US20100107257A1 - System, method and program product for detecting presence of malicious software running on a computer system - Google Patents
System, method and program product for detecting presence of malicious software running on a computer system Download PDFInfo
- Publication number
- US20100107257A1 US20100107257A1 US12/261,026 US26102608A US2010107257A1 US 20100107257 A1 US20100107257 A1 US 20100107257A1 US 26102608 A US26102608 A US 26102608A US 2010107257 A1 US2010107257 A1 US 2010107257A1
- Authority
- US
- United States
- Prior art keywords
- computer system
- tasks
- remote
- network services
- host computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Definitions
- the present invention relates to computer systems and software, and more specifically to a technique for detecting presence of malicious software, such as, a malicious service agent running on a computer system.
- Various technologies have been proposed to detect ârootkitsâ and other stealth install techniques. These existing techniques require the querying of the host through local means in a powered and unpowered state. These existing techniques, in particular the process of assessing a host in an unpowered state is highly disruptive and time consuming. As such, there is a need for administrators to effectively identify the presence of such installations without powering down the host.
- the present invention resides in a system, method and program product for detecting presence of malicious software and malware, using a program or tool, in accordance with an embodiment of the invention.
- the method includes locally querying a computer system to enumerate a local inventory of tasks and network services currently running on the computer system in order to detect presence of a malicious service agent running on the computer system, wherein the local inventory of tasks and network services enumerated includes respective ports in use on the computer system and remotely querying via a network the computer system from a remote computer system to enumerate a remote inventory of tasks and network services currently running on the computer system in order to detect presence of the malicious service agent running on the computer system, wherein the remote inventory of tasks and network services enumerated includes respective ports in use on the computer system.
- the method includes collecting each of the local inventory of tasks and network services enumerated and collecting each of the remote inventory of tasks and network services enumerated and comparing the local inventory of tasks and network services enumerated with the remote inventory of tasks and network services enumerated to identify any discrepancies between the local inventory of tasks and network services enumerated and the remote inventory of tasks and network services enumerated for detecting presence of the malicious service agent running on the computer system.
- the locally querying step further includes providing a first tool for locally detecting presence of the malicious service agent running on the computer system and utilizing the first tool to conduct a local scan of the computer system to locally query the computer system.
- the remotely querying step further includes providing a second tool for remotely detecting presence of the malicious service agent running on the computer system and utilizing the second tool to conduct a remote scan of the computer system to remotely query the computer system.
- a port of the respective ports includes at least one of: an open port, a closed port and a filtered port.
- the method further includes flagging the computer system having any discrepancies identified for conducting further tests to evaluate any discrepancies identified for determining presence of the malicious service agent running on the computer system.
- FIG. 1 is a schematic block diagram illustrating one embodiment of a system for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
- FIG. 2 depicts an embodiment of a computer system having deployed thereon a local scanning tool for performing a local scan of the computer system for detecting presence of malicious software and malware running on the computer system, in accordance with an embodiment of the present invention.
- FIG. 3 depicts an embodiment of a computer system having deployed thereon a remote scanning tool for performing a remote scan of a remote computer system for detecting presence of malicious software and malware running on the remote computer system, in accordance with an embodiment of the present invention.
- FIG. 4 depicts an embodiment of a computer system having deployed thereon a results correlation engine or program for performing analysis or evaluation of the local scanning results received and the remote scanning results received for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
- FIG. 5 depicts a computer infrastructure for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
- FIG. 6 depicts a flowchart outlining the steps performed by a host computer system for locally detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
- FIG. 7 depicts a flowchart outlining the steps performed by a remote computer system for remotely detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
- FIG. 8 depicts a flowchart outlining the overall steps performed by a results correlation computer system for detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
- modules may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components.
- a module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
- Modules may also be implemented in software for execution by various types of processors.
- An identified module or component of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
- a module of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices.
- operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, over disparate memory devices, and may exist, at least partially, merely as electronic signals on a system or network.
- modules may also be implemented as a combination of software and one or more hardware devices.
- a module may be embodied in the combination of a software executable code stored on a memory device.
- a module may be the combination of a processor that operates on a set of operational data.
- a module may be implemented in the combination of an electronic signal communicated via transmission circuitry.
- the invention provides a system for detecting presence of malicious software and malware running on a computer system or host system, in accordance with an embodiment of the invention.
- reference numeral 100 schematically illustrates an embodiment of a system for detecting presence of malicious software and malware, such as, a malicious service agent running on a computer system, in accordance with an embodiment of the invention.
- the system infrastructure 100 includes a first host computer system 102 that is remotely connected to a network 120 .
- the first host computer system 102 has a local interrogation agent program or local scanning agent or tool installed thereon for conducting a local query or interrogation of the first host computer system 102 .
- the local interrogation agent or software is run on the first computer system 102 to determine local tasks and network services currently running on the first host computer system 102 .
- the system infrastructure 100 includes a second host computer 104 that is also connected to the network 120 and is remote to the first host computer system 102 .
- the second host computer 104 includes a network interrogation tool for conducting a remote query or interrogation of the first host computer system 102 for enumerating a remote inventory of tasks and network services currently running on the first host computer system 102 .
- the system infrastructure 100 includes a third computer system 106 connected to the network 120 , the third computer system 106 having a results correlation engine deployed thereon for correlating results received from the first computer system 102 and the second computer system 104 .
- the third computer system 106 collects results of the local query or interrogation conducted by the first host computer system 102 . Further, the third computer system 106 also collects results of the remote query or interrogation conducted by the second host computer system 104 on the first host computer system 102 .
- the results correlation engine deployed on the third computer system 106 compares the local inventory of tasks and network services results enumerated by the first host computer system 102 with the remote inventory of tasks and network services results enumerated by the second host computer system 104 to identify any discrepancies between the local inventory results obtained from the first host computer system 102 and the remote inventory results obtained from the second host computer system 104 for detecting presence of any malicious software, such as, a malicious service agent running on the first host computer system 102 .
- the third computer system 106 includes a reporting tool for generating a discrepancy report 108 that identifies any discrepancies between the local scan performed by the first host computer system 102 and the remote scan performed by the second host computer system 104 on the first host computer system 102 for detecting presence of any malicious software running on the first host computer system 102 .
- FIG. 2 depicts an embodiment of a host computer system or server (for instance, the host computer system 102 shown in FIG. 1 ) having deployed thereon a computer program product, namely, a local scanning agent program or tool for conducting a local scan or interrogation of the host computer system suspected of having malicious software running thereon, in accordance with an embodiment of the present invention.
- the local scanning tool or program 220 is run within the host computer system or server 200 .
- the computer system 200 is a computer system or server that includes a central processing unit (CPU) 204 , a local storage device 202 , a user interface 206 , a network interface 208 , and a memory 210 .
- CPU central processing unit
- the CPU 204 is configured generally to execute operations within the host system/server 200 .
- the user interface 206 in one embodiment, is configured to allow a user or operator to interact with the computer system or server 200 , including allowing input of commands and/or data for conducting a local scan of the computer system 200 .
- the network interface 208 is configured, in one embodiment, to facilitate network communications of the host system or server 200 over a communications channel of a network, such as the network 120 , shown in FIG. 1 .
- the memory 210 is configured to store one or more applications or programs 212 , such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown in FIG.
- the local scanning agent program or tool 220 which runs on the host server or system 200 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a local scan of the host computer system 200 for enumerating a local inventory of tasks and network services running on the host computer system.
- the local scanning tool or agent program 220 running on the host computer system 200 includes an initiation module 222 , a tasks module 224 , a network services module 226 , a list generation module 228 , a results log module 230 , a forwarding module 232 and a communication module 234 .
- the initiation module 222 is configured to initiate a local scan of the host computer system 200 .
- the tasks module 224 is configured to enumerate or list all the tasks running on the host computer system 200 .
- the network services module 226 is configured to enumerate or list all the network services running on the host computer system 200 .
- the list generation module 228 is configured to generate a list enumerating all of the tasks and network services running on the host computer system.
- the results log module 230 is configured to generate a log of the results of the local scan conducted on the host computer system.
- the local scan results log 214 generated by the results log module 230 are stored in a local storage 202 within the host computer system 200 .
- the forwarding module 232 is configured to forward the results of the local scan performed on the host computer system 200 to another computer system comprising a results correlation engine (for instance, computer system 400 , shown in FIG. 4 ) for evaluating the local scan results received from the host computer system 200 .
- the communication module 234 is configured to permit communication between the various modules of the local scanning tool 220 , memory 210 , local storage 202 and with external computer systems, such as, the computer system comprising the results correlation engine, which is connected to the host computer system over a network.
- reference numeral 300 depicts an embodiment of a remote host computer system or server (for instance, the remote host computer system 104 shown in FIG. 1 ) having deployed thereon a computer program product, namely, a remote scanning agent program or tool for opening connections with the first host computer system and for conducting a remote scan or interrogation of the first host computer system suspected of having malicious software running thereon, in accordance with an embodiment of the present invention.
- the remote scanning tool or program 320 is run within the second host computer system or server 300 .
- the computer system 300 is a computer system or server that includes a central processing unit (CPU) 304 , a storage device 302 , a user interface 306 , a network interface 308 , and a memory 310 .
- the CPU 304 is configured generally to execute operations within the host system/server 300 .
- the user interface 306 in one embodiment, is configured to allow a user or operator to interact with the computer system or server 300 , including allowing input of commands and/or data for conducting a remote scan of a host computer system remote to the computer system 300 , such as, the computer system 200 , shown in FIG. 2 .
- the network interface 308 is configured, in one embodiment, to facilitate network communications of the host system or server 300 over a communications channel of a network, such as the network 120 , shown in FIG. 1 .
- the memory 310 is configured to store one or more applications or programs 312 , such as, word processing application(s), spreadsheet application(s), etc.
- the local scanning agent program or tool 320 which runs on the host server or system 300 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a remote scan of the remote computer system 200 ( FIG. 2 ) for enumerating a remote inventory of tasks and network services running on the remote host computer system 200 .
- FIG. 2 shows a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a remote scan of the remote computer system 200 ( FIG. 2 ) for enumerating a remote inventory of tasks and network services running on the remote host computer system 200 .
- the remote scanning tool or agent program 320 running on the host computer system 300 includes an initiation module 322 , a tasks module 324 , a network services module 326 , a list generation module 328 , a results log module 330 , a forwarding module 332 and a communication module 334 .
- the initiation module 322 is configured to initiate a remote scan of all ports of the remote host computer system 200 over a network.
- the tasks module 324 is configured to enumerate or list all the tasks running on the remote host computer system 200 .
- the network services module 326 is configured to enumerate or list all the network services running on the remote host computer system 200 .
- the list generation module 328 is configured to generate a list enumerating all of the tasks and network services running on the remote host computer system 200 .
- the results log module 330 is configured to generate a log of the results of the remote scan conducted on the remote host computer system 200 .
- the remote scan results log 314 generated by the results log module 330 are stored in a local storage 302 within the host computer system 300 .
