×

Detecting a malicious file infection via sandboxing

  • US 9,680,845 B2
  • Filed: 03/31/2015
  • Issued: 06/13/2017
  • Est. Priority Date: 03/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A device, comprising:

  • one or more processors, implemented at least partially in hardware, to;

    receive a trigger to determine whether a malicious file is operating on a client device;

    execute the malicious file in a testing environment,the testing environment being configured based on a configuration of the client device;

    determine a network activity profile associated with the malicious file based on receiving the trigger and based on executing the malicious file in the testing environment,the network activity profile including information regarding first network activity associated with the malicious file when the malicious file is executed in the testing environment;

    monitor second network activity associated with the client device;

    generate a network activity score representing a measure of similarity of the second network activity to the network activity profile;

    compare the network activity score to a threshold;

    determine that the client device is infected with the malicious file based on the network activity score satisfying the threshold; and

    provide a notification indicating that the client device is infected with the malicious file.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×