×

IDENTIFYING MALWARE-SUSPECT END POINTS THROUGH ENTROPY CHANGES IN CONSOLIDATED LOGS

  • US 20180288074A1
  • Filed: 03/31/2017
  • Published: 10/04/2018
  • Est. Priority Date: 03/31/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting a malware attack, comprising:

  • monitoring an event log of a first device, wherein the event log identifies events indicating that the first device is likely compromised;

    determining an expected rate of log entries during a time window;

    identifying that an actual rate of log entries during the time window satisfies a threshold;

    determining, in response to the identifying, that the first device is a compromised device; and

    performing an action in response to determining that the first device is a compromised device.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×