[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20100107257A1 - System, method and program product for detecting presence of malicious software running on a computer system - Google Patents

System, method and program product for detecting presence of malicious software running on a computer system Download PDF

Info

Publication number
US20100107257A1
US20100107257A1 US12/261,026 US26102608A US2010107257A1 US 20100107257 A1 US20100107257 A1 US 20100107257A1 US 26102608 A US26102608 A US 26102608A US 2010107257 A1 US2010107257 A1 US 2010107257A1
Authority
US
United States
Prior art keywords
computer system
tasks
remote
network services
host computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/261,026
Inventor
Gunter Ollmann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kyndryl Inc
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US12/261,026 priority Critical patent/US20100107257A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: OLLMANN, GUNTER
Priority to PCT/EP2009/063396 priority patent/WO2010049273A2/en
Priority to KR1020117009680A priority patent/KR20110076976A/en
Priority to CN2009801386798A priority patent/CN102171987A/en
Priority to EP09752766.7A priority patent/EP2294786B1/en
Priority to CA2719495A priority patent/CA2719495C/en
Priority to JP2011533666A priority patent/JP5490127B2/en
Publication of US20100107257A1 publication Critical patent/US20100107257A1/en
Priority to US13/315,895 priority patent/US8931096B2/en
Priority to US14/547,359 priority patent/US9251345B2/en
Assigned to KYNDRYL, INC. reassignment KYNDRYL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Definitions