- the forwarding module 332 is configured to forward the results of the remote scan performed on the remote host computer system 200 to another computer system comprising a results correlation engine (for instance, computer system 400 , shown in FIG. 4 ) for evaluating the remote scan results received from the host computer system 300 .
- a results correlation engine for instance, computer system 400 , shown in FIG. 4
- the communication module 334 is configured to permit communication between the various modules of the remote scanning tool 320 , memory 310 , local storage 302 and with external computer systems, such as, the computer system 400 (shown in FIG. 4 ) comprising the results correlation engine, which is connected to the host computer system 300 over a network.
- reference numeral 400 depicts an embodiment of a computer system or server (for instance, the computer system 106 shown in FIG. 1 ) having deployed thereon a computer program product, namely, a results correlation program or tool or engine 420 for correlating local scan results received from a first host computer system or server and remote scan results of the first host computer system received from a second host computer system or server for detecting presence of any malicious software running on the first computer system, in accordance with an embodiment of the present invention.
- the computer system 400 is a computer system or server that includes a central processing unit (CPU) 404 , a storage device 402 , a user interface 406 , a network interface 408 , and a memory 410 .
- CPU central processing unit
- the CPU 404 is configured generally to execute operations within the host system/server 400 .
- the user interface 406 in one embodiment, is configured to allow a user or operator to interact with the computer system or server 400 , including allowing input of commands and/or data for collecting scan results from one or more computer systems or servers, such as, computer system 200 ( FIG. 2 ) and/or computer system 300 ( FIG. 3 ).
- the network interface 408 is configured, in one embodiment, to facilitate network communications of the computer system or server 400 over a communications channel of a network, such as the network 120 , shown in FIG. 1 .
- the memory 410 is configured to store one or more applications or programs 412 , such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown in FIG.
- the results correlation program or tool 420 which runs on the computer server or system 400 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing an evaluation of the scanning results received from both the local host computer system 200 ( FIG. 2 ) and the remote host computer system 300 ( FIG. 3 ) for detecting presence of any malicious software or malware running on the host computer system 200 .
- the results correlation program or tool 420 running on the computer system or server 400 includes a receiving module 422 , a comparison module 424 , an evaluation module 426 , a flag module 428 , a report generation module 430 , and a communication module 432 .
- the receiving module 422 is configured to receive both local scan results from a host computer server or system that is suspected of having malicious software or malware running thereon and remote scan results from a remote computer system or server that conducts a remote scan of the host computer system or server over a network.
- the comparison module 424 is configured to compare the list of all the tasks enumerated to be running on the host computer system 200 as a result of the local scan performed with the list of all the remote tasks enumerated to be running on the host computer system 200 as a result of the remote scan performed on the host computer system 200 .
- the comparison module 424 compares the service listings obtained from the local port by the local computer system versus the service listings obtained remotely from the same port by the remote computer system.
- the evaluation module 426 is configured to evaluate the comparisons conducted by the comparison module 424 in order to generate correlation results stored in the correlation results log 414 in local storage 402 as to whether or not there are any discrepancies found between the local scanning results and the remote scanning results.
- the flag module 428 is configured to flag the computer system suspected of having malicious software or malware running thereon as a result of the evaluation conducted by the evaluation module 426 .
- the report generation module 430 is configured to generate a discrepancy report enumerating the discrepancies found between the local scan and the remote scan evaluated by the computer system 400 .
- the communication module 432 is configured to permit communication between the various modules of the results correlation tool 420 , memory 410 , local storage 402 and with external computer systems, such as, the computer system 200 (shown in FIG. 2 ) and the computer system 300 ( FIG. 3 ), which are connected to the computer system 400 over a network.
- FIG. 5 there is illustrated a system 500 within an infrastructure 502 that includes a server or computer system 504 that has deployed thereon a computer program product, namely, the local scanning agent program or tool 514 , which implements the invention for dynamically performing a local scan of the computer system 504 , in accordance with an embodiment of the present invention.
- the computer program product comprises a computer readable or computer-usable storage medium, which provides program code namely, the local scanning agent program or tool 514 , for use by or in connection with a computer server or computer system or any instruction execution system.
- the local scanning program or tool 514 can be loaded into memory 514 of the host computer system 504 from a computer readable storage medium or media reference numeral 516 , such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 518 ) installed on the respective systems or servers.
- system 500 includes a computer infrastructure 502 , which is intended to represent any type of computer architecture that is maintained in a secure environment (i.e., for which access control is enforced).
- infrastructure 502 includes a computer server or system 504 that typically represents an application server or system 504 or the like that includes a local scanning agent program or tool 514 .
- other hardware and software components e.g., additional computer systems, routers, firewalls, etc. could be included in infrastructure 502 .
- the host system 504 is connected via a network to infrastructure 502 .
- the host system 504 includes the local scanning tool or agent program 514 that is run on the host system 504 for performing a local scan of the tasks and network services currently running on the host computer system 504 .
- the host system 504 (computer system 102 in FIG. 1 ) can communicate with computer server or system 530 (computer system 104 in FIG. 1 ) and/or computer server or system 540 (computer system 106 in FIG. 1 ) over a network (reference numeral 120 in FIG. 1 ), as discussed herein above with respect to FIG. 1 .
- the computer system or server 530 can interface with infrastructure 502 in order to run a remote scan of the computer system or server 504 using a remote scanning program or tool 534 that is loaded into the local memory 533 of the host computer system 530 from a computer readable storage medium or media reference numeral 532 , such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 554 ) installed on the respective system or server 530 .
- the computer system or server 540 can interface with infrastructure 502 in order to receive results of the local scan performed by system or server 504 and can receives results of the remote scan of the computer system or server 504 performed by the server 530 .
- a results correlation too or program is loaded into the local memory 543 of the host computer system 540 from a computer readable storage medium or media reference numeral 542 , such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 556 ) installed on the respective system or server 540 .
- the computer system or server 540 receive results of the local scan conducted by the computer system 504 and the results of the remote scan conducted by the computer system 530 of computer system 504 and can compare the local scan results with the remote scan results to determine whether or not the host system 504 may be running a malicious software or malware.
- infrastructure 502 could be owned and/or operated by a party such as provider 526 , or by an independent entity. Regardless, use of infrastructure 502 and the teachings described herein could be offered to the parties on a subscription or fee-basis.
- the host computer system or server 504 is shown to include a CPU (hereinafter âprocessing unit 506â), a memory 512 , a bus 510 , and input/output (I/O) interfaces 508 . Further, the server 504 is shown in communication with external I/O devices/resources 520 and storage system 522 .
- processing unit 506 executes computer program code stored in memory 512 , such as the local scanning agent program or tool 514 to determine the tasks and services currently running on the computer system 504 .
- the local scanning results 524 produced by the execution of the local scanning agent program or tool 514 is stored in storage 522 .
- the computer systems or servers 530 and 540 each include a CPU, a memory, a bus, and input/output (I/O) interfaces, similar to computer system 504 .
- the server 530 is in communication with external I/O devices/resources (not shown) and storage system 536
- computer system or server 540 is in communication with I/O devices or resources (not shown) and storage system 546 .
- processing unit 506 executes computer program code stored in memory 512 , such as the local scanning agent program or tool 514 to determine the tasks and services currently running on the computer system 504
- processing unit of computer system 530 executes computer program code stored in memory 533 , such as, the remote scanning agent program 534 to determine tasks and services running on the computer system 504
- processing unit of computer system 540 executes computer program code stored in memory 543 , such as, the results correlation tool or program 544 to determine any discrepancies between the local scan and the remote scan of the computer system 504 .
- the local scanning results 524 produced by the execution of the local scanning agent program or tool 514 running on computer system 504 is stored in storage 522
- the remote scanning results 538 produced by the execution of the remote scanning agent 534 is stored in storage 536 of computer system 530
- the correlation results 548 performed by the execution of the results correlation tool 544 on computer system 540 is stored in storage 546 of computer system 540 .
- the processing unit 506 can read and/or write data, to/from memory 512 , storage system 522 , and/or I/O interfaces 508 , such as, the local scanning results 524 stored in storage 522 .
- the local scanning tool 514 may store the local scanning results 524 in memory 512 .
- Bus 510 provides a communication link between each of the components in computer system 500 , such that information can be communicated within the infrastructure 502 .
- External devices 524 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact with computer system 500 and/or any devices (e.g., network card, modem, etc.) that enable host system 504 to communicate with one or more other computing devices, such as, servers 530 and/or 540 .
- the processing unit can read and/or write data, to/from memory 533 , storage system 536 , such as, the local scanning results 538 stored in storage 536 .
- the remote scanning tool 534 may store the remote scanning results 538 in memory 533 .
- the processing unit can read and/or write data, to/from memory 543 , storage system 546 , such as, the correlation results 548 stored in storage 546 .
- the results correlation tool 544 may store the correlation results 548 in memory 543
- Computer infrastructure 502 is only illustrative of various types of computer infrastructures for implementing the invention.
- computer infrastructure 502 may comprise two or more server groups or clusters that communicate over a network to perform the various process steps of the invention.
- computer system 500 is only representative of various possible computer systems that can include numerous combinations of hardware.
- computer system 500 can comprise any specific purpose computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general purpose hardware/software, or the like.
- the program code and hardware can be created using standard programming and engineering techniques, respectively.
- processing unit 506 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server.
- memory 512 and/or storage system 522 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations.
- I/O interfaces 508 can comprise any system for exchanging information with one or more external devices 520 .
- one or more additional components e.g., system software, math co-processing unit, etc.
- Storage systems 522 , 536 and 546 can be any type of system (e.g., a database) capable of providing storage for information under the present invention.
- storage systems 522 , 536 and 546 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive.
- systems 522 , 536 and 546 include data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown).
- LAN local area network
- WAN wide area network
- SAN storage area network
- additional components such as cache memory, communication systems, system software, etc., may be incorporated into computer system 500 .
- the invention provides a method or process for detecting the presence of malicious software and malware running on a computer system or host computer system, in accordance with an embodiment of the invention.
- FIG. 6 reference numeral 600 , which outlines the steps performed by a host computer system suspected of having unwanted malware or malicious software running thereon, in accordance with an embodiment of the invention.
- a local scanning software tool or agent program is run locally on the âsuspiciousâ host computer system suspected of having a malicious software or malware running thereon in order to obtain a list of currently running or active network services.
- step 604 the local scanning tool or agent program running locally on the host computer system enumerates and lists currently running or active services and their respective ports in use in the host computer system.
- the local scan results listing or enumerating the active services and their respective ports in use in the host computer system is sent (in step 606 ) to another computer system on the network, namely, a results correlation computer system running a results correlation engine for comparison and evaluation of the scanning results, as discussed herein below with respect to FIG. 8 .
- FIG. 7 reference numeral 700 , which outlines the steps performed by a remote computer system that is a computer system remote to the host computer system for detecting presence of unwanted malware or malicious software running on the host computer system, in accordance with an embodiment of the invention.
- a remote scanning tool or agent program is run on the remote computer system in step 702 for remotely connecting to the host computer system over a network and to obtain a list of open network ports on the host computer system.
