×

System and method for identifying unauthorized activities on a computer system using a data structure model

DC
  • US 9,106,697 B2
  • Filed: 06/17/2011
  • Issued: 08/11/2015
  • Est. Priority Date: 06/24/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method of identifying unauthorized activities on a decoy computer system attached to a computer network, wherein the decoy system comprises:

  • one or more processors; and

    memory storing;

    a virtual machine; and

    a virtual machine monitor supervising the virtual machine, the method comprising, at the virtual machine monitor;

    monitoring activity on the virtual machine;

    identifying a plurality of activities being performed at the virtual machine, wherein each of the activities includes an activity source, an activity target, and an association between the activity source and the activity target;

    storing in the memory the activity sources, activity targets, and associations;

    creating, from the stored activities, a fingerprint indicative of the activity on the virtual machine; and

    transmitting the fingerprint to prevent future attacks that comprise the same or similar activities as indicated by the fingerprint.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×