×

Systems and methods for computer worm defense

  • US 9,516,057 B2
  • Filed: 04/04/2016
  • Issued: 12/06/2016
  • Est. Priority Date: 04/01/2004
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • one or more traffic analysis devices that are configured to perform an analysis of network traffic propagating over a communication network, the analysis includes identifying network communications characteristics associated with potential malware; and

    a malicious traffic sensor implemented as part of a computing device and communicatively coupled to the one or more traffic analysis devices, the malicious traffic sensor to receive a portion of the analyzed network traffic, the malicious traffic sensor comprisesone or more virtual machines that perform activities in response to a processing of the received portion of the analyzed network traffic, anda controller communicatively coupled to the one or more virtual machines, the controller to select software profiles for the one or more virtual machines and determine whether the received portion of the analyzed network traffic comprises malware by at least (i) monitoring behaviors of the one or more virtual machines during processing of the portion of the analyzed network traffic, (ii) determining whether the monitored behaviors denote a presence of malware by at least determining that a probability of the portion of the analyzed network traffic including malware exceeds a predetermined threshold, and (iii) responsive to the probability of the portion of the analyzed network traffic including malware exceeds a predetermined threshold, generating an identifier for the portion of the analyzed network traffic, the identifier operating as a signature for use in detecting the malware in at least a second computing device that is different from the computing device and communicatively coupled to the computing device via the communication network.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×