- the remote scanning tool or agent program remotely connects to the host computer system to enumerate and list currently running or active network services and their respective ports in use in the host computer system.
- the remote scanning computer system attempts to connect to each open port on the host computer system and performs an interrogation of the services running to determine whether or not the service is a known or common service. As such, a list of open, closed and filtered ports is obtained by the remote computer system. Further, the remote scan results listing or enumerating the network ports and services visible over the network are sent in step 706 to the results correlation computer system running a results correlation engine for comparison and evaluation of the scanning results, as discussed herein below with respect to FIG. 8 .
- step 802 the results correlation computer system receives the local scanning results from the host computer system and, in step 804 , the results correlation computer system receives the remote scanning results from the remote computer system.
- the results correlation computer system running a results correlation engine compares in step 806 the local list (corresponding to the local scan) and the remote list (corresponding to the remote scan) of network services running on the host computer system for any discrepancies. Any discrepancies found represent hidden services and are indicative of unwanted software or malware.
- step 810 the results correlation engine determines whether or not there is a discrepancy between the local list and the remote list. If the results correlation engine determines in step 810 that there is no discrepancy between the local list and the remote list of network services running on the host computer system, that is, there are no suspicious network discrepancies found, then the process ends in step 812 . However, if the results correlation engine determines in step 810 that there are one or more discrepancies found between the local list and the remote list of network services running on the host computer system, that is, there are suspicious network discrepancies that are found that are to be likely associated with unwanted or malicious software running on the host computer system, then the results correlation engine documents and logs the discrepancies in step 814 .
- the results correlation engine flags or identifies the âsuspiciousâ host computer system as possibly infected. Additionally, in step 818 , further tests are run on the flagged host computer system and the flagged host computer system is monitored to evaluate the nature of the discrepancy found and the malicious or unwanted software currently installed on the host computer system, ending the process.
- the host computer system has deployed thereon one or more test programs for testing and/or evaluating any discrepancies found by the results correlation engine. It will be understood by one skilled in the art that the testing and evaluation of the host computer system can be manually implemented, as necessary, by an administrator.
- the invention provides a system, method and a program product for detecting the presence of malicious software and malware running on a computer system or host computer system, in accordance with an embodiment of the invention.
- the invention requires the ability to interrogate the host computer system both locally and remotely. Local interrogation could be conducted through a locally installed agent (user or administrator-level access), or through standard network service interrogation techniques that typically require administrative-level access. Remote service interrogation of the host computer system can be conducted with standard port scanning and vulnerability scanning technologies.
- the device labeled âsuspicious hostâ may or may not originally be âsuspiciousâ and the interrogation of the host may be a routine/scheduled event for preemptive detection of malicious activities and installation of unwanted services.
- Local host enumeration of network services could be achieved through the use of default operating system query tools, or custom tools.
- the network interrogator may use standard remote port scanning techniques to identify open ports and enumerate the services behind them.
- the results correlation engine could be a stand-alone device, part of the network interrogator toolset, or part of an additional software suite whose purpose is to act upon any discrepancies identified between the âlocal scanning resultsâ and the âremote network scanning resultsâ
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
Abstract
A system, method and program product for detecting presence of malicious software running on a computer system. The method includes locally querying the system to enumerate a local inventory of tasks and network services running on the system for detecting presence of malicious software running on the system and remotely querying the system from a remote system via a network to enumerate a remote inventory of tasks and network services running on the system for detecting presence of malicious software running on the system, where the local inventory enumerates ports in use on the system and where the remote inventory enumerates ports in use on the system. Further, the method includes collecting the local inventory and the remote inventory and comparing the local inventory with the remote inventory to identify any discrepancies between the local and the remote inventories for detecting presence of malicious software running on the system.
Description
- The present invention relates to computer systems and software, and more specifically to a technique for detecting presence of malicious software, such as, a malicious service agent running on a computer system.
- Unwanted software and malware frequently use complex techniques to hide their installation from users of the host. Various technologies have been proposed to detect ârootkitsâ and other stealth install techniques. These existing techniques require the querying of the host through local means in a powered and unpowered state. These existing techniques, in particular the process of assessing a host in an unpowered state is highly disruptive and time consuming. As such, there is a need for administrators to effectively identify the presence of such installations without powering down the host.
- The present invention resides in a system, method and program product for detecting presence of malicious software and malware, using a program or tool, in accordance with an embodiment of the invention. The method includes locally querying a computer system to enumerate a local inventory of tasks and network services currently running on the computer system in order to detect presence of a malicious service agent running on the computer system, wherein the local inventory of tasks and network services enumerated includes respective ports in use on the computer system and remotely querying via a network the computer system from a remote computer system to enumerate a remote inventory of tasks and network services currently running on the computer system in order to detect presence of the malicious service agent running on the computer system, wherein the remote inventory of tasks and network services enumerated includes respective ports in use on the computer system. Further, the method includes collecting each of the local inventory of tasks and network services enumerated and collecting each of the remote inventory of tasks and network services enumerated and comparing the local inventory of tasks and network services enumerated with the remote inventory of tasks and network services enumerated to identify any discrepancies between the local inventory of tasks and network services enumerated and the remote inventory of tasks and network services enumerated for detecting presence of the malicious service agent running on the computer system. In an embodiment, the locally querying step further includes providing a first tool for locally detecting presence of the malicious service agent running on the computer system and utilizing the first tool to conduct a local scan of the computer system to locally query the computer system. In an embodiment, the remotely querying step further includes providing a second tool for remotely detecting presence of the malicious service agent running on the computer system and utilizing the second tool to conduct a remote scan of the computer system to remotely query the computer system. In an embodiment, a port of the respective ports includes at least one of: an open port, a closed port and a filtered port. In an embodiment, the method further includes flagging the computer system having any discrepancies identified for conducting further tests to evaluate any discrepancies identified for determining presence of the malicious service agent running on the computer system.
- The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention:
-
FIG. 1 is a schematic block diagram illustrating one embodiment of a system for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention. -
FIG. 2 depicts an embodiment of a computer system having deployed thereon a local scanning tool for performing a local scan of the computer system for detecting presence of malicious software and malware running on the computer system, in accordance with an embodiment of the present invention. -
FIG. 3 depicts an embodiment of a computer system having deployed thereon a remote scanning tool for performing a remote scan of a remote computer system for detecting presence of malicious software and malware running on the remote computer system, in accordance with an embodiment of the present invention. -
FIG. 4 depicts an embodiment of a computer system having deployed thereon a results correlation engine or program for performing analysis or evaluation of the local scanning results received and the remote scanning results received for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention. -
FIG. 5 depicts a computer infrastructure for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention. -
FIG. 6 depicts a flowchart outlining the steps performed by a host computer system for locally detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention. -
FIG. 7 depicts a flowchart outlining the steps performed by a remote computer system for remotely detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention. -
FIG. 8 depicts a flowchart outlining the overall steps performed by a results correlation computer system for detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention. - Many of the functional units described in this specification have been labeled as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
- Modules may also be implemented in software for execution by various types of processors. An identified module or component of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
- Further, a module of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, over disparate memory devices, and may exist, at least partially, merely as electronic signals on a system or network.
- Furthermore, modules may also be implemented as a combination of software and one or more hardware devices. For instance, a module may be embodied in the combination of a software executable code stored on a memory device. In a further example, a module may be the combination of a processor that operates on a set of operational data. Still further, a module may be implemented in the combination of an electronic signal communicated via transmission circuitry.
- Reference throughout this specification to âone embodiment,â âan embodiment,â or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases âin one embodiment,â âin an embodiment,â and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
- Moreover, the described features, structures, or characteristics of the invention may be combined in any suitable manner in one or more embodiments. It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit and scope of the invention. Thus, it is intended that the present invention cover the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. Reference will now be made in detail to the preferred embodiments of the invention.
