×

Detecting DGA-based malicious software using network flow information

  • US 9,654,484 B2
  • Filed: 07/31/2014
  • Issued: 05/16/2017
  • Est. Priority Date: 07/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • using a computing device, in a communications network that comprises at least a plurality of hosts, receiving network flow information from one or more other computing devices that are configured as observation points, and based upon the network flow information, determining a number of domain name server requests originating from a particular host among the plurality of hosts, wherein the domain name server requests are directed to one or more domain name servers;

    using the computing device,determining, based on the network flow information, a number of requests originating from an endpoint of the particular host, wherein the endpoint is a unique combination of an internet protocol address of the particular host, a port number associated with a port on the particular host and a communication protocol used in transmitting a particular packet that originated from the particular host;

    determining, based on, at least in part, the number of requests originating from the endpoint of the particular host, a number of internet protocol addresses contacted by the particular host;

    using the computing device, determining that malware exists on the particular host based on the number of domain name server requests and the number of internet protocol addresses contacted, wherein determining that malware exists on the particular host includes one or more of;

    determining a ratio of the number of domain name server requests to the number of internet protocol addresses contacted, determining whether the ratio exceeds a particular threshold value, determining an average value of ratios computed for the one or more other computing devices and comparing the average value with the ratio determined for the particular host, or determining a number of peers of the particular host based on the number of domain name server requests and the number of internet protocol addresses contacted and determining a median of the number of peers.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×