×

Evaluating URLS for malicious content

  • US 9,356,950 B2
  • Filed: 08/22/2014
  • Issued: 05/31/2016
  • Est. Priority Date: 05/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving at a firewall computer system a request from a user system for a resource at a uniform resource locator (URL);

    retrieving, by the firewall computer system, the resource and returning the resource to the user system;

    accessing by a first virtual machine on one of the firewall computer system and a magnet computer system the resource;

    detecting malicious activity corresponding to the resource in the first virtual machine;

    generating a descriptor of the malicious activity;

    transmitting the descriptor to the user system;

    transforming the outbound traffic on the second virtual machine to obtain transformed traffic;

    transmitting the transformed traffic to a destination specified in the outbound traffic; and

    receiving, on the second virtual machine, a response to the transformed traffic;

    wherein generating the descriptor comprises correlating the response to the transformed traffic, the malicious activity corresponding to the resource in the first virtual machine, and the malicious activity on the second virtual machine.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×