  • the present invention relates to computer systems and software, and more specifically to a technique for detecting presence of malicious software, such as, a malicious service agent running on a computer system.
  • Various technologies have been proposed to detect “rootkits” and other stealth install techniques. These existing techniques require the querying of the host through local means in a powered and unpowered state. These existing techniques, in particular the process of assessing a host in an unpowered state is highly disruptive and time consuming. As such, there is a need for administrators to effectively identify the presence of such installations without powering down the host.
  • the present invention resides in a system, method and program product for detecting presence of malicious software and malware, using a program or tool, in accordance with an embodiment of the invention.
  • the method includes locally querying a computer system to enumerate a local inventory of tasks and network services currently running on the computer system in order to detect presence of a malicious service agent running on the computer system, wherein the local inventory of tasks and network services enumerated includes respective ports in use on the computer system and remotely querying via a network the computer system from a remote computer system to enumerate a remote inventory of tasks and network services currently running on the computer system in order to detect presence of the malicious service agent running on the computer system, wherein the remote inventory of tasks and network services enumerated includes respective ports in use on the computer system.
  • the method includes collecting each of the local inventory of tasks and network services enumerated and collecting each of the remote inventory of tasks and network services enumerated and comparing the local inventory of tasks and network services enumerated with the remote inventory of tasks and network services enumerated to identify any discrepancies between the local inventory of tasks and network services enumerated and the remote inventory of tasks and network services enumerated for detecting presence of the malicious service agent running on the computer system.
  • the locally querying step further includes providing a first tool for locally detecting presence of the malicious service agent running on the computer system and utilizing the first tool to conduct a local scan of the computer system to locally query the computer system.
  • the remotely querying step further includes providing a second tool for remotely detecting presence of the malicious service agent running on the computer system and utilizing the second tool to conduct a remote scan of the computer system to remotely query the computer system.
  • a port of the respective ports includes at least one of: an open port, a closed port and a filtered port.
  • the method further includes flagging the computer system having any discrepancies identified for conducting further tests to evaluate any discrepancies identified for determining presence of the malicious service agent running on the computer system.
  • FIG. 1 is a schematic block diagram illustrating one embodiment of a system for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
  • FIG. 2 depicts an embodiment of a computer system having deployed thereon a local scanning tool for performing a local scan of the computer system for detecting presence of malicious software and malware running on the computer system, in accordance with an embodiment of the present invention.
  • FIG. 3 depicts an embodiment of a computer system having deployed thereon a remote scanning tool for performing a remote scan of a remote computer system for detecting presence of malicious software and malware running on the remote computer system, in accordance with an embodiment of the present invention.
  • FIG. 4 depicts an embodiment of a computer system having deployed thereon a results correlation engine or program for performing analysis or evaluation of the local scanning results received and the remote scanning results received for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
  • FIG. 5 depicts a computer infrastructure for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
  • FIG. 6 depicts a flowchart outlining the steps performed by a host computer system for locally detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
  • FIG. 7 depicts a flowchart outlining the steps performed by a remote computer system for remotely detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
  • FIG. 8 depicts a flowchart outlining the overall steps performed by a results correlation computer system for detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
  • modules may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components.
  • a module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
  • Modules may also be implemented in software for execution by various types of processors.
  • An identified module or component of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
  • a module of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices.
  • operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, over disparate memory devices, and may exist, at least partially, merely as electronic signals on a system or network.
  • modules may also be implemented as a combination of software and one or more hardware devices.
  • a module may be embodied in the combination of a software executable code stored on a memory device.
  • a module may be the combination of a processor that operates on a set of operational data.
  • a module may be implemented in the combination of an electronic signal communicated via transmission circuitry.
  • the invention provides a system for detecting presence of malicious software and malware running on a computer system or host system, in accordance with an embodiment of the invention.
  • reference numeral 100 schematically illustrates an embodiment of a system for detecting presence of malicious software and malware, such as, a malicious service agent running on a computer system, in accordance with an embodiment of the invention.
  • the system infrastructure 100 includes a first host computer system 102 that is remotely connected to a network 120 .
  • the first host computer system 102 has a local interrogation agent program or local scanning agent or tool installed thereon for conducting a local query or interrogation of the first host computer system 102 .
  • the local interrogation agent or software is run on the first computer system 102 to determine local tasks and network services currently running on the first host computer system 102 .
  • the system infrastructure 100 includes a second host computer 104 that is also connected to the network 120 and is remote to the first host computer system 102 .
  • the second host computer 104 includes a network interrogation tool for conducting a remote query or interrogation of the first host computer system 102 for enumerating a remote inventory of tasks and network services currently running on the first host computer system 102 .
  • the system infrastructure 100 includes a third computer system 106 connected to the network 120 , the third computer system 106 having a results correlation engine deployed thereon for correlating results received from the first computer system 102 and the second computer system 104 .
  • the third computer system 106 collects results of the local query or interrogation conducted by the first host computer system 102 . Further, the third computer system 106 also collects results of the remote query or interrogation conducted by the second host computer system 104 on the first host computer system 102 .
  • the results correlation engine deployed on the third computer system 106 compares the local inventory of tasks and network services results enumerated by the first host computer system 102 with the remote inventory of tasks and network services results enumerated by the second host computer system 104 to identify any discrepancies between the local inventory results obtained from the first host computer system 102 and the remote inventory results obtained from the second host computer system 104 for detecting presence of any malicious software, such as, a malicious service agent running on the first host computer system 102 .
  • the third computer system 106 includes a reporting tool for generating a discrepancy report 108 that identifies any discrepancies between the local scan performed by the first host computer system 102 and the remote scan performed by the second host computer system 104 on the first host computer system 102 for detecting presence of any malicious software running on the first host computer system 102 .
  • FIG. 2 depicts an embodiment of a host computer system or server (for instance, the host computer system 102 shown in FIG. 1 ) having deployed thereon a computer program product, namely, a local scanning agent program or tool for conducting a local scan or interrogation of the host computer system suspected of having malicious software running thereon, in accordance with an embodiment of the present invention.
  • the local scanning tool or program 220 is run within the host computer system or server 200 .
  • the computer system 200 is a computer system or server that includes a central processing unit (CPU) 204 , a local storage device 202 , a user interface 206 , a network interface 208 , and a memory 210 .
  • CPU central processing unit
  • the CPU 204 is configured generally to execute operations within the host system/server 200 .
  • the user interface 206 in one embodiment, is configured to allow a user or operator to interact with the computer system or server 200 , including allowing input of commands and/or data for conducting a local scan of the computer system 200 .
  • the network interface 208 is configured, in one embodiment, to facilitate network communications of the host system or server 200 over a communications channel of a network, such as the network 120 , shown in FIG. 1 .
  • the memory 210 is configured to store one or more applications or programs 212 , such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown in FIG.
  • the local scanning agent program or tool 220 which runs on the host server or system 200 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a local scan of the host computer system 200 for enumerating a local inventory of tasks and network services running on the host computer system.
  • the local scanning tool or agent program 220 running on the host computer system 200 includes an initiation module 222 , a tasks module 224 , a network services module 226 , a list generation module 228 , a results log module 230 , a forwarding module 232 and a communication module 234 .
  • the initiation module 222 is configured to initiate a local scan of the host computer system 200 .
  • the tasks module 224 is configured to enumerate or list all the tasks running on the host computer system 200 .
  • the network services module 226 is configured to enumerate or list all the network services running on the host computer system 200 .
  • the list generation module 228 is configured to generate a list enumerating all of the tasks and network services running on the host computer system.
  • the results log module 230 is configured to generate a log of the results of the local scan conducted on the host computer system.
  • the local scan results log 214 generated by the results log module 230 are stored in a local storage 202 within the host computer system 200 .
  • the forwarding module 232 is configured to forward the results of the local scan performed on the host computer system 200 to another computer system comprising a results correlation engine (for instance, computer system 400 , shown in FIG. 4 ) for evaluating the local scan results received from the host computer system 200 .
  • the communication module 234 is configured to permit communication between the various modules of the local scanning tool 220 , memory 210 , local storage 202 and with external computer systems, such as, the computer system comprising the results correlation engine, which is connected to the host computer system over a network.
  • reference numeral 300 depicts an embodiment of a remote host computer system or server (for instance, the remote host computer system 104 shown in FIG. 1 ) having deployed thereon a computer program product, namely, a remote scanning agent program or tool for opening connections with the first host computer system and for conducting a remote scan or interrogation of the first host computer system suspected of having malicious software running thereon, in accordance with an embodiment of the present invention.
  • the remote scanning tool or program 320 is run within the second host computer system or server 300 .
  • the computer system 300 is a computer system or server that includes a central processing unit (CPU) 304 , a storage device 302 , a user interface 306 , a network interface 308 , and a memory 310 .
  • the CPU 304 is configured generally to execute operations within the host system/server 300 .
  • the user interface 306 in one embodiment, is configured to allow a user or operator to interact with the computer system or server 300 , including allowing input of commands and/or data for conducting a remote scan of a host computer system remote to the computer system 300 , such as, the computer system 200 , shown in FIG. 2 .
  • the network interface 308 is configured, in one embodiment, to facilitate network communications of the host system or server 300 over a communications channel of a network, such as the network 120 , shown in FIG. 1 .
  • the memory 310 is configured to store one or more applications or programs 312 , such as, word processing application(s), spreadsheet application(s), etc.
  • the local scanning agent program or tool 320 which runs on the host server or system 300 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a remote scan of the remote computer system 200 ( FIG. 2 ) for enumerating a remote inventory of tasks and network services running on the remote host computer system 200 .
  • FIG. 2 shows a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a remote scan of the remote computer system 200 ( FIG. 2 ) for enumerating a remote inventory of tasks and network services running on the remote host computer system 200 .
  • the remote scanning tool or agent program 320 running on the host computer system 300 includes an initiation module 322 , a tasks module 324 , a network services module 326 , a list generation module 328 , a results log module 330 , a forwarding module 332 and a communication module 334 .
  • the initiation module 322 is configured to initiate a remote scan of all ports of the remote host computer system 200 over a network.
  • the tasks module 324 is configured to enumerate or list all the tasks running on the remote host computer system 200 .
  • the network services module 326 is configured to enumerate or list all the network services running on the remote host computer system 200 .
  • the list generation module 328 is configured to generate a list enumerating all of the tasks and network services running on the remote host computer system 200 .
  • the results log module 330 is configured to generate a log of the results of the remote scan conducted on the remote host computer system 200 .
  • the remote scan results log 314 generated by the results log module 330 are stored in a local storage 302 within the host computer system 300 .
  • the forwarding module 332 is configured to forward the results of the remote scan performed on the remote host computer system 200 to another computer system comprising a results correlation engine (for instance, computer system 400 , shown in FIG. 4 ) for evaluating the remote scan results received from the host computer system 300 .
  • a results correlation engine for instance, computer system 400 , shown in FIG. 4
  • the communication module 334 is configured to permit communication between the various modules of the remote scanning tool 320 , memory 310 , local storage 302 and with external computer systems, such as, the computer system 400 (shown in FIG. 4 ) comprising the results correlation engine, which is connected to the host computer system 300 over a network.
  • reference numeral 400 depicts an embodiment of a computer system or server (for instance, the computer system 106 shown in FIG. 1 ) having deployed thereon a computer program product, namely, a results correlation program or tool or engine 420 for correlating local scan results received from a first host computer system or server and remote scan results of the first host computer system received from a second host computer system or server for detecting presence of any malicious software running on the first computer system, in accordance with an embodiment of the present invention.
  • the computer system 400 is a computer system or server that includes a central processing unit (CPU) 404 , a storage device 402 , a user interface 406 , a network interface 408 , and a memory 410 .
  • CPU central processing unit
  • the CPU 404 is configured generally to execute operations within the host system/server 400 .
  • the user interface 406 in one embodiment, is configured to allow a user or operator to interact with the computer system or server 400 , including allowing input of commands and/or data for collecting scan results from one or more computer systems or servers, such as, computer system 200 ( FIG. 2 ) and/or computer system 300 ( FIG. 3 ).
  • the network interface 408 is configured, in one embodiment, to facilitate network communications of the computer system or server 400 over a communications channel of a network, such as the network 120 , shown in FIG. 1 .