- In one embodiment, the invention provides a system for detecting presence of malicious software and malware running on a computer system or host system, in accordance with an embodiment of the invention. Reference is now made to
FIG. 1 ,reference numeral 100, which schematically illustrates an embodiment of a system for detecting presence of malicious software and malware, such as, a malicious service agent running on a computer system, in accordance with an embodiment of the invention. As shown inFIG. 1 , thesystem infrastructure 100 includes a firsthost computer system 102 that is remotely connected to anetwork 120. In an embodiment, the firsthost computer system 102 has a local interrogation agent program or local scanning agent or tool installed thereon for conducting a local query or interrogation of the firsthost computer system 102. The local interrogation agent or software is run on thefirst computer system 102 to determine local tasks and network services currently running on the firsthost computer system 102. Further, thesystem infrastructure 100 includes asecond host computer 104 that is also connected to thenetwork 120 and is remote to the firsthost computer system 102. In an embodiment, thesecond host computer 104 includes a network interrogation tool for conducting a remote query or interrogation of the firsthost computer system 102 for enumerating a remote inventory of tasks and network services currently running on the firsthost computer system 102. Further, thesystem infrastructure 100 includes athird computer system 106 connected to thenetwork 120, thethird computer system 106 having a results correlation engine deployed thereon for correlating results received from thefirst computer system 102 and thesecond computer system 104. In an embodiment, thethird computer system 106 collects results of the local query or interrogation conducted by the firsthost computer system 102. Further, thethird computer system 106 also collects results of the remote query or interrogation conducted by the secondhost computer system 104 on the firsthost computer system 102. Furthermore, the results correlation engine deployed on thethird computer system 106 compares the local inventory of tasks and network services results enumerated by the firsthost computer system 102 with the remote inventory of tasks and network services results enumerated by the secondhost computer system 104 to identify any discrepancies between the local inventory results obtained from the firsthost computer system 102 and the remote inventory results obtained from the secondhost computer system 104 for detecting presence of any malicious software, such as, a malicious service agent running on the firsthost computer system 102. Further, in an embodiment, thethird computer system 106 includes a reporting tool for generating adiscrepancy report 108 that identifies any discrepancies between the local scan performed by the firsthost computer system 102 and the remote scan performed by the secondhost computer system 104 on the firsthost computer system 102 for detecting presence of any malicious software running on the firsthost computer system 102. - Reference is now made to
FIG. 2 ,reference numeral 200, which depicts an embodiment of a host computer system or server (for instance, thehost computer system 102 shown inFIG. 1 ) having deployed thereon a computer program product, namely, a local scanning agent program or tool for conducting a local scan or interrogation of the host computer system suspected of having malicious software running thereon, in accordance with an embodiment of the present invention. In an embodiment, the local scanning tool orprogram 220 is run within the host computer system orserver 200. Preferably, thecomputer system 200 is a computer system or server that includes a central processing unit (CPU) 204, alocal storage device 202, auser interface 206, anetwork interface 208, and amemory 210. TheCPU 204 is configured generally to execute operations within the host system/server 200. Theuser interface 206, in one embodiment, is configured to allow a user or operator to interact with the computer system orserver 200, including allowing input of commands and/or data for conducting a local scan of thecomputer system 200. Thenetwork interface 208 is configured, in one embodiment, to facilitate network communications of the host system orserver 200 over a communications channel of a network, such as thenetwork 120, shown inFIG. 1 . In an embodiment, thememory 210 is configured to store one or more applications orprograms 212, such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown inFIG. 2 , the local scanning agent program ortool 220 which runs on the host server orsystem 200 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a local scan of thehost computer system 200 for enumerating a local inventory of tasks and network services running on the host computer system. In an embodiment, shown inFIG. 2 , the local scanning tool oragent program 220 running on thehost computer system 200 includes aninitiation module 222, atasks module 224, anetwork services module 226, alist generation module 228, aresults log module 230, aforwarding module 232 and acommunication module 234. In an embodiment, theinitiation module 222 is configured to initiate a local scan of thehost computer system 200. Thetasks module 224 is configured to enumerate or list all the tasks running on thehost computer system 200. Further, thenetwork services module 226 is configured to enumerate or list all the network services running on thehost computer system 200. In an embodiment, thelist generation module 228 is configured to generate a list enumerating all of the tasks and network services running on the host computer system. The results logmodule 230 is configured to generate a log of the results of the local scan conducted on the host computer system. In an embodiment, the local scan results log 214 generated by the results logmodule 230 are stored in alocal storage 202 within thehost computer system 200. Theforwarding module 232 is configured to forward the results of the local scan performed on thehost computer system 200 to another computer system comprising a results correlation engine (for instance,computer system 400, shown inFIG. 4 ) for evaluating the local scan results received from thehost computer system 200. Thecommunication module 234 is configured to permit communication between the various modules of thelocal scanning tool 220,memory 210,local storage 202 and with external computer systems, such as, the computer system comprising the results correlation engine, which is connected to the host computer system over a network. - Reference is now made to
FIG. 3 ,reference numeral 300, which depicts an embodiment of a remote host computer system or server (for instance, the remotehost computer system 104 shown inFIG. 1 ) having deployed thereon a computer program product, namely, a remote scanning agent program or tool for opening connections with the first host computer system and for conducting a remote scan or interrogation of the first host computer system suspected of having malicious software running thereon, in accordance with an embodiment of the present invention. In an embodiment, the remote scanning tool orprogram 320 is run within the second host computer system orserver 300. Preferably, thecomputer system 300 is a computer system or server that includes a central processing unit (CPU) 304, astorage device 302, auser interface 306, anetwork interface 308, and amemory 310. TheCPU 304 is configured generally to execute operations within the host system/server 300. Theuser interface 306, in one embodiment, is configured to allow a user or operator to interact with the computer system orserver 300, including allowing input of commands and/or data for conducting a remote scan of a host computer system remote to thecomputer system 300, such as, thecomputer system 200, shown inFIG. 2 . Thenetwork interface 308 is configured, in one embodiment, to facilitate network communications of the host system orserver 300 over a communications channel of a network, such as thenetwork 120, shown inFIG. 1 . In an embodiment, thememory 310 is configured to store one or more applications orprograms 312, such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown inFIG. 3 , the local scanning agent program ortool 320 which runs on the host server orsystem 300 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a remote scan of the remote computer system 200 (FIG. 2 ) for enumerating a remote inventory of tasks and network services running on the remotehost computer system 200. In an embodiment, shown inFIG. 3 , the remote scanning tool oragent program 320 running on thehost computer system 300 includes aninitiation module 322, atasks module 324, anetwork services module 326, alist generation module 328, aresults log module 330, aforwarding module 332 and acommunication module 334. In an embodiment, theinitiation module 322 is configured to initiate a remote scan of all ports of the remotehost computer system 200 over a network. Thetasks module 324 is configured to enumerate or list all the tasks running on the remotehost computer system 200. Further, thenetwork services module 326 is configured to enumerate or list all the network services running on the remotehost computer system 200. In an embodiment, thelist generation module 328 is configured to generate a list enumerating all of the tasks and network services running on the remotehost computer system 200. The results logmodule 330 is configured to generate a log of the results of the remote scan conducted on the remotehost computer system 200. In an embodiment, the remote scan results log 314 generated by the results logmodule 330 are stored in alocal storage 302 within thehost computer system 300. Theforwarding module 332 is configured to forward the results of the remote scan performed on the remotehost computer system 200 to another computer system comprising a results correlation engine (for instance,computer system 400, shown inFIG. 4 ) for evaluating the remote scan results received from thehost computer system 300. Thecommunication module 334 is configured to permit communication between the various modules of theremote scanning tool 320,memory 310,local storage 302 and with external computer systems, such as, the computer system 400 (shown inFIG. 4 ) comprising the results correlation engine, which is connected to thehost computer system 300 over a network. - Reference is now made to
FIG. 4 ,reference numeral 400, which depicts an embodiment of a computer system or server (for instance, thecomputer system 106 shown inFIG. 1 ) having deployed thereon a computer program product, namely, a results correlation program or tool orengine 420 for correlating local scan results received from a first host computer system or server and remote scan results of the first host computer system received from a second host computer system or server for detecting presence of any malicious software running on the first computer system, in accordance with an embodiment of the present invention. Preferably, thecomputer system 400 is a computer system or server that includes a central processing unit (CPU) 404, astorage device 402, auser interface 406, anetwork interface 408, and amemory 410. TheCPU 404 is configured generally to execute operations within the host system/server 400. Theuser interface 406, in one embodiment, is configured to allow a user or operator to interact with the computer system orserver 400, including allowing input of commands and/or data for collecting scan results from one or more computer systems or servers, such as, computer system 200 (FIG. 2 ) and/or computer system 300 (FIG. 3 ). Thenetwork interface 408 is configured, in one embodiment, to facilitate network communications of the computer system orserver 400 over a communications channel of a network, such as thenetwork 120, shown inFIG. 1 . In an embodiment, thememory 410 is configured to store one or more applications orprograms 412, such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown inFIG. 4 , the results correlation program ortool 420 which runs on the computer server orsystem 400 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing an evaluation of the scanning results received from both the local host computer system 200 (FIG. 2 ) and the remote host computer system 300 (FIG. 3 ) for detecting presence of any malicious software or malware running on thehost computer system 200. In an embodiment, shown inFIG. 4 , the results correlation program ortool 420 running on the computer system orserver 400 includes a receivingmodule 422, acomparison module 424, anevaluation module 426, aflag module 428, areport generation module 430, and acommunication module 432. In an embodiment, the receivingmodule 422 is configured to receive both local scan results from a host computer server or system that is suspected of having malicious software or malware running thereon and remote scan results from a remote computer system or server that conducts a remote scan of the host computer system or server over a network. Thecomparison module 424 is configured to compare the list of all the tasks enumerated to be running on thehost computer system 200 as a result of the local scan performed with the list of all the remote tasks enumerated to be running on thehost computer system 200 as a result of the remote scan performed on thehost computer system 200. In an embodiment, thecomparison module 424 compares the service listings obtained from the local port by the local computer system versus the service listings obtained remotely from the same port by the remote computer system. Further, theevaluation module 426 is configured to evaluate the comparisons conducted by thecomparison module 424 in order to generate correlation results stored in the correlation results log 414 inlocal storage 402 as to whether or not there are any discrepancies found between the local scanning results and the remote scanning results. Theflag module 428 is configured to flag the computer system suspected of having malicious software or malware running thereon as a result of the evaluation conducted by theevaluation module 426. Thereport generation module 430 is configured to generate a discrepancy report enumerating the discrepancies found between the local scan and the remote scan evaluated by thecomputer system 400. In an embodiment, thecommunication module 432 is configured to permit communication between the various modules of theresults correlation tool 420,memory 410,local storage 402 and with external computer systems, such as, the computer system 200 (shown inFIG. 2 ) and the computer system 300 (FIG. 3 ), which are connected to thecomputer system 400 over a network. - Referring now to
FIG. 5 , there is illustrated asystem 500 within aninfrastructure 502 that includes a server orcomputer system 504 that has deployed thereon a computer program product, namely, the local scanning agent program ortool 514, which implements the invention for dynamically performing a local scan of thecomputer system 504, in accordance with an embodiment of the present invention. The computer program product comprises a computer readable or computer-usable storage medium, which provides program code namely, the local scanning agent program ortool 514, for use by or in connection with a computer server or computer system or any instruction execution system. The local scanning program ortool 514 can be loaded intomemory 514 of thehost computer system 504 from a computer readable storage medium ormedia reference numeral 516, such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 518) installed on the respective systems or servers. As depicted inFIG. 5 ,system 500 includes acomputer infrastructure 502, which is intended to represent any type of computer architecture that is maintained in a secure environment (i.e., for which access control is enforced). Further, as shown,infrastructure 502 includes a computer server orsystem 504 that typically represents an application server orsystem 504 or the like that includes a local scanning agent program ortool 514. It should be understood, however, that although not shown, other hardware and software components (e.g., additional computer systems, routers, firewalls, etc.) could be included ininfrastructure 502. - In general, the
host system 504 is connected via a network toinfrastructure 502. Thehost system 504 includes the local scanning tool oragent program 514 that is run on thehost system 504 for performing a local scan of the tasks and network services currently running on thehost computer system 504. Further, as shown inFIG. 5 , the host system 504 (computer system 102 inFIG. 1 ) can communicate with computer server or system 530 (computer system 104 inFIG. 1 ) and/or computer server or system 540 (computer system 106 inFIG. 1 ) over a network (reference numeral 120 inFIG. 1 ), as discussed herein above with respect toFIG. 1 . For instance, the computer system orserver 530 can interface withinfrastructure 502 in order to run a remote scan of the computer system orserver 504 using a remote scanning program ortool 534 that is loaded into thelocal memory 533 of thehost computer system 530 from a computer readable storage medium ormedia reference numeral 532, such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 554) installed on the respective system orserver 530. Similarly, the computer system orserver 540 can interface withinfrastructure 502 in order to receive results of the local scan performed by system orserver 504 and can receives results of the remote scan of the computer system orserver 504 performed by theserver 530. In an embodiment, a results correlation too or program is loaded into thelocal memory 543 of thehost computer system 540 from a computer readable storage medium ormedia reference numeral 542, such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 556) installed on the respective system orserver 540. As such, the computer system orserver 540 receive results of the local scan conducted by thecomputer system 504 and the results of the remote scan conducted by thecomputer system 530 ofcomputer system 504 and can compare the local scan results with the remote scan results to determine whether or not thehost system 504 may be running a malicious software or malware. It should be understood that under the present invention,infrastructure 502 could be owned and/or operated by a party such asprovider 526, or by an independent entity. Regardless, use ofinfrastructure 502 and the teachings described herein could be offered to the parties on a subscription or fee-basis. - The host computer system or
