×

Method and system for detecting malware

  • US 10,257,212 B2
  • Filed: 12/19/2016
  • Issued: 04/09/2019
  • Est. Priority Date: 01/06/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method of analysis, comprising:

  • collecting, using at least one decoy virtual machine, honeypot NX domain names from at least one known infected asset in at least one real network, the honeypot NX domain names being domain names that are not registered;

    collecting, using the at least one decoy virtual machine, real network NX domain names from at least one asset in the at least one real network;

    grouping the honeypot NX domain names and the real network NX domain names based on statistical similarities;

    creating at least one training vector, wherein the at least one training vector is created by;

    computing various statistical values for at least one group of the honeypot NX domain names, andcollecting the various statistical values for the at least one group of the honeypot NX domain names in at least one vector;

    creating, using the real network NX domain names, a plurality of testing vectors, wherein the plurality of testing vectors are created by;

    computing various statistical values for at least one group of the real network NX domain names, andcollecting the various statistical values for the at least one group of the real network NX domain names in the plurality of testing vectors;

    classifying each of the testing vectors as benign vectors or malicious vectors based on the at least one training vector; and

    classifying the at least one asset in the at least one real network as infected if at least one of the plurality of testing vectors is classified as a malicious vector.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×