  • the memory 410 is configured to store one or more applications or programs 412 , such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown in FIG.
  • the results correlation program or tool 420 which runs on the computer server or system 400 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing an evaluation of the scanning results received from both the local host computer system 200 ( FIG. 2 ) and the remote host computer system 300 ( FIG. 3 ) for detecting presence of any malicious software or malware running on the host computer system 200 .
  • the results correlation program or tool 420 running on the computer system or server 400 includes a receiving module 422 , a comparison module 424 , an evaluation module 426 , a flag module 428 , a report generation module 430 , and a communication module 432 .
  • the receiving module 422 is configured to receive both local scan results from a host computer server or system that is suspected of having malicious software or malware running thereon and remote scan results from a remote computer system or server that conducts a remote scan of the host computer system or server over a network.
  • the comparison module 424 is configured to compare the list of all the tasks enumerated to be running on the host computer system 200 as a result of the local scan performed with the list of all the remote tasks enumerated to be running on the host computer system 200 as a result of the remote scan performed on the host computer system 200 .
  • the comparison module 424 compares the service listings obtained from the local port by the local computer system versus the service listings obtained remotely from the same port by the remote computer system.
  • the evaluation module 426 is configured to evaluate the comparisons conducted by the comparison module 424 in order to generate correlation results stored in the correlation results log 414 in local storage 402 as to whether or not there are any discrepancies found between the local scanning results and the remote scanning results.
  • the flag module 428 is configured to flag the computer system suspected of having malicious software or malware running thereon as a result of the evaluation conducted by the evaluation module 426 .
  • the report generation module 430 is configured to generate a discrepancy report enumerating the discrepancies found between the local scan and the remote scan evaluated by the computer system 400 .
  • the communication module 432 is configured to permit communication between the various modules of the results correlation tool 420 , memory 410 , local storage 402 and with external computer systems, such as, the computer system 200 (shown in FIG. 2 ) and the computer system 300 ( FIG. 3 ), which are connected to the computer system 400 over a network.
  • FIG. 5 there is illustrated a system 500 within an infrastructure 502 that includes a server or computer system 504 that has deployed thereon a computer program product, namely, the local scanning agent program or tool 514 , which implements the invention for dynamically performing a local scan of the computer system 504 , in accordance with an embodiment of the present invention.
  • the computer program product comprises a computer readable or computer-usable storage medium, which provides program code namely, the local scanning agent program or tool 514 , for use by or in connection with a computer server or computer system or any instruction execution system.
  • the local scanning program or tool 514 can be loaded into memory 514 of the host computer system 504 from a computer readable storage medium or media reference numeral 516 , such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 518 ) installed on the respective systems or servers.
  • system 500 includes a computer infrastructure 502 , which is intended to represent any type of computer architecture that is maintained in a secure environment (i.e., for which access control is enforced).
  • infrastructure 502 includes a computer server or system 504 that typically represents an application server or system 504 or the like that includes a local scanning agent program or tool 514 .
  • other hardware and software components e.g., additional computer systems, routers, firewalls, etc. could be included in infrastructure 502 .
  • the host system 504 is connected via a network to infrastructure 502 .
  • the host system 504 includes the local scanning tool or agent program 514 that is run on the host system 504 for performing a local scan of the tasks and network services currently running on the host computer system 504 .
  • the host system 504 (computer system 102 in FIG. 1 ) can communicate with computer server or system 530 (computer system 104 in FIG. 1 ) and/or computer server or system 540 (computer system 106 in FIG. 1 ) over a network (reference numeral 120 in FIG. 1 ), as discussed herein above with respect to FIG. 1 .
  • the computer system or server 530 can interface with infrastructure 502 in order to run a remote scan of the computer system or server 504 using a remote scanning program or tool 534 that is loaded into the local memory 533 of the host computer system 530 from a computer readable storage medium or media reference numeral 532 , such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 554 ) installed on the respective system or server 530 .
  • the computer system or server 540 can interface with infrastructure 502 in order to receive results of the local scan performed by system or server 504 and can receives results of the remote scan of the computer system or server 504 performed by the server 530 .
  • a results correlation too or program is loaded into the local memory 543 of the host computer system 540 from a computer readable storage medium or media reference numeral 542 , such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 556 ) installed on the respective system or server 540 .
  • the computer system or server 540 receive results of the local scan conducted by the computer system 504 and the results of the remote scan conducted by the computer system 530 of computer system 504 and can compare the local scan results with the remote scan results to determine whether or not the host system 504 may be running a malicious software or malware.
  • infrastructure 502 could be owned and/or operated by a party such as provider 526 , or by an independent entity. Regardless, use of infrastructure 502 and the teachings described herein could be offered to the parties on a subscription or fee-basis.
  • the host computer system or server 504 is shown to include a CPU (hereinafter “processing unit 506”), a memory 512 , a bus 510 , and input/output (I/O) interfaces 508 . Further, the server 504 is shown in communication with external I/O devices/resources 520 and storage system 522 .
  • processing unit 506 executes computer program code stored in memory 512 , such as the local scanning agent program or tool 514 to determine the tasks and services currently running on the computer system 504 .
  • the local scanning results 524 produced by the execution of the local scanning agent program or tool 514 is stored in storage 522 .
  • the computer systems or servers 530 and 540 each include a CPU, a memory, a bus, and input/output (I/O) interfaces, similar to computer system 504 .
  • the server 530 is in communication with external I/O devices/resources (not shown) and storage system 536
  • computer system or server 540 is in communication with I/O devices or resources (not shown) and storage system 546 .
  • processing unit 506 executes computer program code stored in memory 512 , such as the local scanning agent program or tool 514 to determine the tasks and services currently running on the computer system 504
  • processing unit of computer system 530 executes computer program code stored in memory 533 , such as, the remote scanning agent program 534 to determine tasks and services running on the computer system 504
  • processing unit of computer system 540 executes computer program code stored in memory 543 , such as, the results correlation tool or program 544 to determine any discrepancies between the local scan and the remote scan of the computer system 504 .
  • the local scanning results 524 produced by the execution of the local scanning agent program or tool 514 running on computer system 504 is stored in storage 522
  • the remote scanning results 538 produced by the execution of the remote scanning agent 534 is stored in storage 536 of computer system 530
  • the correlation results 548 performed by the execution of the results correlation tool 544 on computer system 540 is stored in storage 546 of computer system 540 .
  • the processing unit 506 can read and/or write data, to/from memory 512 , storage system 522 , and/or I/O interfaces 508 , such as, the local scanning results 524 stored in storage 522 .
  • the local scanning tool 514 may store the local scanning results 524 in memory 512 .
  • Bus 510 provides a communication link between each of the components in computer system 500 , such that information can be communicated within the infrastructure 502 .
  • External devices 524 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact with computer system 500 and/or any devices (e.g., network card, modem, etc.) that enable host system 504 to communicate with one or more other computing devices, such as, servers 530 and/or 540 .
  • the processing unit can read and/or write data, to/from memory 533 , storage system 536 , such as, the local scanning results 538 stored in storage 536 .
  • the remote scanning tool 534 may store the remote scanning results 538 in memory 533 .
  • the processing unit can read and/or write data, to/from memory 543 , storage system 546 , such as, the correlation results 548 stored in storage 546 .
  • the results correlation tool 544 may store the correlation results 548 in memory 543
  • Computer infrastructure 502 is only illustrative of various types of computer infrastructures for implementing the invention.
  • computer infrastructure 502 may comprise two or more server groups or clusters that communicate over a network to perform the various process steps of the invention.
  • computer system 500 is only representative of various possible computer systems that can include numerous combinations of hardware.
  • computer system 500 can comprise any specific purpose computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general purpose hardware/software, or the like.
  • the program code and hardware can be created using standard programming and engineering techniques, respectively.
  • processing unit 506 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server.
  • memory 512 and/or storage system 522 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations.
  • I/O interfaces 508 can comprise any system for exchanging information with one or more external devices 520 .
  • one or more additional components e.g., system software, math co-processing unit, etc.
  • Storage systems 522 , 536 and 546 can be any type of system (e.g., a database) capable of providing storage for information under the present invention.
  • storage systems 522 , 536 and 546 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive.
  • systems 522 , 536 and 546 include data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown).
  • LAN local area network
  • WAN wide area network
  • SAN storage area network
  • additional components such as cache memory, communication systems, system software, etc., may be incorporated into computer system 500 .
  • the invention provides a method or process for detecting the presence of malicious software and malware running on a computer system or host computer system, in accordance with an embodiment of the invention.
  • FIG. 6 reference numeral 600 , which outlines the steps performed by a host computer system suspected of having unwanted malware or malicious software running thereon, in accordance with an embodiment of the invention.
  • a local scanning software tool or agent program is run locally on the “suspicious” host computer system suspected of having a malicious software or malware running thereon in order to obtain a list of currently running or active network services.
  • step 604 the local scanning tool or agent program running locally on the host computer system enumerates and lists currently running or active services and their respective ports in use in the host computer system.
  • the local scan results listing or enumerating the active services and their respective ports in use in the host computer system is sent (in step 606 ) to another computer system on the network, namely, a results correlation computer system running a results correlation engine for comparison and evaluation of the scanning results, as discussed herein below with respect to FIG. 8 .
  • FIG. 7 reference numeral 700 , which outlines the steps performed by a remote computer system that is a computer system remote to the host computer system for detecting presence of unwanted malware or malicious software running on the host computer system, in accordance with an embodiment of the invention.
  • a remote scanning tool or agent program is run on the remote computer system in step 702 for remotely connecting to the host computer system over a network and to obtain a list of open network ports on the host computer system.
  • the remote scanning tool or agent program remotely connects to the host computer system to enumerate and list currently running or active network services and their respective ports in use in the host computer system.
  • the remote scanning computer system attempts to connect to each open port on the host computer system and performs an interrogation of the services running to determine whether or not the service is a known or common service. As such, a list of open, closed and filtered ports is obtained by the remote computer system. Further, the remote scan results listing or enumerating the network ports and services visible over the network are sent in step 706 to the results correlation computer system running a results correlation engine for comparison and evaluation of the scanning results, as discussed herein below with respect to FIG. 8 .
  • step 802 the results correlation computer system receives the local scanning results from the host computer system and, in step 804 , the results correlation computer system receives the remote scanning results from the remote computer system.
  • the results correlation computer system running a results correlation engine compares in step 806 the local list (corresponding to the local scan) and the remote list (corresponding to the remote scan) of network services running on the host computer system for any discrepancies. Any discrepancies found represent hidden services and are indicative of unwanted software or malware.
  • step 810 the results correlation engine determines whether or not there is a discrepancy between the local list and the remote list. If the results correlation engine determines in step 810 that there is no discrepancy between the local list and the remote list of network services running on the host computer system, that is, there are no suspicious network discrepancies found, then the process ends in step 812 . However, if the results correlation engine determines in step 810 that there are one or more discrepancies found between the local list and the remote list of network services running on the host computer system, that is, there are suspicious network discrepancies that are found that are to be likely associated with unwanted or malicious software running on the host computer system, then the results correlation engine documents and logs the discrepancies in step 814 .
  • the results correlation engine flags or identifies the “suspicious” host computer system as possibly infected. Additionally, in step 818 , further tests are run on the flagged host computer system and the flagged host computer system is monitored to evaluate the nature of the discrepancy found and the malicious or unwanted software currently installed on the host computer system, ending the process.
  • the host computer system has deployed thereon one or more test programs for testing and/or evaluating any discrepancies found by the results correlation engine. It will be understood by one skilled in the art that the testing and evaluation of the host computer system can be manually implemented, as necessary, by an administrator.
  • the invention provides a system, method and a program product for detecting the presence of malicious software and malware running on a computer system or host computer system, in accordance with an embodiment of the invention.
  • the invention requires the ability to interrogate the host computer system both locally and remotely. Local interrogation could be conducted through a locally installed agent (user or administrator-level access), or through standard network service interrogation techniques that typically require administrative-level access. Remote service interrogation of the host computer system can be conducted with standard port scanning and vulnerability scanning technologies.
  • the device labeled “suspicious host” may or may not originally be “suspicious” and the interrogation of the host may be a routine/scheduled event for preemptive detection of malicious activities and installation of unwanted services.
  • Local host enumeration of network services could be achieved through the use of default operating system query tools, or custom tools.
  • the network interrogator may use standard remote port scanning techniques to identify open ports and enumerate the services behind them.
  • the results correlation engine could be a stand-alone device, part of the network interrogator toolset, or part of an additional software suite whose purpose is to act upon any discrepancies identified between the “local scanning results” and the “remote network scanning results”

