×

Apparatus and method for blocking zombie behavior process

  • US 9,060,016 B2
  • Filed: 08/09/2011
  • Issued: 06/16/2015
  • Est. Priority Date: 01/04/2011
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus for blocking a zombie behavior process performed in a computer connected to a network, the zombie behavior process being generated in the computer, and attacking external computers, comprising:

  • an enterprise security management (ESM) server;

    a security policy storage receiving security policies including one or more zombie behavior type, traffic threshold values related to a specific zombie behavior type, an allowed times exceeding traffic threshold value related to the specific zombie behavior type, and blocking policies related to the specific zombie behavior type from the ESM server, the security policy storage storing the security policies;

    a traffic monitor monitoring traffic generated on the computer and detecting abnormal traffic exceeding a predetermined reference value in a network driver stage of the computer while monitoring all traffic generated on the computer;

    a process and traffic analyzer detecting an abnormal process causing the abnormal traffic, and detecting a zombie behavior type associated with the abnormal process by analyzing the abnormal traffic related to the abnormal process on the basis of the traffic threshold values and the allowed times exceeding traffic threshold value;

    a process handler handling the abnormal process, whose zombie behavior type has been detected on the basis of a blocking policy defined for the detected zombie behavior type;

    an event log storage storing an event log generated in association with the abnormal process and transmitting the event log to the EMS server; and

    a new zombie type storage storing traffic characteristics of a new abnormal process whose zombie behavior type has not been detected and transmitting the traffic characteristics of the new abnormal process to the EMS server;

    wherein the analyzed abnormal traffic exceeds both the traffic threshold values and the allowed times exceeding traffic threshold value; and

    wherein the security policies are updated based on the event log and the traffic characteristics of the new abnormal process by the EMS server;

    wherein the apparatus is disposed in a network driver stage of the computer connected to the network;

    wherein the zombie behavior type includes other types of behaviors; and

    when the zombie behavior type of the new abnormal process has not been detected, a security policy defined for the other types of behaviors is applied to the abnormal process.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×