server 504 is shown to include a CPU (hereinafter âprocessingunit 506â), amemory 512, abus 510, and input/output (I/O) interfaces 508. Further, theserver 504 is shown in communication with external I/O devices/resources 520 andstorage system 522. In general, processingunit 506 executes computer program code stored inmemory 512, such as the local scanning agent program ortool 514 to determine the tasks and services currently running on thecomputer system 504. In an embodiment, the local scanning results 524 produced by the execution of the local scanning agent program ortool 514 is stored instorage 522. Although not shown inFIG. 5 , the computer systems orservers computer system 504. Further, theserver 530 is in communication with external I/O devices/resources (not shown) andstorage system 536, whereas, computer system orserver 540 is in communication with I/O devices or resources (not shown) andstorage system 546. In general, processingunit 506 executes computer program code stored inmemory 512, such as the local scanning agent program ortool 514 to determine the tasks and services currently running on thecomputer system 504, whereas, the processing unit ofcomputer system 530 executes computer program code stored inmemory 533, such as, the remotescanning agent program 534 to determine tasks and services running on thecomputer system 504. Similarly, the processing unit ofcomputer system 540 executes computer program code stored inmemory 543, such as, the results correlation tool orprogram 544 to determine any discrepancies between the local scan and the remote scan of thecomputer system 504. Further, in an embodiment, the local scanning results 524 produced by the execution of the local scanning agent program ortool 514 running oncomputer system 504 is stored instorage 522, whereas, the remote scanning results 538 produced by the execution of theremote scanning agent 534 is stored instorage 536 ofcomputer system 530, and whereas, the correlation results 548 performed by the execution of theresults correlation tool 544 oncomputer system 540 is stored instorage 546 ofcomputer system 540. While executing the local scanning tool orprogram 514 on thecomputer system 504, theprocessing unit 506 can read and/or write data, to/frommemory 512,storage system 522, and/or I/O interfaces 508, such as, thelocal scanning results 524 stored instorage 522. Alternatively, thelocal scanning tool 514 may store thelocal scanning results 524 inmemory 512.Bus 510 provides a communication link between each of the components incomputer system 500, such that information can be communicated within theinfrastructure 502.External devices 524 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact withcomputer system 500 and/or any devices (e.g., network card, modem, etc.) that enablehost system 504 to communicate with one or more other computing devices, such as,servers 530 and/or 540. Similarly, while executing the remote scanning tool orprogram 534 on thecomputer system 530, the processing unit can read and/or write data, to/frommemory 533,storage system 536, such as, thelocal scanning results 538 stored instorage 536. Alternatively, theremote scanning tool 534 may store theremote scanning results 538 inmemory 533. Further, while executing the results correlation tool orprogram 544 on thecomputer system 540, the processing unit can read and/or write data, to/frommemory 543,storage system 546, such as, the correlation results 548 stored instorage 546. Alternatively, theresults correlation tool 544 may store the correlation results 548 inmemory 543 -
Computer infrastructure 502 is only illustrative of various types of computer infrastructures for implementing the invention. For example, in one embodiment,computer infrastructure 502 may comprise two or more server groups or clusters that communicate over a network to perform the various process steps of the invention. Moreover,computer system 500 is only representative of various possible computer systems that can include numerous combinations of hardware. To this extent, in other embodiments,computer system 500 can comprise any specific purpose computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general purpose hardware/software, or the like. In each case, the program code and hardware can be created using standard programming and engineering techniques, respectively. Moreover, processingunit 506 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server. Similarly,memory 512 and/orstorage system 522 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations. Further, I/O interfaces 508 can comprise any system for exchanging information with one or moreexternal devices 520. Still further, it is understood that one or more additional components (e.g., system software, math co-processing unit, etc.) not shown inFIG. 5 can be included incomputer system 500. -
Storage systems storage systems systems computer system 500. - In another embodiment, the invention provides a method or process for detecting the presence of malicious software and malware running on a computer system or host computer system, in accordance with an embodiment of the invention. Reference is now made to
FIG. 6 ,reference numeral 600, which outlines the steps performed by a host computer system suspected of having unwanted malware or malicious software running thereon, in accordance with an embodiment of the invention. As shown inFIG. 6 , instep 602, a local scanning software tool or agent program is run locally on the âsuspiciousâ host computer system suspected of having a malicious software or malware running thereon in order to obtain a list of currently running or active network services. Instep 604, the local scanning tool or agent program running locally on the host computer system enumerates and lists currently running or active services and their respective ports in use in the host computer system. The local scan results listing or enumerating the active services and their respective ports in use in the host computer system is sent (in step 606) to another computer system on the network, namely, a results correlation computer system running a results correlation engine for comparison and evaluation of the scanning results, as discussed herein below with respect toFIG. 8 . - Reference is now made to
FIG. 7 ,reference numeral 700, which outlines the steps performed by a remote computer system that is a computer system remote to the host computer system for detecting presence of unwanted malware or malicious software running on the host computer system, in accordance with an embodiment of the invention. A remote scanning tool or agent program is run on the remote computer system instep 702 for remotely connecting to the host computer system over a network and to obtain a list of open network ports on the host computer system. Instep 704, the remote scanning tool or agent program remotely connects to the host computer system to enumerate and list currently running or active network services and their respective ports in use in the host computer system. In an embodiment, the remote scanning computer system attempts to connect to each open port on the host computer system and performs an interrogation of the services running to determine whether or not the service is a known or common service. As such, a list of open, closed and filtered ports is obtained by the remote computer system. Further, the remote scan results listing or enumerating the network ports and services visible over the network are sent instep 706 to the results correlation computer system running a results correlation engine for comparison and evaluation of the scanning results, as discussed herein below with respect toFIG. 8 . - Reference is now made to
FIG. 8 ,reference numeral 800, which outlines the steps performed by the results correlation computer system for detecting presence of unwanted malware or malicious software running on the host computer system, in accordance with an embodiment of the invention. Instep 802, the results correlation computer system receives the local scanning results from the host computer system and, instep 804, the results correlation computer system receives the remote scanning results from the remote computer system. The results correlation computer system running a results correlation engine compares instep 806 the local list (corresponding to the local scan) and the remote list (corresponding to the remote scan) of network services running on the host computer system for any discrepancies. Any discrepancies found represent hidden services and are indicative of unwanted software or malware. Instep 810, the results correlation engine determines whether or not there is a discrepancy between the local list and the remote list. If the results correlation engine determines instep 810 that there is no discrepancy between the local list and the remote list of network services running on the host computer system, that is, there are no suspicious network discrepancies found, then the process ends instep 812. However, if the results correlation engine determines instep 810 that there are one or more discrepancies found between the local list and the remote list of network services running on the host computer system, that is, there are suspicious network discrepancies that are found that are to be likely associated with unwanted or malicious software running on the host computer system, then the results correlation engine documents and logs the discrepancies instep 814. Further, instep 816, the results correlation engine flags or identifies the âsuspiciousâ host computer system as possibly infected. Additionally, instep 818, further tests are run on the flagged host computer system and the flagged host computer system is monitored to evaluate the nature of the discrepancy found and the malicious or unwanted software currently installed on the host computer system, ending the process. In an embodiment, the host computer system has deployed thereon one or more test programs for testing and/or evaluating any discrepancies found by the results correlation engine. It will be understood by one skilled in the art that the testing and evaluation of the host computer system can be manually implemented, as necessary, by an administrator. - Accordingly, the invention provides a system, method and a program product for detecting the presence of malicious software and malware running on a computer system or host computer system, in accordance with an embodiment of the invention. The invention requires the ability to interrogate the host computer system both locally and remotely. Local interrogation could be conducted through a locally installed agent (user or administrator-level access), or through standard network service interrogation techniques that typically require administrative-level access. Remote service interrogation of the host computer system can be conducted with standard port scanning and vulnerability scanning technologies. The device labeled âsuspicious hostâ may or may not originally be âsuspiciousâ and the interrogation of the host may be a routine/scheduled event for preemptive detection of malicious activities and installation of unwanted services. Local host enumeration of network services could be achieved through the use of default operating system query tools, or custom tools. The network interrogator may use standard remote port scanning techniques to identify open ports and enumerate the services behind them. The results correlation engine could be a stand-alone device, part of the network interrogator toolset, or part of an additional software suite whose purpose is to act upon any discrepancies identified between the âlocal scanning resultsâ and the âremote network scanning resultsâ
- The foregoing descriptions of specific embodiments of the present invention have been presented for the purpose of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto and their equivalents.
Claims (25)
1. A method of detecting presence of a malicious service agent running on a computer system, said method comprising the steps of:
locally querying a computer system to enumerate a local inventory of tasks and network services currently running on said computer system in order to detect presence of a malicious service agent running on said computer system, wherein said local inventory of tasks and network services enumerated includes respective ports in use on said computer system;
remotely querying via a network said computer system from a remote computer system to enumerate a remote inventory of tasks and network services currently running on said computer system in order to detect presence of said malicious service agent running on said computer system, wherein said remote inventory of tasks and network services enumerated includes respective ports in use on said computer system;
collecting each of said local inventory of tasks and network services enumerated and collecting each of said remote inventory of tasks and network services enumerated; and
comparing said local inventory of tasks and network services enumerated with said remote inventory of tasks and network services enumerated to identify any discrepancies between said local inventory of tasks and network services enumerated and said remote inventory of tasks and network services enumerated for detecting presence of said malicious service agent running on said computer system.
2. The method according to claim 1 , wherein said locally querying step further comprises the steps of:
providing a first tool for locally detecting presence of said malicious service agent running on said computer system; and
utilizing said first tool to conduct a local scan of said computer system to locally query said computer system.
3. The method according to claim 2 , wherein said remotely querying step further comprises the steps of:
providing a second tool for remotely detecting presence of said malicious service agent running on said computer system; and
utilizing said second tool to conduct a remote scan of said computer system to remotely query said computer system.
4. The method according to claim 3 , wherein a port of said respective ports comprises at least one of: an open port, a closed port and a filtered port.
5. The method according to claim 4 , further comprising:
flagging said computer system having said any discrepancies identified for conducting further tests to evaluate said any discrepancies identified for determining presence of said malicious service agent running on said computer system.
6. A system for detecting presence of a malicious service agent running on a host computer system, comprising:
a network communications channel;
a host computer system connected to said network communications channel;
a first tool for locally detecting presence of a malicious service agent on said host computer system, said first tool being installed locally on said host computer system to conduct a local scan of said host computer system;
a remote computer system connected to said network communications channel;
a second tool for remotely detecting presence of said malicious service agent on said host computer system, said second tool being installed on said remote computer system for conducting a remote scan of said host computer system; and
a results correlation engine for correlating results collected from said local scan of said host computer system and said remote scan of said host computer system, said results correlation engine identifying any discrepancies between said local scan and said remote scan of said host computer system for detecting presence of said malicious service agent on said host computer system.
7. The system according to claim 6 , further comprising:
a third tool for providing a discrepancy report, said discrepancy report reporting said any discrepancies identified between said local scan and said remote scan of said host computer system for detecting presence of said malicious service agent on said host computer system.
8. The system according to claim 7 , wherein said first tool locally queries said host computer system to enumerate a local inventory of tasks and network services currently running on said host computer system, wherein said local inventory of tasks and network services enumerated includes respective ports in use on said host computer system, and wherein a port of said respective ports enumerated in said local inventory of tasks and network services currently running on said host computer system comprises at least one of: an open port, a closed port and a filtered port.
