×

Graph-based method to detect malware command-and-control infrastructure

  • US 9,195,826 B1
  • Filed: 05/30/2013
  • Issued: 11/24/2015
  • Est. Priority Date: 05/30/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for identifying one or more potentially infected internal devices and one or more potential malware command and control devices, comprising:

  • generating a bipartite graph that includes one or more internal devices inside a protected network and one or more destinations outside the protected network which communicate over a period of time, including by receiving communication information that includes;

    (1) one or more internal devices, (2) one or more destinations that those internal devices communicated with, and (3) one or more times at which those internal devices communicated with those destinations;

    reducing the bipartite graph to obtain a reduced bipartite graph, including by;

    eliminating any communication information associated with times outside of the period of time; and

    eliminating those connections that include a whitelisted internal device inside the protected network and those connections that include a whitelisted destination outside the protected network;

    determining a degree of isolation representative of a degree to which a cluster, within the reduced bipartite graph and which includes one or more internal devices and one or more destinations, is isolated from one or more other clusters based at least in part on a number of connections between the cluster and said other clusters; and

    using a processor to identify the cluster as being a potentially infected cluster of one or more potentially infected internal devices inside the protected network and one or more potential malware command and control devices outside the protected network in the event the cluster'"'"'s degree of isolation from other clusters exceeds an isolation threshold.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×