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A system, method and program product for detecting presence of malicious software running on a computer system. The method includes locally querying the system to enumerate a local inventory of tasks and network services running on the system for detecting presence of malicious software running on the system and remotely querying the system from a remote system via a network to enumerate a remote inventory of tasks and network services running on the system for detecting presence of malicious software running on the system, where the local inventory enumerates ports in use on the system and where the remote inventory enumerates ports in use on the system. Further, the method includes collecting the local inventory and the remote inventory and comparing the local inventory with the remote inventory to identify any discrepancies between the local and the remote inventories for detecting presence of malicious software running on the system.

Description

    FIELD OF THE INVENTION
  • The present invention relates to computer systems and software, and more specifically to a technique for detecting presence of malicious software, such as, a malicious service agent running on a computer system.
  • BACKGROUND OF THE INVENTION
  • Unwanted software and malware frequently use complex techniques to hide their installation from users of the host. Various technologies have been proposed to detect “rootkits” and other stealth install techniques. These existing techniques require the querying of the host through local means in a powered and unpowered state. These existing techniques, in particular the process of assessing a host in an unpowered state is highly disruptive and time consuming. As such, there is a need for administrators to effectively identify the presence of such installations without powering down the host.
  • SUMMARY OF THE INVENTION
  • The present invention resides in a system, method and program product for detecting presence of malicious software and malware, using a program or tool, in accordance with an embodiment of the invention. The method includes locally querying a computer system to enumerate a local inventory of tasks and network services currently running on the computer system in order to detect presence of a malicious service agent running on the computer system, wherein the local inventory of tasks and network services enumerated includes respective ports in use on the computer system and remotely querying via a network the computer system from a remote computer system to enumerate a remote inventory of tasks and network services currently running on the computer system in order to detect presence of the malicious service agent running on the computer system, wherein the remote inventory of tasks and network services enumerated includes respective ports in use on the computer system. Further, the method includes collecting each of the local inventory of tasks and network services enumerated and collecting each of the remote inventory of tasks and network services enumerated and comparing the local inventory of tasks and network services enumerated with the remote inventory of tasks and network services enumerated to identify any discrepancies between the local inventory of tasks and network services enumerated and the remote inventory of tasks and network services enumerated for detecting presence of the malicious service agent running on the computer system. In an embodiment, the locally querying step further includes providing a first tool for locally detecting presence of the malicious service agent running on the computer system and utilizing the first tool to conduct a local scan of the computer system to locally query the computer system. In an embodiment, the remotely querying step further includes providing a second tool for remotely detecting presence of the malicious service agent running on the computer system and utilizing the second tool to conduct a remote scan of the computer system to remotely query the computer system. In an embodiment, a port of the respective ports includes at least one of: an open port, a closed port and a filtered port. In an embodiment, the method further includes flagging the computer system having any discrepancies identified for conducting further tests to evaluate any discrepancies identified for determining presence of the malicious service agent running on the computer system.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention:
  • FIG. 1 is a schematic block diagram illustrating one embodiment of a system for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
  • FIG. 2 depicts an embodiment of a computer system having deployed thereon a local scanning tool for performing a local scan of the computer system for detecting presence of malicious software and malware running on the computer system, in accordance with an embodiment of the present invention.
  • FIG. 3 depicts an embodiment of a computer system having deployed thereon a remote scanning tool for performing a remote scan of a remote computer system for detecting presence of malicious software and malware running on the remote computer system, in accordance with an embodiment of the present invention.
  • FIG. 4 depicts an embodiment of a computer system having deployed thereon a results correlation engine or program for performing analysis or evaluation of the local scanning results received and the remote scanning results received for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
  • FIG. 5 depicts a computer infrastructure for detecting presence of malicious software and malware running on a computer system, in accordance with an embodiment of the present invention.
  • FIG. 6 depicts a flowchart outlining the steps performed by a host computer system for locally detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
  • FIG. 7 depicts a flowchart outlining the steps performed by a remote computer system for remotely detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
  • FIG. 8 depicts a flowchart outlining the overall steps performed by a results correlation computer system for detecting presence of malicious software and malware running on the host computer system, in accordance with an embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Many of the functional units described in this specification have been labeled as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
  • Modules may also be implemented in software for execution by various types of processors. An identified module or component of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
  • Further, a module of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, over disparate memory devices, and may exist, at least partially, merely as electronic signals on a system or network.
  • Furthermore, modules may also be implemented as a combination of software and one or more hardware devices. For instance, a module may be embodied in the combination of a software executable code stored on a memory device. In a further example, a module may be the combination of a processor that operates on a set of operational data. Still further, a module may be implemented in the combination of an electronic signal communicated via transmission circuitry.
  • Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
  • Moreover, the described features, structures, or characteristics of the invention may be combined in any suitable manner in one or more embodiments. It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit and scope of the invention. Thus, it is intended that the present invention cover the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. Reference will now be made in detail to the preferred embodiments of the invention.
  • In one embodiment, the invention provides a system for detecting presence of malicious software and malware running on a computer system or host system, in accordance with an embodiment of the invention. Reference is now made to FIG. 1, reference numeral 100, which schematically illustrates an embodiment of a system for detecting presence of malicious software and malware, such as, a malicious service agent running on a computer system, in accordance with an embodiment of the invention. As shown in FIG. 1, the system infrastructure 100 includes a first host computer system 102 that is remotely connected to a network 120. In an embodiment, the first host computer system 102 has a local interrogation agent program or local scanning agent or tool installed thereon for conducting a local query or interrogation of the first host computer system 102. The local interrogation agent or software is run on the first computer system 102 to determine local tasks and network services currently running on the first host computer system 102. Further, the system infrastructure 100 includes a second host computer 104 that is also connected to the network 120 and is remote to the first host computer system 102. In an embodiment, the second host computer 104 includes a network interrogation tool for conducting a remote query or interrogation of the first host computer system 102 for enumerating a remote inventory of tasks and network services currently running on the first host computer system 102. Further, the system infrastructure 100 includes a third computer system 106 connected to the network 120, the third computer system 106 having a results correlation engine deployed thereon for correlating results received from the first computer system 102 and the second computer system 104. In an embodiment, the third computer system 106 collects results of the local query or interrogation conducted by the first host computer system 102. Further, the third computer system 106 also collects results of the remote query or interrogation conducted by the second host computer system 104 on the first host computer system 102. Furthermore, the results correlation engine deployed on the third computer system 106 compares the local inventory of tasks and network services results enumerated by the first host computer system 102 with the remote inventory of tasks and network services results enumerated by the second host computer system 104 to identify any discrepancies between the local inventory results obtained from the first host computer system 102 and the remote inventory results obtained from the second host computer system 104 for detecting presence of any malicious software, such as, a malicious service agent running on the first host computer system 102. Further, in an embodiment, the third computer system 106 includes a reporting tool for generating a discrepancy report 108 that identifies any discrepancies between the local scan performed by the first host computer system 102 and the remote scan performed by the second host computer system 104 on the first host computer system 102 for detecting presence of any malicious software running on the first host computer system 102.
  • Reference is now made to FIG. 2, reference numeral 200, which depicts an embodiment of a host computer system or server (for instance, the host computer system 102 shown in FIG. 1) having deployed thereon a computer program product, namely, a local scanning agent program or tool for conducting a local scan or interrogation of the host computer system suspected of having malicious software running thereon, in accordance with an embodiment of the present invention. In an embodiment, the local scanning tool or program 220 is run within the host computer system or server 200. Preferably, the computer system 200 is a computer system or server that includes a central processing unit (CPU) 204, a local storage device 202, a user interface 206, a network interface 208, and a memory 210. The CPU 204 is configured generally to execute operations within the host system/server 200. The user interface 206, in one embodiment, is configured to allow a user or operator to interact with the computer system or server 200, including allowing input of commands and/or data for conducting a local scan of the computer system 200. The network interface 208 is configured, in one embodiment, to facilitate network communications of the host system or server 200 over a communications channel of a network, such as the network 120, shown in FIG. 1. In an embodiment, the memory 210 is configured to store one or more applications or programs 212, such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown in FIG. 2, the local scanning agent program or tool 220 which runs on the host server or system 200 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a local scan of the host computer system 200 for enumerating a local inventory of tasks and network services running on the host computer system. In an embodiment, shown in FIG. 2, the local scanning tool or agent program 220 running on the host computer system 200 includes an initiation module 222, a tasks module 224, a network services module 226, a list generation module 228, a results log module 230, a forwarding module 232 and a communication module 234. In an embodiment, the initiation module 222 is configured to initiate a local scan of the host computer system 200. The tasks module 224 is configured to enumerate or list all the tasks running on the host computer system 200. Further, the network services module 226 is configured to enumerate or list all the network services running on the host computer system 200. In an embodiment, the list generation module 228 is configured to generate a list enumerating all of the tasks and network services running on the host computer system. The results log module 230 is configured to generate a log of the results of the local scan conducted on the host computer system. In an embodiment, the local scan results log 214 generated by the results log module 230 are stored in a local storage 202 within the host computer system 200. The forwarding module 232 is configured to forward the results of the local scan performed on the host computer system 200 to another computer system comprising a results correlation engine (for instance, computer system 400, shown in FIG. 4) for evaluating the local scan results received from the host computer system 200. The communication module 234 is configured to permit communication between the various modules of the local scanning tool 220, memory 210, local storage 202 and with external computer systems, such as, the computer system comprising the results correlation engine, which is connected to the host computer system over a network.
  • Reference is now made to FIG. 3, reference numeral 300, which depicts an embodiment of a remote host computer system or server (for instance, the remote host computer system 104 shown in FIG. 1) having deployed thereon a computer program product, namely, a remote scanning agent program or tool for opening connections with the first host computer system and for conducting a remote scan or interrogation of the first host computer system suspected of having malicious software running thereon, in accordance with an embodiment of the present invention. In an embodiment, the remote scanning tool or program 320 is run within the second host computer system or server 300. Preferably, the computer system 300 is a computer system or server that includes a central processing unit (CPU) 304, a storage device 302, a user interface 306, a network interface 308, and a memory 310. The CPU 304 is configured generally to execute operations within the host system/server 300. The user interface 306, in one embodiment, is configured to allow a user or operator to interact with the computer system or server 300, including allowing input of commands and/or data for conducting a remote scan of a host computer system remote to the computer system 300, such as, the computer system 200, shown in FIG. 2. The network interface 308 is configured, in one embodiment, to facilitate network communications of the host system or server 300 over a communications channel of a network, such as the network 120, shown in FIG. 1. In an embodiment, the memory 310 is configured to store one or more applications or programs 312, such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown in FIG. 3, the local scanning agent program or tool 320 which runs on the host server or system 300 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing a remote scan of the remote computer system 200 (FIG. 2) for enumerating a remote inventory of tasks and network services running on the remote host computer system 200. In an embodiment, shown in FIG. 3, the remote scanning tool or agent program 320 running on the host computer system 300 includes an initiation module 322, a tasks module 324, a network services module 326, a list generation module 328, a results log module 330, a forwarding module 332 and a communication module 334. In an embodiment, the initiation module 322 is configured to initiate a remote scan of all ports of the remote host computer system 200 over a network. The tasks module 324 is configured to enumerate or list all the tasks running on the remote host computer system 200. Further, the network services module 326 is configured to enumerate or list all the network services running on the remote host computer system 200. In an embodiment, the list generation module 328 is configured to generate a list enumerating all of the tasks and network services running on the remote host computer system 200. The results log module 330 is configured to generate a log of the results of the remote scan conducted on the remote host computer system 200. In an embodiment, the remote scan results log 314 generated by the results log module 330 are stored in a local storage 302 within the host computer system 300. The forwarding module 332 is configured to forward the results of the remote scan performed on the remote host computer system 200 to another computer system comprising a results correlation engine (for instance, computer system 400, shown in FIG. 4) for evaluating the remote scan results received from the host computer system 300. The communication module 334 is configured to permit communication between the various modules of the remote scanning tool 320, memory 310, local storage 302 and with external computer systems, such as, the computer system 400 (shown in FIG. 4) comprising the results correlation engine, which is connected to the host computer system 300 over a network.