9. The system according to claim 8 , wherein said second tool remotely queries said host computer system to enumerate a remote inventory of tasks and network services currently running on said host computer system, wherein said remote inventory of tasks and network services enumerated includes respective ports in use on said host computer system, and wherein a port of said respective ports enumerated in said remote inventory of tasks and network services currently running on said host computer system comprises at least one of: an open port, a closed port and a filtered port.
10. The system according to claim 9 , further comprising a fourth tool for flagging said host computer system having said any discrepancies identified in order to conduct further tests to evaluate said any discrepancies for verifying presence of said malicious service agent running on said host computer system.
11. A computer program product for detecting presence of a malicious service agent running on a host computer system, said computer program product comprising:
a computer readable storage medium;
first program instructions to locally query a computer system for enumeration of a local inventory of tasks and network services currently running on said computer system for detecting presence of a malicious service agent running on said computer system, wherein said local inventory of tasks and network services enumerated includes respective ports in use on said computer system;
second program instructions to remotely query via a network said computer system from a remote computer system for enumeration of a remote inventory of tasks and network services currently running on said computer system for detecting presence of said malicious service agent running on said computer system, wherein said remote inventory of tasks and network services enumerated includes respective ports in use on said computer system;
third program instructions to collect each of said local inventory of tasks and network services enumerated and to collect each of said remote inventory of tasks and network services enumerated;
fourth program instructions to compare said local inventory of tasks and network services enumerated with said remote inventory of tasks and network services enumerated to identify any discrepancies between said local inventory of tasks and network services enumerated and said remote inventory of tasks and network services enumerated for detecting presence of said malicious service agent running on said computer system, and wherein said first, second, third and fourth program instructions are recorded on said computer readable storage medium.
12. The computer program product according to claim 11 , further comprising:
fifth program instructions to flag said computer system having said any discrepancies identified for conducting further tests to evaluate said any discrepancies, wherein said fifth program instructions are recorded on said computer readable medium.
13. The computer program product according to claim 12 , wherein said first program instructions further comprise instructions to provide a first tool for locally detecting presence of said malicious service agent running on said computer system, and to utilize said first tool to conduct a local scan of said computer system to locally query said computer system.
14. The computer program product according to claim 13 , wherein said second program instructions further comprise instructions to provide a second tool for remotely detecting presence of said malicious service agent running on said computer system, and to utilize said second tool to conduct a remote scan of said computer system to remotely query said computer system.
15. The computer program product according to claim 14 , wherein a port of said respective ports comprises at least one of: an open port, a closed port and a filtered port.
16. A computer system for detecting presence of a malicious service agent running on a host computer system, comprising:
first program instructions to locally query a computer system for enumeration of a local inventory of tasks and network services currently running on said computer system for detecting presence of a malicious service agent running on said computer system, wherein said local inventory of tasks and network services enumerated includes respective ports in use on said computer system;
second program instructions to remotely query via a network said computer system from a remote computer system for enumeration of a remote inventory of tasks and network services currently running on said computer system for detecting presence of said malicious service agent running on said computer system, wherein said remote inventory of tasks and network services enumerated includes respective ports in use on said computer system;
third program instructions to collect each of said local inventory of tasks and network services enumerated and to collect each of said remote inventory of tasks and network services enumerated;
fourth program instructions to compare said local inventory of tasks and network services enumerated with said remote inventory of tasks and network services enumerated to identify any discrepancies between said local inventory of tasks and network services enumerated and said remote inventory of tasks and network services enumerated for detecting presence of said malicious service agent running on said computer system;
a computer readable storage medium for storing each of said first, second, third and fourth program instructions; and
a central processing unit for executing each of said first, second, third and fourth program instructions.
17. The computer system according to claim 16 , fifth program instructions to flag said computer system having said any discrepancies identified for conducting further tests to evaluate said any discrepancies, wherein said fifth program instructions are stored on said computer readable storage medium for execution by said central processing unit.
18. The computer system according to claim 17 , wherein said first program instructions further comprise instructions to provide a first tool for locally detecting presence of said malicious service agent running on said computer system, and to utilize said first tool to conduct a local scan of said computer system to locally query said computer system.
19. The computer system according to claim 18 , wherein said second program instructions further comprise instructions to provide a second tool for remotely detecting presence of said malicious service agent running on said computer system, and to utilize said second tool to conduct a remote scan of said computer system to remotely query said computer system.
20. The computer system according to claim 19 , wherein a port of said respective ports comprises at least one of: an open port, a closed port and a filtered port.
21. A process for deploying computing infrastructure comprising integrating computer-readable code into a computing system, wherein said code in combination with said computing system is capable of detecting presence of a malicious service agent running on a host computer system, said process comprising the steps of:
locally running a first tool on a host computer system for conducting a local scan of said host computer system, said local scan enumerating a local inventory of tasks and network services currently running on said computer system and enumerating respective ports in use on said host computer system;
remotely running a second tool on said host computer system for conducting a remote scan of said host computer system, said remote scan enumerating a remote inventory of tasks and network services currently running on said computer system and enumerating respective ports in use on said host computer system; and
correlating results collected from said local scan and said remote scan of said host computer system to identify any discrepancies between said local inventory of tasks and network services enumerated and said remote inventory of tasks and network services enumerated for detecting presence of said malicious service agent running on said host computer system.
22. The process according to claim 21 , wherein said correlating step includes the step of:
comparing said local inventory of tasks and network services enumerated with said remote inventory of tasks and network services enumerated to identify said any discrepancies.
23. The process according to claim 22 , wherein a port of said respective ports enumerated in each of said local inventory of tasks and network services currently running on said host computer system and said remote inventory of tasks and network services currently running on said host computer system comprises at least one of: an open port, a closed port and a filtered port.
24. The process according to claim 23 , further comprising:
providing a discrepancy report for reporting said any discrepancies identified for evaluating presence of said malicious service agent running on said host computer system.
25. The process according to claim 24 , further comprising:
flagging said host computer system having said any discrepancies identified for conducting further tests to evaluate said any discrepancies identified for determining presence of said malicious service agent running on said host computer system.
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/261,026 US20100107257A1 (en) | 2008-10-29 | 2008-10-29 | System, method and program product for detecting presence of malicious software running on a computer system |
JP2011533666A JP5490127B2 (en) | 2008-10-29 | 2009-10-14 | System, method and program for detecting the presence of malicious software running on a computer system |
EP09752766.7A EP2294786B1 (en) | 2008-10-29 | 2009-10-14 | System, method and program product for detecting presence of malicious software running on a computer system |
KR1020117009680A KR20110076976A (en) | 2008-10-29 | 2009-10-14 | System, method and program product for detecting presence of malicious software running on a computer system |
CN2009801386798A CN102171987A (en) | 2008-10-29 | 2009-10-14 | System, method and program product for detecting presence of malicious software running on a computer system |
PCT/EP2009/063396 WO2010049273A2 (en) | 2008-10-29 | 2009-10-14 | System, method and program product for detecting presence of malicious software running on a computer system |
CA2719495A CA2719495C (en) | 2008-10-29 | 2009-10-14 | System, method and program product for detecting presence of malicious software running on a computer system |
US13/315,895 US8931096B2 (en) | 2008-10-29 | 2011-12-09 | Detecting malicious use of computer resources by tasks running on a computer system |
US14/547,359 US9251345B2 (en) | 2008-10-29 | 2014-11-19 | Detecting malicious use of computer resources by tasks running on a computer system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/261,026 US20100107257A1 (en) | 2008-10-29 | 2008-10-29 | System, method and program product for detecting presence of malicious software running on a computer system |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/315,895 Continuation-In-Part US8931096B2 (en) | 2008-10-29 | 2011-12-09 | Detecting malicious use of computer resources by tasks running on a computer system |
US13/315,895 Continuation US8931096B2 (en) | 2008-10-29 | 2011-12-09 | Detecting malicious use of computer resources by tasks running on a computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100107257A1 true US20100107257A1 (en) | 2010-04-29 |
Family
ID=42118823
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/261,026 Abandoned US20100107257A1 (en) | 2008-10-29 | 2008-10-29 | System, method and program product for detecting presence of malicious software running on a computer system |
