×

Systems and methods for detecting malicious use of digital certificates

  • US 9,407,644 B1
  • Filed: 11/26/2013
  • Issued: 08/02/2016
  • Est. Priority Date: 11/26/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting malicious use of digital certificates, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • deducing, by a deduction module, an effectiveness of a plurality of fields within digital certificates in distinguishing malicious use of invalid certificates from benign use of invalid certificates by using a machine learning algorithm to examine fields of invalid certificates that have been used maliciously and fields of invalid certificates that have been used legitimately;

    weighting, by the deduction module, each of the plurality of fields according to the effectiveness of the fields;

    identifying, by the deduction module and based on the weighting of each of the plurality of fields, at least one field within invalid digital certificates that is more useful than at least one other field in distinguishing malicious use of invalid certificates from benign use of invalid certificates;

    before performing an analysis to determine whether a digital certificate is potentially being used to facilitate malicious communications, determining, by a determination module, that the digital certificate is invalid by determining that the digital certificate is not trusted by a certificate authority;

    in response to determining that the digital certificate is invalid, locating, by a location module, within the invalid digital certificate, the field that was identified as being more useful in distinguishing malicious use of invalid certificates from benign use of invalid certificates;

    determining, by an analysis module, based on an analysis of information from the field of the invalid digital certificate, that the invalid digital certificate is potentially being used to facilitate malicious communications;

    performing, by a security module, a security action in response to determining that the invalid digital certificate is potentially being used to facilitate malicious communications.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×