×

Distributed traffic pattern analysis and entropy prediction for detecting malware in a network environment

  • US 9,380,066 B2
  • Filed: 03/29/2013
  • Issued: 06/28/2016
  • Est. Priority Date: 03/29/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. At least one non-transitory machine readable storage medium having instructions stored thereon to detect malware, the instructions when executed by at least one processor cause the processor to:

  • select a genetic program based, at least in part, on a type of manipulation to be performed by the genetic program on one or more streams of context information of a potentially affected system;

    receive an entropy rate associated with the potentially affected system, wherein the received entropy rate was generated, at least in part, from an output stream of manipulated context information produced by the genetic program manipulating one or more streams of context information related to, respectively, one or more events detected on the potentially affected system, wherein a first stream of the one or more streams of context information includes one or more context elements observed in response to a first event being detected on the potentially affected system;

    compare the received entropy rate to an average entropy rate; and

    determine a probability that the potentially affected system is infected with malware, the probability based, at least in part, on a result of the comparison.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×