  • Reference is now made to FIG. 4, reference numeral 400, which depicts an embodiment of a computer system or server (for instance, the computer system 106 shown in FIG. 1) having deployed thereon a computer program product, namely, a results correlation program or tool or engine 420 for correlating local scan results received from a first host computer system or server and remote scan results of the first host computer system received from a second host computer system or server for detecting presence of any malicious software running on the first computer system, in accordance with an embodiment of the present invention. Preferably, the computer system 400 is a computer system or server that includes a central processing unit (CPU) 404, a storage device 402, a user interface 406, a network interface 408, and a memory 410. The CPU 404 is configured generally to execute operations within the host system/server 400. The user interface 406, in one embodiment, is configured to allow a user or operator to interact with the computer system or server 400, including allowing input of commands and/or data for collecting scan results from one or more computer systems or servers, such as, computer system 200 (FIG. 2) and/or computer system 300 (FIG. 3). The network interface 408 is configured, in one embodiment, to facilitate network communications of the computer system or server 400 over a communications channel of a network, such as the network 120, shown in FIG. 1. In an embodiment, the memory 410 is configured to store one or more applications or programs 412, such as, word processing application(s), spreadsheet application(s), etc. In one embodiment, as shown in FIG. 4, the results correlation program or tool 420 which runs on the computer server or system 400 comprises a logic unit that contains a plurality of modules configured to functionally execute the necessary steps of performing an evaluation of the scanning results received from both the local host computer system 200 (FIG. 2) and the remote host computer system 300 (FIG. 3) for detecting presence of any malicious software or malware running on the host computer system 200. In an embodiment, shown in FIG. 4, the results correlation program or tool 420 running on the computer system or server 400 includes a receiving module 422, a comparison module 424, an evaluation module 426, a flag module 428, a report generation module 430, and a communication module 432. In an embodiment, the receiving module 422 is configured to receive both local scan results from a host computer server or system that is suspected of having malicious software or malware running thereon and remote scan results from a remote computer system or server that conducts a remote scan of the host computer system or server over a network. The comparison module 424 is configured to compare the list of all the tasks enumerated to be running on the host computer system 200 as a result of the local scan performed with the list of all the remote tasks enumerated to be running on the host computer system 200 as a result of the remote scan performed on the host computer system 200. In an embodiment, the comparison module 424 compares the service listings obtained from the local port by the local computer system versus the service listings obtained remotely from the same port by the remote computer system. Further, the evaluation module 426 is configured to evaluate the comparisons conducted by the comparison module 424 in order to generate correlation results stored in the correlation results log 414 in local storage 402 as to whether or not there are any discrepancies found between the local scanning results and the remote scanning results. The flag module 428 is configured to flag the computer system suspected of having malicious software or malware running thereon as a result of the evaluation conducted by the evaluation module 426. The report generation module 430 is configured to generate a discrepancy report enumerating the discrepancies found between the local scan and the remote scan evaluated by the computer system 400. In an embodiment, the communication module 432 is configured to permit communication between the various modules of the results correlation tool 420, memory 410, local storage 402 and with external computer systems, such as, the computer system 200 (shown in FIG. 2) and the computer system 300 (FIG. 3), which are connected to the computer system 400 over a network.
  • Referring now to FIG. 5, there is illustrated a system 500 within an infrastructure 502 that includes a server or computer system 504 that has deployed thereon a computer program product, namely, the local scanning agent program or tool 514, which implements the invention for dynamically performing a local scan of the computer system 504, in accordance with an embodiment of the present invention. The computer program product comprises a computer readable or computer-usable storage medium, which provides program code namely, the local scanning agent program or tool 514, for use by or in connection with a computer server or computer system or any instruction execution system. The local scanning program or tool 514 can be loaded into memory 514 of the host computer system 504 from a computer readable storage medium or media reference numeral 516, such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 518) installed on the respective systems or servers. As depicted in FIG. 5, system 500 includes a computer infrastructure 502, which is intended to represent any type of computer architecture that is maintained in a secure environment (i.e., for which access control is enforced). Further, as shown, infrastructure 502 includes a computer server or system 504 that typically represents an application server or system 504 or the like that includes a local scanning agent program or tool 514. It should be understood, however, that although not shown, other hardware and software components (e.g., additional computer systems, routers, firewalls, etc.) could be included in infrastructure 502.
  • In general, the host system 504 is connected via a network to infrastructure 502. The host system 504 includes the local scanning tool or agent program 514 that is run on the host system 504 for performing a local scan of the tasks and network services currently running on the host computer system 504. Further, as shown in FIG. 5, the host system 504 (computer system 102 in FIG. 1) can communicate with computer server or system 530 (computer system 104 in FIG. 1) and/or computer server or system 540 (computer system 106 in FIG. 1) over a network (reference numeral 120 in FIG. 1), as discussed herein above with respect to FIG. 1. For instance, the computer system or server 530 can interface with infrastructure 502 in order to run a remote scan of the computer system or server 504 using a remote scanning program or tool 534 that is loaded into the local memory 533 of the host computer system 530 from a computer readable storage medium or media reference numeral 532, such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 554) installed on the respective system or server 530. Similarly, the computer system or server 540 can interface with infrastructure 502 in order to receive results of the local scan performed by system or server 504 and can receives results of the remote scan of the computer system or server 504 performed by the server 530. In an embodiment, a results correlation too or program is loaded into the local memory 543 of the host computer system 540 from a computer readable storage medium or media reference numeral 542, such as, a magnetic tape or disk, optical media, DVD, memory stick, semiconductor memory, etc. or downloaded from the server via a network adapter card (reference numerals 556) installed on the respective system or server 540. As such, the computer system or server 540 receive results of the local scan conducted by the computer system 504 and the results of the remote scan conducted by the computer system 530 of computer system 504 and can compare the local scan results with the remote scan results to determine whether or not the host system 504 may be running a malicious software or malware. It should be understood that under the present invention, infrastructure 502 could be owned and/or operated by a party such as provider 526, or by an independent entity. Regardless, use of infrastructure 502 and the teachings described herein could be offered to the parties on a subscription or fee-basis.
  • The host computer system or server 504 is shown to include a CPU (hereinafter “processing unit 506”), a memory 512, a bus 510, and input/output (I/O) interfaces 508. Further, the server 504 is shown in communication with external I/O devices/resources 520 and storage system 522. In general, processing unit 506 executes computer program code stored in memory 512, such as the local scanning agent program or tool 514 to determine the tasks and services currently running on the computer system 504. In an embodiment, the local scanning results 524 produced by the execution of the local scanning agent program or tool 514 is stored in storage 522. Although not shown in FIG. 5, the computer systems or servers 530 and 540 each include a CPU, a memory, a bus, and input/output (I/O) interfaces, similar to computer system 504. Further, the server 530 is in communication with external I/O devices/resources (not shown) and storage system 536, whereas, computer system or server 540 is in communication with I/O devices or resources (not shown) and storage system 546. In general, processing unit 506 executes computer program code stored in memory 512, such as the local scanning agent program or tool 514 to determine the tasks and services currently running on the computer system 504, whereas, the processing unit of computer system 530 executes computer program code stored in memory 533, such as, the remote scanning agent program 534 to determine tasks and services running on the computer system 504. Similarly, the processing unit of computer system 540 executes computer program code stored in memory 543, such as, the results correlation tool or program 544 to determine any discrepancies between the local scan and the remote scan of the computer system 504. Further, in an embodiment, the local scanning results 524 produced by the execution of the local scanning agent program or tool 514 running on computer system 504 is stored in storage 522, whereas, the remote scanning results 538 produced by the execution of the remote scanning agent 534 is stored in storage 536 of computer system 530, and whereas, the correlation results 548 performed by the execution of the results correlation tool 544 on computer system 540 is stored in storage 546 of computer system 540. While executing the local scanning tool or program 514 on the computer system 504, the processing unit 506 can read and/or write data, to/from memory 512, storage system 522, and/or I/O interfaces 508, such as, the local scanning results 524 stored in storage 522. Alternatively, the local scanning tool 514 may store the local scanning results 524 in memory 512. Bus 510 provides a communication link between each of the components in computer system 500, such that information can be communicated within the infrastructure 502. External devices 524 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact with computer system 500 and/or any devices (e.g., network card, modem, etc.) that enable host system 504 to communicate with one or more other computing devices, such as, servers 530 and/or 540. Similarly, while executing the remote scanning tool or program 534 on the computer system 530, the processing unit can read and/or write data, to/from memory 533, storage system 536, such as, the local scanning results 538 stored in storage 536. Alternatively, the remote scanning tool 534 may store the remote scanning results 538 in memory 533. Further, while executing the results correlation tool or program 544 on the computer system 540, the processing unit can read and/or write data, to/from memory 543, storage system 546, such as, the correlation results 548 stored in storage 546. Alternatively, the results correlation tool 544 may store the correlation results 548 in memory 543
  • Computer infrastructure 502 is only illustrative of various types of computer infrastructures for implementing the invention. For example, in one embodiment, computer infrastructure 502 may comprise two or more server groups or clusters that communicate over a network to perform the various process steps of the invention. Moreover, computer system 500 is only representative of various possible computer systems that can include numerous combinations of hardware. To this extent, in other embodiments, computer system 500 can comprise any specific purpose computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general purpose hardware/software, or the like. In each case, the program code and hardware can be created using standard programming and engineering techniques, respectively. Moreover, processing unit 506 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server. Similarly, memory 512 and/or storage system 522 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations. Further, I/O interfaces 508 can comprise any system for exchanging information with one or more external devices 520. Still further, it is understood that one or more additional components (e.g., system software, math co-processing unit, etc.) not shown in FIG. 5 can be included in computer system 500.
  • Storage systems 522, 536 and 546 can be any type of system (e.g., a database) capable of providing storage for information under the present invention. To this extent, storage systems 522, 536 and 546 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive. In another embodiment, systems 522, 536 and 546 include data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown). Although not shown, additional components, such as cache memory, communication systems, system software, etc., may be incorporated into computer system 500.
  • In another embodiment, the invention provides a method or process for detecting the presence of malicious software and malware running on a computer system or host computer system, in accordance with an embodiment of the invention. Reference is now made to FIG. 6, reference numeral 600, which outlines the steps performed by a host computer system suspected of having unwanted malware or malicious software running thereon, in accordance with an embodiment of the invention. As shown in FIG. 6, in step 602, a local scanning software tool or agent program is run locally on the “suspicious” host computer system suspected of having a malicious software or malware running thereon in order to obtain a list of currently running or active network services. In step 604, the local scanning tool or agent program running locally on the host computer system enumerates and lists currently running or active services and their respective ports in use in the host computer system. The local scan results listing or enumerating the active services and their respective ports in use in the host computer system is sent (in step 606) to another computer system on the network, namely, a results correlation computer system running a results correlation engine for comparison and evaluation of the scanning results, as discussed herein below with respect to FIG. 8.
  • Reference is now made to FIG. 7, reference numeral 700, which outlines the steps performed by a remote computer system that is a computer system remote to the host computer system for detecting presence of unwanted malware or malicious software running on the host computer system, in accordance with an embodiment of the invention. A remote scanning tool or agent program is run on the remote computer system in step 702 for remotely connecting to the host computer system over a network and to obtain a list of open network ports on the host computer system. In step 704, the remote scanning tool or agent program remotely connects to the host computer system to enumerate and list currently running or active network services and their respective ports in use in the host computer system. In an embodiment, the remote scanning computer system attempts to connect to each open port on the host computer system and performs an interrogation of the services running to determine whether or not the service is a known or common service. As such, a list of open, closed and filtered ports is obtained by the remote computer system. Further, the remote scan results listing or enumerating the network ports and services visible over the network are sent in step 706 to the results correlation computer system running a results correlation engine for comparison and evaluation of the scanning results, as discussed herein below with respect to FIG. 8.
  • Reference is now made to FIG. 8, reference numeral 800, which outlines the steps performed by the results correlation computer system for detecting presence of unwanted malware or malicious software running on the host computer system, in accordance with an embodiment of the invention. In step 802, the results correlation computer system receives the local scanning results from the host computer system and, in step 804, the results correlation computer system receives the remote scanning results from the remote computer system. The results correlation computer system running a results correlation engine compares in step 806 the local list (corresponding to the local scan) and the remote list (corresponding to the remote scan) of network services running on the host computer system for any discrepancies. Any discrepancies found represent hidden services and are indicative of unwanted software or malware. In step 810, the results correlation engine determines whether or not there is a discrepancy between the local list and the remote list. If the results correlation engine determines in step 810 that there is no discrepancy between the local list and the remote list of network services running on the host computer system, that is, there are no suspicious network discrepancies found, then the process ends in step 812. However, if the results correlation engine determines in step 810 that there are one or more discrepancies found between the local list and the remote list of network services running on the host computer system, that is, there are suspicious network discrepancies that are found that are to be likely associated with unwanted or malicious software running on the host computer system, then the results correlation engine documents and logs the discrepancies in step 814. Further, in step 816, the results correlation engine flags or identifies the “suspicious” host computer system as possibly infected. Additionally, in step 818, further tests are run on the flagged host computer system and the flagged host computer system is monitored to evaluate the nature of the discrepancy found and the malicious or unwanted software currently installed on the host computer system, ending the process. In an embodiment, the host computer system has deployed thereon one or more test programs for testing and/or evaluating any discrepancies found by the results correlation engine. It will be understood by one skilled in the art that the testing and evaluation of the host computer system can be manually implemented, as necessary, by an administrator.
  • Accordingly, the invention provides a system, method and a program product for detecting the presence of malicious software and malware running on a computer system or host computer system, in accordance with an embodiment of the invention. The invention requires the ability to interrogate the host computer system both locally and remotely. Local interrogation could be conducted through a locally installed agent (user or administrator-level access), or through standard network service interrogation techniques that typically require administrative-level access. Remote service interrogation of the host computer system can be conducted with standard port scanning and vulnerability scanning technologies. The device labeled “suspicious host” may or may not originally be “suspicious” and the interrogation of the host may be a routine/scheduled event for preemptive detection of malicious activities and installation of unwanted services. Local host enumeration of network services could be achieved through the use of default operating system query tools, or custom tools. The network interrogator may use standard remote port scanning techniques to identify open ports and enumerate the services behind them. The results correlation engine could be a stand-alone device, part of the network interrogator toolset, or part of an additional software suite whose purpose is to act upon any discrepancies identified between the “local scanning results” and the “remote network scanning results”
  • The foregoing descriptions of specific embodiments of the present invention have been presented for the purpose of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto and their equivalents.

