×

System and method for malware detection

  • US 10,061,922 B2
  • Filed: 04/30/2013
  • Issued: 08/28/2018
  • Est. Priority Date: 04/30/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • monitoring, with a network probe, request-response transactions that are exchanged in a computer system without transmitting all of the request-response transactions of the computer system through the network probe;

    discarding transactions from the monitored request-response transactions that access a predetermined number of most-frequently-accessed hosts;

    extracting one or more subsets of the monitored request-response transactions, which are exchanged with one or more respective nodes in the computer system, the one or more subsets comprising request-response transactions that are exchanged between one or more clients and a given host and between one or more hosts and a given client;

    evaluating a set of multiple different features over the request-response transactions in the subsets by estimating aggregated statistical properties of the set of multiple different features over the request-response transactions in the subsets, the set of multiple different features comprising a plurality of;

    repetitions of a Uniform Resource Identifier (URI) in given requests in which the URI is a random string, a given response not indicating a referrer, a content length in a given response being shorter than a certain threshold value, a user agent in a given request being shorter than a certain threshold value, a number of fields in a given request being smaller than a certain threshold value, or a returned content in a given response being an executable,wherein the set of multiple different features includes at least one feature that comprises a characteristic of one or more underlying protocols used for transmitting the request-response transactions;

    wherein a certain aggregate statistical property is evaluated over each of a plurality of different time periods; and

    based on the evaluated features, identifying whether the request-response transactions in the subsets are exchanged with a malicious software in the nodes;

    wherein identifying whether the request-response transactions in the subsets are exchanged with a malicious software comprises detecting that the malicious software runs in the given client.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×