System, method, and apparatus for providing network security
First Claim
Patent Images
1. A method, comprising:
- proactively monitoring network traffic activity of a networked computing device within a protected domain in real-time, using a hardware processor;
in response to monitoring the network traffic activity of the networked computing device, determining that potential malware has been received at the networked computing device; and
in response to determining that potential malware has been received at the networked computing device, moving the potential malware from the networked computing device into an isolation hypervisor for analysis, wherein the analysis is performed during system interrupts by an Analytical Neural Network Interface (ANNI) enabling the ANNI to execute additional computations even though other networked computing devices of the protected domain are not executing any code.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatuses for proactively protecting a computing network are disclosed. A proactive security mechanism is disclosed, among other things, with the ability to monitor a protected domain in real-time and safely identify inoculation procedures for responding to threats introduced to the protected domain via malware. The proactive security mechanism includes an Artificial Neural Network Interface (ANNI) configured to execute at least some features of the proactive security mechanism.
66 Citations
18 Claims
-
1. A method, comprising:
-
proactively monitoring network traffic activity of a networked computing device within a protected domain in real-time, using a hardware processor; in response to monitoring the network traffic activity of the networked computing device, determining that potential malware has been received at the networked computing device; and in response to determining that potential malware has been received at the networked computing device, moving the potential malware from the networked computing device into an isolation hypervisor for analysis, wherein the analysis is performed during system interrupts by an Analytical Neural Network Interface (ANNI) enabling the ANNI to execute additional computations even though other networked computing devices of the protected domain are not executing any code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium comprising processor-executable instructions that, when executed by a microprocessor, perform a method, the method comprising:
-
proactively monitoring network traffic activity of a networked computing device within a protected domain in real-time; in response to monitoring the network traffic activity of the networked computing device, determining that potential malware has been received at the networked computing device; and in response to determining that potential malware has been received at the networked computing device, moving the potential malware from the networked computing device into an isolation hypervisor for analysis, wherein the analysis is performed during system interrupts by an Analytical Neural Network Interface (ANNI) enabling the ANNI to execute additional computations even though other networked computing devices of the protected domain are not executing any code. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification