×

System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits

  • US 10,476,909 B1
  • Filed: 10/19/2016
  • Issued: 11/12/2019
  • Est. Priority Date: 12/26/2013
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer readable storage medium having stored thereon instructions, the instructions being executable by one or more processors of a threat detection system to perform operations comprising:

  • filtering, by an intrusion protection system (IPS), received objects by identifying a first plurality of received objects as suspicious objects;

    determining a first subset of the suspicious objects that includes one or more verified malicious objects by monitoring processing of the suspicious objects within a virtual machine for behaviors indicative of the one or more verified malicious objects; and

    providing a report to one or more endpoint devices for display on a display device, the report includes a display of information associated with the one or more verified malicious objects in a first window and a display of information associated with a second subset of the suspicious objects including one or more non-verified malicious objects in a second window, different than the first window.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×