Claims (25)

1. A method of detecting presence of a malicious service agent running on a computer system, said method comprising the steps of:
locally querying a computer system to enumerate a local inventory of tasks and network services currently running on said computer system in order to detect presence of a malicious service agent running on said computer system, wherein said local inventory of tasks and network services enumerated includes respective ports in use on said computer system;
remotely querying via a network said computer system from a remote computer system to enumerate a remote inventory of tasks and network services currently running on said computer system in order to detect presence of said malicious service agent running on said computer system, wherein said remote inventory of tasks and network services enumerated includes respective ports in use on said computer system;
collecting each of said local inventory of tasks and network services enumerated and collecting each of said remote inventory of tasks and network services enumerated; and
comparing said local inventory of tasks and network services enumerated with said remote inventory of tasks and network services enumerated to identify any discrepancies between said local inventory of tasks and network services enumerated and said remote inventory of tasks and network services enumerated for detecting presence of said malicious service agent running on said computer system.
2. The method according to claim 1, wherein said locally querying step further comprises the steps of:
providing a first tool for locally detecting presence of said malicious service agent running on said computer system; and
utilizing said first tool to conduct a local scan of said computer system to locally query said computer system.
3. The method according to claim 2, wherein said remotely querying step further comprises the steps of:
providing a second tool for remotely detecting presence of said malicious service agent running on said computer system; and
utilizing said second tool to conduct a remote scan of said computer system to remotely query said computer system.
4. The method according to claim 3, wherein a port of said respective ports comprises at least one of: an open port, a closed port and a filtered port.
5. The method according to claim 4, further comprising:
flagging said computer system having said any discrepancies identified for conducting further tests to evaluate said any discrepancies identified for determining presence of said malicious service agent running on said computer system.
6. A system for detecting presence of a malicious service agent running on a host computer system, comprising:
a network communications channel;
a host computer system connected to said network communications channel;
a first tool for locally detecting presence of a malicious service agent on said host computer system, said first tool being installed locally on said host computer system to conduct a local scan of said host computer system;
a remote computer system connected to said network communications channel;
a second tool for remotely detecting presence of said malicious service agent on said host computer system, said second tool being installed on said remote computer system for conducting a remote scan of said host computer system; and
a results correlation engine for correlating results collected from said local scan of said host computer system and said remote scan of said host computer system, said results correlation engine identifying any discrepancies between said local scan and said remote scan of said host computer system for detecting presence of said malicious service agent on said host computer system.
7. The system according to claim 6, further comprising:
a third tool for providing a discrepancy report, said discrepancy report reporting said any discrepancies identified between said local scan and said remote scan of said host computer system for detecting presence of said malicious service agent on said host computer system.
8. The system according to claim 7, wherein said first tool locally queries said host computer system to enumerate a local inventory of tasks and network services currently running on said host computer system, wherein said local inventory of tasks and network services enumerated includes respective ports in use on said host computer system, and wherein a port of said respective ports enumerated in said local inventory of tasks and network services currently running on said host computer system comprises at least one of: an open port, a closed port and a filtered port.
9. The system according to claim 8, wherein said second tool remotely queries said host computer system to enumerate a remote inventory of tasks and network services currently running on said host computer system, wherein said remote inventory of tasks and network services enumerated includes respective ports in use on said host computer system, and wherein a port of said respective ports enumerated in said remote inventory of tasks and network services currently running on said host computer system comprises at least one of: an open port, a closed port and a filtered port.
10. The system according to claim 9, further comprising a fourth tool for flagging said host computer system having said any discrepancies identified in order to conduct further tests to evaluate said any discrepancies for verifying presence of said malicious service agent running on said host computer system.
11. A computer program product for detecting presence of a malicious service agent running on a host computer system, said computer program product comprising:
a computer readable storage medium;
first program instructions to locally query a computer system for enumeration of a local inventory of tasks and network services currently running on said computer system for detecting presence of a malicious service agent running on said computer system, wherein said local inventory of tasks and network services enumerated includes respective ports in use on said computer system;
second program instructions to remotely query via a network said computer system from a remote computer system for enumeration of a remote inventory of tasks and network services currently running on said computer system for detecting presence of said malicious service agent running on said computer system, wherein said remote inventory of tasks and network services enumerated includes respective ports in use on said computer system;
third program instructions to collect each of said local inventory of tasks and network services enumerated and to collect each of said remote inventory of tasks and network services enumerated;
fourth program instructions to compare said local inventory of tasks and network services enumerated with said remote inventory of tasks and network services enumerated to identify any discrepancies between said local inventory of tasks and network services enumerated and said remote inventory of tasks and network services enumerated for detecting presence of said malicious service agent running on said computer system, and wherein said first, second, third and fourth program instructions are recorded on said computer readable storage medium.
12. The computer program product according to claim 11, further comprising:
fifth program instructions to flag said computer system having said any discrepancies identified for conducting further tests to evaluate said any discrepancies, wherein said fifth program instructions are recorded on said computer readable medium.
13. The computer program product according to claim 12, wherein said first program instructions further comprise instructions to provide a first tool for locally detecting presence of said malicious service agent running on said computer system, and to utilize said first tool to conduct a local scan of said computer system to locally query said computer system.
14. The computer program product according to claim 13, wherein said second program instructions further comprise instructions to provide a second tool for remotely detecting presence of said malicious service agent running on said computer system, and to utilize said second tool to conduct a remote scan of said computer system to remotely query said computer system.
15. The computer program product according to claim 14, wherein a port of said respective ports comprises at least one of: an open port, a closed port and a filtered port.
16. A computer system for detecting presence of a malicious service agent running on a host computer system, comprising:
first program instructions to locally query a computer system for enumeration of a local inventory of tasks and network services currently running on said computer system for detecting presence of a malicious service agent running on said computer system, wherein said local inventory of tasks and network services enumerated includes respective ports in use on said computer system;
second program instructions to remotely query via a network said computer system from a remote computer system for enumeration of a remote inventory of tasks and network services currently running on said computer system for detecting presence of said malicious service agent running on said computer system, wherein said remote inventory of tasks and network services enumerated includes respective ports in use on said computer system;
third program instructions to collect each of said local inventory of tasks and network services enumerated and to collect each of said remote inventory of tasks and network services enumerated;
fourth program instructions to compare said local inventory of tasks and network services enumerated with said remote inventory of tasks and network services enumerated to identify any discrepancies between said local inventory of tasks and network services enumerated and said remote inventory of tasks and network services enumerated for detecting presence of said malicious service agent running on said computer system;
a computer readable storage medium for storing each of said first, second, third and fourth program instructions; and
a central processing unit for executing each of said first, second, third and fourth program instructions.
17. The computer system according to claim 16, fifth program instructions to flag said computer system having said any discrepancies identified for conducting further tests to evaluate said any discrepancies, wherein said fifth program instructions are stored on said computer readable storage medium for execution by said central processing unit.
18. The computer system according to claim 17, wherein said first program instructions further comprise instructions to provide a first tool for locally detecting presence of said malicious service agent running on said computer system, and to utilize said first tool to conduct a local scan of said computer system to locally query said computer system.
19. The computer system according to claim 18, wherein said second program instructions further comprise instructions to provide a second tool for remotely detecting presence of said malicious service agent running on said computer system, and to utilize said second tool to conduct a remote scan of said computer system to remotely query said computer system.
20. The computer system according to claim 19, wherein a port of said respective ports comprises at least one of: an open port, a closed port and a filtered port.
21. A process for deploying computing infrastructure comprising integrating computer-readable code into a computing system, wherein said code in combination with said computing system is capable of detecting presence of a malicious service agent running on a host computer system, said process comprising the steps of:
locally running a first tool on a host computer system for conducting a local scan of said host computer system, said local scan enumerating a local inventory of tasks and network services currently running on said computer system and enumerating respective ports in use on said host computer system;
remotely running a second tool on said host computer system for conducting a remote scan of said host computer system, said remote scan enumerating a remote inventory of tasks and network services currently running on said computer system and enumerating respective ports in use on said host computer system; and
correlating results collected from said local scan and said remote scan of said host computer system to identify any discrepancies between said local inventory of tasks and network services enumerated and said remote inventory of tasks and network services enumerated for detecting presence of said malicious service agent running on said host computer system.
22. The process according to claim 21, wherein said correlating step includes the step of:
comparing said local inventory of tasks and network services enumerated with said remote inventory of tasks and network services enumerated to identify said any discrepancies.
23. The process according to claim 22, wherein a port of said respective ports enumerated in each of said local inventory of tasks and network services currently running on said host computer system and said remote inventory of tasks and network services currently running on said host computer system comprises at least one of: an open port, a closed port and a filtered port.
24. The process according to claim 23, further comprising:
providing a discrepancy report for reporting said any discrepancies identified for evaluating presence of said malicious service agent running on said host computer system.
25. The process according to claim 24, further comprising:
flagging said host computer system having said any discrepancies identified for conducting further tests to evaluate said any discrepancies identified for determining presence of said malicious service agent running on said host computer system.
US12/261,026 2008-10-29 2008-10-29 System, method and program product for detecting presence of malicious software running on a computer system Abandoned US20100107257A1 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
US12/261,026 US20100107257A1 (en) 2008-10-29 2008-10-29 System, method and program product for detecting presence of malicious software running on a computer system
JP2011533666A JP5490127B2 (en) 2008-10-29 2009-10-14 System, method and program for detecting the presence of malicious software running on a computer system
EP09752766.7A EP2294786B1 (en) 2008-10-29 2009-10-14 System, method and program product for detecting presence of malicious software running on a computer system
KR1020117009680A KR20110076976A (en) 2008-10-29 2009-10-14 System, method and program product for detecting presence of malicious software running on a computer system
CN2009801386798A CN102171987A (en) 2008-10-29 2009-10-14 System, method and program product for detecting presence of malicious software running on a computer system
PCT/EP2009/063396 WO2010049273A2 (en) 2008-10-29 2009-10-14 System, method and program product for detecting presence of malicious software running on a computer system
CA2719495A CA2719495C (en) 2008-10-29 2009-10-14 System, method and program product for detecting presence of malicious software running on a computer system
US13/315,895 US8931096B2 (en) 2008-10-29 2011-12-09 Detecting malicious use of computer resources by tasks running on a computer system
US14/547,359 US9251345B2 (en) 2008-10-29 2014-11-19 Detecting malicious use of computer resources by tasks running on a computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/261,026 US20100107257A1 (en) 2008-10-29 2008-10-29 System, method and program product for detecting presence of malicious software running on a computer system