US13/315,895 Active 2028-12-03 US8931096B2 (en) | 2008-10-29 | 2011-12-09 | Detecting malicious use of computer resources by tasks running on a computer system |
US14/547,359 Active US9251345B2 (en) | 2008-10-29 | 2014-11-19 | Detecting malicious use of computer resources by tasks running on a computer system |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/315,895 Active 2028-12-03 US8931096B2 (en) | 2008-10-29 | 2011-12-09 | Detecting malicious use of computer resources by tasks running on a computer system |
US14/547,359 Active US9251345B2 (en) | 2008-10-29 | 2014-11-19 | Detecting malicious use of computer resources by tasks running on a computer system |
Country Status (7)
Country | Link |
---|---|
US (3) | US20100107257A1 (en) |
EP (1) | EP2294786B1 (en) |
JP (1) | JP5490127B2 (en) |
KR (1) | KR20110076976A (en) |
CN (1) | CN102171987A (en) |
CA (1) | CA2719495C (en) |
WO (1) | WO2010049273A2 (en) |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070169192A1 (en) * | 2005-12-23 | 2007-07-19 | Reflex Security, Inc. | Detection of system compromise by per-process network modeling |
US20100333199A1 (en) * | 2009-06-25 | 2010-12-30 | Accenture Global Services Gmbh | Method and system for scanning a computer system for sensitive content |
US20110055381A1 (en) * | 2009-09-03 | 2011-03-03 | Mcafee, Inc. | Host information collection |
US20120060219A1 (en) * | 2009-04-30 | 2012-03-08 | Telefonaktiebolaget L.M Ericsson (Publ) | Deviating Behaviour of a User Terminal |
US20120084862A1 (en) * | 2008-10-29 | 2012-04-05 | International Business Machines Corporation | Detecting Malicious Use of Computer Resources by Tasks Running on a Computer System |
US20130160129A1 (en) * | 2011-12-19 | 2013-06-20 | Verizon Patent And Licensing Inc. | System security evaluation |
EP2624163A1 (en) * | 2012-01-31 | 2013-08-07 | Trusteer Ltd. | Method for detecting malware |
US20130219493A1 (en) * | 2012-02-22 | 2013-08-22 | iScan Online, Inc. | Remote Security Self-Assessment Framework |
WO2014111863A1 (en) * | 2013-01-16 | 2014-07-24 | Light Cyber Ltd. | Automated forensics of computer systems using behavioral intelligence |
US20140379714A1 (en) * | 2013-06-25 | 2014-12-25 | Compellent Technologies | Detecting hardware and software problems in remote systems |
US20150277950A1 (en) * | 2014-03-28 | 2015-10-01 | International Business Machines Corporation | Detecting operation of a virtual machine |
US9152787B2 (en) | 2012-05-14 | 2015-10-06 | Qualcomm Incorporated | Adaptive observation of behavioral features on a heterogeneous platform |
US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
US9330257B2 (en) | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9521154B2 (en) | 2011-08-03 | 2016-12-13 | Hewlett Packard Enterprise Development Lp | Detecting suspicious network activity using flow sampling |
US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
US10075461B2 (en) | 2015-05-31 | 2018-09-11 | Palo Alto Networks (Israel Analytics) Ltd. | Detection of anomalous administrative actions |
US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
US10158660B1 (en) * | 2013-10-17 | 2018-12-18 | Tripwire, Inc. | Dynamic vulnerability correlation |
US10686829B2 (en) | 2016-09-05 | 2020-06-16 | Palo Alto Networks (Israel Analytics) Ltd. | Identifying changes in use of user credentials |
US10999304B2 (en) | 2018-04-11 | 2021-05-04 | Palo Alto Networks (Israel Analytics) Ltd. | Bind shell attack detection |
US11012492B1 (en) | 2019-12-26 | 2021-05-18 | Palo Alto Networks (Israel Analytics) Ltd. | Human activity detection in computing device transmissions |
US11070569B2 (en) | 2019-01-30 | 2021-07-20 | Palo Alto Networks (Israel Analytics) Ltd. | Detecting outlier pairs of scanned ports |
US11184377B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using source profiles |
US11184376B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Port scan detection using destination profiles |
US11184378B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Scanner probe detection |
US11233703B2 (en) * | 2018-11-20 | 2022-01-25 | Cisco Technology, Inc. | Extending encrypted traffic analytics with traffic flow data |
US11316872B2 (en) | 2019-01-30 | 2022-04-26 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using port profiles |
US11509680B2 (en) | 2020-09-30 | 2022-11-22 | Palo Alto Networks (Israel Analytics) Ltd. | Classification of cyber-alerts into security incidents |
US11799880B2 (en) | 2022-01-10 | 2023-10-24 | Palo Alto Networks (Israel Analytics) Ltd. | Network adaptive alert prioritization system |
US12039017B2 (en) | 2021-10-20 | 2024-07-16 | Palo Alto Networks (Israel Analytics) Ltd. | User entity normalization and association |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164652B (en) * | 2011-12-15 | 2015-07-29 | 桹ĺłĺ¸č žčŽŻčŽĄçŽćşçłťçťćéĺ Źĺ¸ | Wooden horse scan method and system |
US9473346B2 (en) * | 2011-12-23 | 2016-10-18 | Firebind, Inc. | System and method for network path validation |
US8949995B2 (en) * | 2012-09-18 | 2015-02-03 | International Business Machines Corporation | Certifying server side web applications against security vulnerabilities |
CN103268446A (en) * | 2012-12-28 | 2013-08-28 | ćŚćąĺŽĺ¤ŠäżĄćŻććŻćéč´Łäťťĺ Źĺ¸ | Mobile phone malicious code detection method based on SD (Secure Digital) card driver and system thereof |
KR101451323B1 (en) * | 2014-02-10 | 2014-10-16 | 죟ěíěŹ ë˝ě¸ěť´íźë | Application security system, security server, security client apparatus, and recording medium |
US9756062B2 (en) * | 2014-08-27 | 2017-09-05 | General Electric Company | Collaborative infrastructure supporting cyber-security analytics in industrial networks |
US9432393B2 (en) * | 2015-02-03 | 2016-08-30 | Cisco Technology, Inc. | Global clustering of incidents based on malware similarity and online trustfulness |
CN104751058B (en) * | 2015-03-16 | 2018-08-31 | čćł(ĺ亏)ćéĺ Źĺ¸ | A kind of file scanning method and electronic equipment |
US10176438B2 (en) | 2015-06-19 | 2019-01-08 | Arizona Board Of Regents On Behalf Of Arizona State University | Systems and methods for data driven malware task identification |
CN106878240B (en) * | 2015-12-14 | 2020-06-02 | éżé塴塴éĺ˘ć§čĄćéĺ Źĺ¸ | Zombie host identification method and device |
US10469324B2 (en) | 2016-11-22 | 2019-11-05 | Amazon Technologies, Inc. | Virtual network verification service |
JP6742541B2 (en) * | 2017-12-22 | 2020-08-19 | ä¸čąéťćŠć Şĺźäźç¤ž | In-vehicle device, authentication method and authentication program |
CN108282489B (en) * | 2018-02-07 | 2020-01-31 | ç˝ĺŽżç§ćčĄäť˝ćéĺ Źĺ¸ | vulnerability scanning method, server and system |
US10708755B2 (en) * | 2018-04-03 | 2020-07-07 | Servicenow, Inc. | Discovery and service mapping of serverless resources |
US11108805B2 (en) * | 2018-06-27 | 2021-08-31 | Amazon Technologies, Inc. | Automated packetless network reachability analysis |
CN109039812B (en) * | 2018-07-20 | 2021-05-11 | 桹ĺłĺ澡垎äźéśčĄčĄäť˝ćéĺ Źĺ¸ | Port detection method, system and computer readable storage medium |
KR102327026B1 (en) | 2019-02-07 | 2021-11-16 | ęł ë ¤ëíęľ ě°ííë Ľë¨ | Device and method for learning assembly code and detecting software weakness based on graph convolution network |
US11277426B1 (en) * | 2019-09-13 | 2022-03-15 | Rapid7, Inc. | Anomalous asset detection based on open ports |
US20220394050A1 (en) * | 2021-06-08 | 2022-12-08 | EMC IP Holding Company LLC | Managing initiator identities |
US11916930B2 (en) * | 2021-06-29 | 2024-02-27 | Acronis International Gmbh | Non-invasive virus scanning using remote access |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6216173B1 (en) * | 1998-02-03 | 2001-04-10 | Redbox Technologies Limited | Method and apparatus for content processing and routing |
US20040030912A1 (en) * | 2001-05-09 | 2004-02-12 | Merkle James A. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
US20050086526A1 (en) * | 2003-10-17 | 2005-04-21 | Panda Software S.L. (Sociedad Unipersonal) | Computer implemented method providing software virus infection information in real time |
US20060156380A1 (en) * | 2005-01-07 | 2006-07-13 | Gladstone Philip J S | Methods and apparatus providing security to computer systems and networks |
US20060179483A1 (en) * | 2005-02-07 | 2006-08-10 | Rozas Guillermo J | Method and system for validating a computer system |
US20060224930A1 (en) * | 2005-03-31 | 2006-10-05 | Ibm Corporation | Systems and methods for event detection |
US20070022287A1 (en) * | 2005-07-15 | 2007-01-25 | Microsoft Corporation | Detecting user-mode rootkits |
US20070143848A1 (en) * | 2005-12-16 | 2007-06-21 | Kraemer Jeffrey A | Methods and apparatus providing computer and network security for polymorphic attacks |
US20070240212A1 (en) * | 2006-03-30 | 2007-10-11 | Check Point Software Technologies, Inc. | System and Methodology Protecting Against Key Logger Spyware |
US20070300061A1 (en) * | 2006-06-21 | 2007-12-27 | Eun Young Kim | System and method for detecting hidden process using system event information |
US20080148407A1 (en) * | 2006-12-18 | 2008-06-19 | Cat Computer Services Pvt Ltd | Virus Detection in Mobile Devices Having Insufficient Resources to Execute Virus Detection Software |
US20080320594A1 (en) * | 2007-03-19 | 2008-12-25 | Xuxian Jiang | Malware Detector |
US20090007269A1 (en) * | 2007-06-29 | 2009-01-01 | Network Security Technologies, Inc. | Using imported data from security tools |
US7523502B1 (en) * | 2006-09-21 | 2009-04-21 | Symantec Corporation | Distributed anti-malware |
US7685254B2 (en) * | 2003-06-10 | 2010-03-23 | Pandya Ashish A | Runtime adaptable search processor |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7509675B2 (en) * | 2002-05-29 | 2009-03-24 | At&T Intellectual Property I, L.P. | Non-invasive monitoring of the effectiveness of electronic security services |
US7418732B2 (en) * | 2002-06-26 | 2008-08-26 | Microsoft Corporation | Network switches for detection and prevention of virus attacks |
JP3767581B2 (en) | 2003-06-13 | 2006-04-19 | ă¤ăăć Şĺźäźç¤ž | Typing skill acquisition support device, word learning acquisition support device, server terminal, and program |
JP2005025269A (en) * | 2003-06-30 | 2005-01-27 | Toshiba Corp | Network relay device and method for inspecting security |
WO2006071985A2 (en) * | 2004-12-29 | 2006-07-06 | Alert Logic, Inc. | Threat scoring system and method for intrusion detection security networks |
US20060203736A1 (en) * | 2005-03-10 | 2006-09-14 | Stsn General Holdings Inc. | Real-time mobile user network operations center |
US7841006B2 (en) * | 2005-10-05 | 2010-11-23 | Computer Associates Think, Inc. | Discovery of kernel rootkits by detecting hidden information |
US7665136B1 (en) * | 2005-11-09 | 2010-02-16 | Symantec Corporation | Method and apparatus for detecting hidden network communication channels of rootkit tools |
US7934259B1 (en) * | 2005-11-29 | 2011-04-26 | Symantec Corporation | Stealth threat detection |
US20070174429A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US8522304B2 (en) * | 2006-09-08 | 2013-08-27 | Ibahn General Holdings Corporation | Monitoring and reporting policy compliance of home networks |
US8302196B2 (en) | 2007-03-20 | 2012-10-30 | Microsoft Corporation | Combining assessment models and client targeting to identify network security vulnerabilities |
US20100107257A1 (en) | 2008-10-29 | 2010-04-29 | International Business Machines Corporation | System, method and program product for detecting presence of malicious software running on a computer system |
-
2008
- 2008-10-29 US US12/261,026 patent/US20100107257A1/en not_active Abandoned
-
2009
- 2009-10-14 CN CN2009801386798A patent/CN102171987A/en active Pending
- 2009-10-14 CA CA2719495A patent/CA2719495C/en active Active
- 2009-10-14 WO PCT/EP2009/063396 patent/WO2010049273A2/en active Application Filing
- 2009-10-14 JP JP2011533666A patent/JP5490127B2/en active Active
