Priority Date: 10/29/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for identifying malware, the method comprising the steps of:

  • identifying, by one or more processors, processes in a running process list on a first computer system;

    identifying, by one or more processors, ports assigned to the processes in the running process list on the first computer system;

    identifying, by one or more processors, ports currently in use in the first computer system;

    determining, by one or more processors, a first use of a first port of the ports currently in use in the first computer system but not assigned to any of the processes in the running process list in the first computer system; and

    determining, by one or more processors, whether a second computer system is using a second port on the second computer system in a non-malicious manner, wherein the second port on the second computer system maps to the first port on the first computer system, andif determined that the second computer system is using the second port on the second computer system in the non-malicious manner, determining, by one or more processors, that the first port is not being used in an attack, andif determined that the second computer system is not using the second port on the second computer system in the non-malicious manner, determining, by one or more processors, that a hidden, running process is present as a characteristic of an attack.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×