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US13/315,895 Continuation-In-Part US8931096B2 (en) 2008-10-29 2011-12-09 Detecting malicious use of computer resources by tasks running on a computer system
US13/315,895 Continuation US8931096B2 (en) 2008-10-29 2011-12-09 Detecting malicious use of computer resources by tasks running on a computer system

Publications (1)

Publication Number Publication Date
US20100107257A1 true US20100107257A1 (en) 2010-04-29

Family

ID=42118823

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/261,026 Abandoned US20100107257A1 (en) 2008-10-29 2008-10-29 System, method and program product for detecting presence of malicious software running on a computer system
US13/315,895 Active 2028-12-03 US8931096B2 (en) 2008-10-29 2011-12-09 Detecting malicious use of computer resources by tasks running on a computer system
US14/547,359 Active US9251345B2 (en) 2008-10-29 2014-11-19 Detecting malicious use of computer resources by tasks running on a computer system

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/315,895 Active 2028-12-03 US8931096B2 (en) 2008-10-29 2011-12-09 Detecting malicious use of computer resources by tasks running on a computer system
US14/547,359 Active US9251345B2 (en) 2008-10-29 2014-11-19 Detecting malicious use of computer resources by tasks running on a computer system

Country Status (7)

Country Link
US (3) US20100107257A1 (en)
EP (1) EP2294786B1 (en)
JP (1) JP5490127B2 (en)
KR (1) KR20110076976A (en)
CN (1) CN102171987A (en)
CA (1) CA2719495C (en)
WO (1) WO2010049273A2 (en)

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070169192A1 (en) * 2005-12-23 2007-07-19 Reflex Security, Inc. Detection of system compromise by per-process network modeling
US20100333199A1 (en) * 2009-06-25 2010-12-30 Accenture Global Services Gmbh Method and system for scanning a computer system for sensitive content
US20110055381A1 (en) * 2009-09-03 2011-03-03 Mcafee, Inc. Host information collection
US20120060219A1 (en) * 2009-04-30 2012-03-08 Telefonaktiebolaget L.M Ericsson (Publ) Deviating Behaviour of a User Terminal
US20120084862A1 (en) * 2008-10-29 2012-04-05 International Business Machines Corporation Detecting Malicious Use of Computer Resources by Tasks Running on a Computer System
US20130160129A1 (en) * 2011-12-19 2013-06-20 Verizon Patent And Licensing Inc. System security evaluation
EP2624163A1 (en) * 2012-01-31 2013-08-07 Trusteer Ltd. Method for detecting malware
US20130219493A1 (en) * 2012-02-22 2013-08-22 iScan Online, Inc. Remote Security Self-Assessment Framework
WO2014111863A1 (en) * 2013-01-16 2014-07-24 Light Cyber Ltd. Automated forensics of computer systems using behavioral intelligence
US20140379714A1 (en) * 2013-06-25 2014-12-25 Compellent Technologies Detecting hardware and software problems in remote systems
US20150277950A1 (en) * 2014-03-28 2015-10-01 International Business Machines Corporation Detecting operation of a virtual machine
US9152787B2 (en) 2012-05-14 2015-10-06 Qualcomm Incorporated Adaptive observation of behavioral features on a heterogeneous platform
US9298494B2 (en) 2012-05-14 2016-03-29 Qualcomm Incorporated Collaborative learning for efficient behavioral analysis in networked mobile device
US9319897B2 (en) 2012-08-15 2016-04-19 Qualcomm Incorporated Secure behavior analysis over trusted execution environment
US9324034B2 (en) 2012-05-14 2016-04-26 Qualcomm Incorporated On-device real-time behavior analyzer
US9330257B2 (en) 2012-08-15 2016-05-03 Qualcomm Incorporated Adaptive observation of behavioral features on a mobile device
US9491187B2 (en) 2013-02-15 2016-11-08 Qualcomm Incorporated APIs for obtaining device-specific behavior classifier models from the cloud
US9495537B2 (en) 2012-08-15 2016-11-15 Qualcomm Incorporated Adaptive observation of behavioral features on a mobile device
US9521154B2 (en) 2011-08-03 2016-12-13 Hewlett Packard Enterprise Development Lp Detecting suspicious network activity using flow sampling
US9609456B2 (en) 2012-05-14 2017-03-28 Qualcomm Incorporated Methods, devices, and systems for communicating behavioral analysis information
US9686023B2 (en) 2013-01-02 2017-06-20 Qualcomm Incorporated Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors
US9684870B2 (en) 2013-01-02 2017-06-20 Qualcomm Incorporated Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors
US9690635B2 (en) 2012-05-14 2017-06-27 Qualcomm Incorporated Communicating behavior information in a mobile computing device
US9742559B2 (en) 2013-01-22 2017-08-22 Qualcomm Incorporated Inter-module authentication for securing application execution integrity within a computing device
US9747440B2 (en) 2012-08-15 2017-08-29 Qualcomm Incorporated On-line behavioral analysis engine in mobile device with multiple analyzer model providers
US10075461B2 (en) 2015-05-31 2018-09-11 Palo Alto Networks (Israel Analytics) Ltd. Detection of anomalous administrative actions
US10089582B2 (en) 2013-01-02 2018-10-02 Qualcomm Incorporated Using normalized confidence values for classifying mobile device behaviors
US10158660B1 (en) * 2013-10-17 2018-12-18 Tripwire, Inc. Dynamic vulnerability correlation
US10686829B2 (en) 2016-09-05 2020-06-16 Palo Alto Networks (Israel Analytics) Ltd. Identifying changes in use of user credentials
US10999304B2 (en) 2018-04-11 2021-05-04 Palo Alto Networks (Israel Analytics) Ltd. Bind shell attack detection
US11012492B1 (en) 2019-12-26 2021-05-18 Palo Alto Networks (Israel Analytics) Ltd. Human activity detection in computing device transmissions
US11070569B2 (en) 2019-01-30 2021-07-20 Palo Alto Networks (Israel Analytics) Ltd. Detecting outlier pairs of scanned ports
US11184377B2 (en) 2019-01-30 2021-11-23 Palo Alto Networks (Israel Analytics) Ltd. Malicious port scan detection using source profiles
US11184376B2 (en) 2019-01-30 2021-11-23 Palo Alto Networks (Israel Analytics) Ltd. Port scan detection using destination profiles
US11184378B2 (en) 2019-01-30 2021-11-23 Palo Alto Networks (Israel Analytics) Ltd. Scanner probe detection
US11233703B2 (en) * 2018-11-20 2022-01-25 Cisco Technology, Inc. Extending encrypted traffic analytics with traffic flow data
US11316872B2 (en) 2019-01-30 2022-04-26 Palo Alto Networks (Israel Analytics) Ltd. Malicious port scan detection using port profiles
US11509680B2 (en) 2020-09-30 2022-11-22 Palo Alto Networks (Israel Analytics) Ltd. Classification of cyber-alerts into security incidents
US11799880B2 (en) 2022-01-10 2023-10-24 Palo Alto Networks (Israel Analytics) Ltd. Network adaptive alert prioritization system
US12039017B2 (en) 2021-10-20 2024-07-16 Palo Alto Networks (Israel Analytics) Ltd. User entity normalization and association