- 2009-10-14 KR KR1020117009680A patent/KR20110076976A/en not_active Application Discontinuation
- 2009-10-14 EP EP09752766.7A patent/EP2294786B1/en active Active
-
2011
- 2011-12-09 US US13/315,895 patent/US8931096B2/en active Active
-
2014
- 2014-11-19 US US14/547,359 patent/US9251345B2/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6216173B1 (en) * | 1998-02-03 | 2001-04-10 | Redbox Technologies Limited | Method and apparatus for content processing and routing |
US20080178299A1 (en) * | 2001-05-09 | 2008-07-24 | Ecd Systems, Inc. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
US20040030912A1 (en) * | 2001-05-09 | 2004-02-12 | Merkle James A. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
US7685254B2 (en) * | 2003-06-10 | 2010-03-23 | Pandya Ashish A | Runtime adaptable search processor |
US20050086526A1 (en) * | 2003-10-17 | 2005-04-21 | Panda Software S.L. (Sociedad Unipersonal) | Computer implemented method providing software virus infection information in real time |
US20060156380A1 (en) * | 2005-01-07 | 2006-07-13 | Gladstone Philip J S | Methods and apparatus providing security to computer systems and networks |
US20060179483A1 (en) * | 2005-02-07 | 2006-08-10 | Rozas Guillermo J | Method and system for validating a computer system |
US20060224930A1 (en) * | 2005-03-31 | 2006-10-05 | Ibm Corporation | Systems and methods for event detection |
US20070022287A1 (en) * | 2005-07-15 | 2007-01-25 | Microsoft Corporation | Detecting user-mode rootkits |
US20070143848A1 (en) * | 2005-12-16 | 2007-06-21 | Kraemer Jeffrey A | Methods and apparatus providing computer and network security for polymorphic attacks |
US20070240212A1 (en) * | 2006-03-30 | 2007-10-11 | Check Point Software Technologies, Inc. | System and Methodology Protecting Against Key Logger Spyware |
US20070300061A1 (en) * | 2006-06-21 | 2007-12-27 | Eun Young Kim | System and method for detecting hidden process using system event information |
US7523502B1 (en) * | 2006-09-21 | 2009-04-21 | Symantec Corporation | Distributed anti-malware |
US20080148407A1 (en) * | 2006-12-18 | 2008-06-19 | Cat Computer Services Pvt Ltd | Virus Detection in Mobile Devices Having Insufficient Resources to Execute Virus Detection Software |
US20080320594A1 (en) * | 2007-03-19 | 2008-12-25 | Xuxian Jiang | Malware Detector |
US20090007269A1 (en) * | 2007-06-29 | 2009-01-01 | Network Security Technologies, Inc. | Using imported data from security tools |
Cited By (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070169192A1 (en) * | 2005-12-23 | 2007-07-19 | Reflex Security, Inc. | Detection of system compromise by per-process network modeling |
US8931096B2 (en) * | 2008-10-29 | 2015-01-06 | International Business Machines Corporation | Detecting malicious use of computer resources by tasks running on a computer system |
US20120084862A1 (en) * | 2008-10-29 | 2012-04-05 | International Business Machines Corporation | Detecting Malicious Use of Computer Resources by Tasks Running on a Computer System |
US20150074812A1 (en) * | 2008-10-29 | 2015-03-12 | International Business Machines Corporation | Detecting Malicious Use of Computer Resources by Tasks Running on a Computer System |
US9251345B2 (en) * | 2008-10-29 | 2016-02-02 | International Business Machines Corporation | Detecting malicious use of computer resources by tasks running on a computer system |
US8918876B2 (en) * | 2009-04-30 | 2014-12-23 | Telefonaktiebolaget L M Ericsson (Publ) | Deviating behaviour of a user terminal |
US20120060219A1 (en) * | 2009-04-30 | 2012-03-08 | Telefonaktiebolaget L.M Ericsson (Publ) | Deviating Behaviour of a User Terminal |
US20100333199A1 (en) * | 2009-06-25 | 2010-12-30 | Accenture Global Services Gmbh | Method and system for scanning a computer system for sensitive content |
US9721106B2 (en) * | 2009-06-25 | 2017-08-01 | Accenture Global Services Limited | Method and system for scanning a computer system for sensitive content |
US20150067843A1 (en) * | 2009-06-25 | 2015-03-05 | Accenture Global Services Limited | Method and System for Scanning a Computer System for Sensitive Content |
US8898774B2 (en) * | 2009-06-25 | 2014-11-25 | Accenture Global Services Limited | Method and system for scanning a computer system for sensitive content |
US9391858B2 (en) * | 2009-09-03 | 2016-07-12 | Mcafee, Inc. | Host information collection |
US20110055381A1 (en) * | 2009-09-03 | 2011-03-03 | Mcafee, Inc. | Host information collection |
US9521154B2 (en) | 2011-08-03 | 2016-12-13 | Hewlett Packard Enterprise Development Lp | Detecting suspicious network activity using flow sampling |
US20130160129A1 (en) * | 2011-12-19 | 2013-06-20 | Verizon Patent And Licensing Inc. | System security evaluation |
EP2624163A1 (en) * | 2012-01-31 | 2013-08-07 | Trusteer Ltd. | Method for detecting malware |
US9659173B2 (en) | 2012-01-31 | 2017-05-23 | International Business Machines Corporation | Method for detecting a malware |
US20130219493A1 (en) * | 2012-02-22 | 2013-08-22 | iScan Online, Inc. | Remote Security Self-Assessment Framework |
US9032520B2 (en) * | 2012-02-22 | 2015-05-12 | iScanOnline, Inc. | Remote security self-assessment framework |
US9189624B2 (en) | 2012-05-14 | 2015-11-17 | Qualcomm Incorporated | Adaptive observation of behavioral features on a heterogeneous platform |
US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
US9152787B2 (en) | 2012-05-14 | 2015-10-06 | Qualcomm Incorporated | Adaptive observation of behavioral features on a heterogeneous platform |
US9292685B2 (en) | 2012-05-14 | 2016-03-22 | Qualcomm Incorporated | Techniques for autonomic reverting to behavioral checkpoints |
US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
US9349001B2 (en) | 2012-05-14 | 2016-05-24 | Qualcomm Incorporated | Methods and systems for minimizing latency of behavioral analysis |
US9898602B2 (en) | 2012-05-14 | 2018-02-20 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9330257B2 (en) | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
WO2014111863A1 (en) * | 2013-01-16 | 2014-07-24 | Light Cyber Ltd. | Automated forensics of computer systems using behavioral intelligence |
US9979739B2 (en) | 2013-01-16 | 2018-05-22 | Palo Alto Networks (Israel Analytics) Ltd. | Automated forensics of computer systems using behavioral intelligence |
US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
US20140379714A1 (en) * | 2013-06-25 | 2014-12-25 | Compellent Technologies | Detecting hardware and software problems in remote systems |
US9817742B2 (en) * | 2013-06-25 | 2017-11-14 | Dell International L.L.C. | Detecting hardware and software problems in remote systems |
US10158660B1 (en) * | 2013-10-17 | 2018-12-18 | Tripwire, Inc. | Dynamic vulnerability correlation |
US11722514B1 (en) | 2013-10-17 | 2023-08-08 | Tripwire, Inc. | Dynamic vulnerability correlation |
US11128652B1 (en) | 2013-10-17 | 2021-09-21 | Tripwire, Inc. | Dynamic vulnerability correlation |
US20150277950A1 (en) * | 2014-03-28 | 2015-10-01 | International Business Machines Corporation | Detecting operation of a virtual machine |
US9384034B2 (en) * | 2014-03-28 | 2016-07-05 | International Business Machines Corporation | Detecting operation of a virtual machine |
US10075461B2 (en) | 2015-05-31 | 2018-09-11 | Palo Alto Networks (Israel Analytics) Ltd. | Detection of anomalous administrative actions |
US10686829B2 (en) | 2016-09-05 | 2020-06-16 | Palo Alto Networks (Israel Analytics) Ltd. | Identifying changes in use of user credentials |
US10999304B2 (en) | 2018-04-11 | 2021-05-04 | Palo Alto Networks (Israel Analytics) Ltd. | Bind shell attack detection |
US11233703B2 (en) * | 2018-11-20 | 2022-01-25 | Cisco Technology, Inc. | Extending encrypted traffic analytics with traffic flow data |
US11070569B2 (en) | 2019-01-30 | 2021-07-20 | Palo Alto Networks (Israel Analytics) Ltd. | Detecting outlier pairs of scanned ports |
US11184376B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Port scan detection using destination profiles |
US11184378B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Scanner probe detection |
US11184377B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using source profiles |
US11316872B2 (en) | 2019-01-30 | 2022-04-26 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using port profiles |
US11012492B1 (en) | 2019-12-26 | 2021-05-18 | Palo Alto Networks (Israel Analytics) Ltd. | Human activity detection in computing device transmissions |
US11509680B2 (en) | 2020-09-30 | 2022-11-22 | Palo Alto Networks (Israel Analytics) Ltd. | Classification of cyber-alerts into security incidents |
US12039017B2 (en) | 2021-10-20 | 2024-07-16 | Palo Alto Networks (Israel Analytics) Ltd. | User entity normalization and association |
US11799880B2 (en) | 2022-01-10 | 2023-10-24 | Palo Alto Networks (Israel Analytics) Ltd. | Network adaptive alert prioritization system |
Also Published As
Publication number | Publication date |
---|---|
US8931096B2 (en) | 2015-01-06 |
US20120084862A1 (en) | 2012-04-05 |
US9251345B2 (en) | 2016-02-02 |
KR20110076976A (en) | 2011-07-06 |
EP2294786B1 (en) | 2016-07-27 |
CA2719495C (en) | 2018-07-17 |
JP5490127B2 (en) | 2014-05-14 |
US20150074812A1 (en) | 2015-03-12 |
CA2719495A1 (en) | 2010-05-06 |
WO2010049273A2 (en) | 2010-05-06 |
EP2294786A2 (en) | 2011-03-16 |
WO2010049273A3 (en) | 2010-09-16 |
JP2012507094A (en) | 2012-03-22 |
CN102171987A (en) | 2011-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2719495C (en) | System, method and program product for detecting presence of malicious software running on a computer system | |
Milajerdi et al. | Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting | |
Zipperle et al. | Provenance-based intrusion detection systems: A survey | |
US20210064751A1 (en) | Provenance-based threat detection tools and stealthy malware detection | |
US8555385B1 (en) | Techniques for behavior based malware analysis | |
US8091127B2 (en) | Heuristic malware detection | |
US7475135B2 (en) | Systems and methods for event detection | |
US8621624B2 (en) | Apparatus and method for preventing anomaly of application program | |
Xie et al. | Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments | |
US8108931B1 (en) | Method and apparatus for identifying invariants to detect software tampering | |
US20100192222A1 (en) | Malware detection using multiple classifiers | |
RU2430411C1 (en) | System and method of detecting malware | |
CN107004088B (en) | Determining device, determining method and recording medium | |
US10097569B2 (en) | System and method for tracking malware route and behavior for defending against cyberattacks | |
US20210110037A1 (en) | Malware detection system | |
Seacord et al. | A structured approach to classifying security vulnerabilities | |
Thummapudi et al. | Detection of ransomware attacks using processor and disk usage data | |
Jang et al. | FunctionâOriented Mobile Malware Analysis as First Aid | |
US11233807B2 (en) | Effective detection of a communication apparatus performing an abnormal communication | |
DeMott et al. | Systematic bug finding and fault localization enhanced with input data tracking | |
Ravula et al. | Learning attack features from static and dynamic analysis of malware | |
Van Randwyk et al. | Farm: An automated malware analysis environment | |
RU2825975C1 (en) | Method of combining large language model and security agent | |
KR102176336B1 (en) | Security Vulnerability Diagnosis Error Classification Method and Its System | |
Alimardani et al. | A taxonomy on recent mobile malware: Features, analysis methods, and detection techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OLLMANN, GUNTER;REEL/FRAME:021759/0001 Effective date: 20081028 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: KYNDRYL, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:058213/0912 Effective date: 20211118 |