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164652B (en) * 2011-12-15 2015-07-29 深圳市腾讯计算机系统有限公司 Wooden horse scan method and system
US9473346B2 (en) * 2011-12-23 2016-10-18 Firebind, Inc. System and method for network path validation
US8949995B2 (en) * 2012-09-18 2015-02-03 International Business Machines Corporation Certifying server side web applications against security vulnerabilities
CN103268446A (en) * 2012-12-28 2013-08-28 武汉安天信息技术有限责任公司 Mobile phone malicious code detection method based on SD (Secure Digital) card driver and system thereof
KR101451323B1 (en) * 2014-02-10 2014-10-16 주식회사 락인컴퍼니 Application security system, security server, security client apparatus, and recording medium
US9756062B2 (en) * 2014-08-27 2017-09-05 General Electric Company Collaborative infrastructure supporting cyber-security analytics in industrial networks
US9432393B2 (en) * 2015-02-03 2016-08-30 Cisco Technology, Inc. Global clustering of incidents based on malware similarity and online trustfulness
CN104751058B (en) * 2015-03-16 2018-08-31 联想(北京)有限公司 A kind of file scanning method and electronic equipment
US10176438B2 (en) 2015-06-19 2019-01-08 Arizona Board Of Regents On Behalf Of Arizona State University Systems and methods for data driven malware task identification
CN106878240B (en) * 2015-12-14 2020-06-02 阿里巴巴集团控股有限公司 Zombie host identification method and device
US10469324B2 (en) 2016-11-22 2019-11-05 Amazon Technologies, Inc. Virtual network verification service
JP6742541B2 (en) * 2017-12-22 2020-08-19 三菱電機株式会社 In-vehicle device, authentication method and authentication program
CN108282489B (en) * 2018-02-07 2020-01-31 网宿科技股份有限公司 vulnerability scanning method, server and system
US10708755B2 (en) * 2018-04-03 2020-07-07 Servicenow, Inc. Discovery and service mapping of serverless resources
US11108805B2 (en) * 2018-06-27 2021-08-31 Amazon Technologies, Inc. Automated packetless network reachability analysis
CN109039812B (en) * 2018-07-20 2021-05-11 深圳前海微众银行股份有限公司 Port detection method, system and computer readable storage medium
KR102327026B1 (en) 2019-02-07 2021-11-16 고려대학교 산학협력단 Device and method for learning assembly code and detecting software weakness based on graph convolution network
US11277426B1 (en) * 2019-09-13 2022-03-15 Rapid7, Inc. Anomalous asset detection based on open ports
US20220394050A1 (en) * 2021-06-08 2022-12-08 EMC IP Holding Company LLC Managing initiator identities
US11916930B2 (en) * 2021-06-29 2024-02-27 Acronis International Gmbh Non-invasive virus scanning using remote access

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6216173B1 (en) * 1998-02-03 2001-04-10 Redbox Technologies Limited Method and apparatus for content processing and routing
US20040030912A1 (en) * 2001-05-09 2004-02-12 Merkle James A. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20050086526A1 (en) * 2003-10-17 2005-04-21 Panda Software S.L. (Sociedad Unipersonal) Computer implemented method providing software virus infection information in real time
US20060156380A1 (en) * 2005-01-07 2006-07-13 Gladstone Philip J S Methods and apparatus providing security to computer systems and networks
US20060179483A1 (en) * 2005-02-07 2006-08-10 Rozas Guillermo J Method and system for validating a computer system
US20060224930A1 (en) * 2005-03-31 2006-10-05 Ibm Corporation Systems and methods for event detection
US20070022287A1 (en) * 2005-07-15 2007-01-25 Microsoft Corporation Detecting user-mode rootkits
US20070143848A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing computer and network security for polymorphic attacks
US20070240212A1 (en) * 2006-03-30 2007-10-11 Check Point Software Technologies, Inc. System and Methodology Protecting Against Key Logger Spyware
US20070300061A1 (en) * 2006-06-21 2007-12-27 Eun Young Kim System and method for detecting hidden process using system event information
US20080148407A1 (en) * 2006-12-18 2008-06-19 Cat Computer Services Pvt Ltd Virus Detection in Mobile Devices Having Insufficient Resources to Execute Virus Detection Software
US20080320594A1 (en) * 2007-03-19 2008-12-25 Xuxian Jiang Malware Detector
US20090007269A1 (en) * 2007-06-29 2009-01-01 Network Security Technologies, Inc. Using imported data from security tools
US7523502B1 (en) * 2006-09-21 2009-04-21 Symantec Corporation Distributed anti-malware
US7685254B2 (en) * 2003-06-10 2010-03-23 Pandya Ashish A Runtime adaptable search processor

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7509675B2 (en) * 2002-05-29 2009-03-24 At&T Intellectual Property I, L.P. Non-invasive monitoring of the effectiveness of electronic security services
US7418732B2 (en) * 2002-06-26 2008-08-26 Microsoft Corporation Network switches for detection and prevention of virus attacks
JP3767581B2 (en) 2003-06-13 2006-04-19 ヤマハ株式会社 Typing skill acquisition support device, word learning acquisition support device, server terminal, and program
JP2005025269A (en) * 2003-06-30 2005-01-27 Toshiba Corp Network relay device and method for inspecting security
WO2006071985A2 (en) * 2004-12-29 2006-07-06 Alert Logic, Inc. Threat scoring system and method for intrusion detection security networks
US20060203736A1 (en) * 2005-03-10 2006-09-14 Stsn General Holdings Inc. Real-time mobile user network operations center
US7841006B2 (en) * 2005-10-05 2010-11-23 Computer Associates Think, Inc. Discovery of kernel rootkits by detecting hidden information
US7665136B1 (en) * 2005-11-09 2010-02-16 Symantec Corporation Method and apparatus for detecting hidden network communication channels of rootkit tools
US7934259B1 (en) * 2005-11-29 2011-04-26 Symantec Corporation Stealth threat detection
US20070174429A1 (en) * 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
US8522304B2 (en) * 2006-09-08 2013-08-27 Ibahn General Holdings Corporation Monitoring and reporting policy compliance of home networks
US8302196B2 (en) 2007-03-20 2012-10-30 Microsoft Corporation Combining assessment models and client targeting to identify network security vulnerabilities
US20100107257A1 (en) 2008-10-29 2010-04-29 International Business Machines Corporation System, method and program product for detecting presence of malicious software running on a computer system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6216173B1 (en) * 1998-02-03 2001-04-10 Redbox Technologies Limited Method and apparatus for content processing and routing
US20080178299A1 (en) * 2001-05-09 2008-07-24 Ecd Systems, Inc. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20040030912A1 (en) * 2001-05-09 2004-02-12 Merkle James A. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US7685254B2 (en) * 2003-06-10 2010-03-23 Pandya Ashish A Runtime adaptable search processor
US20050086526A1 (en) * 2003-10-17 2005-04-21 Panda Software S.L. (Sociedad Unipersonal) Computer implemented method providing software virus infection information in real time
US20060156380A1 (en) * 2005-01-07 2006-07-13 Gladstone Philip J S Methods and apparatus providing security to computer systems and networks
US20060179483A1 (en) * 2005-02-07 2006-08-10 Rozas Guillermo J Method and system for validating a computer system
US20060224930A1 (en) * 2005-03-31 2006-10-05 Ibm Corporation Systems and methods for event detection
US20070022287A1 (en) * 2005-07-15 2007-01-25 Microsoft Corporation Detecting user-mode rootkits
US20070143848A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing computer and network security for polymorphic attacks
US20070240212A1 (en) * 2006-03-30 2007-10-11 Check Point Software Technologies, Inc. System and Methodology Protecting Against Key Logger Spyware
US20070300061A1 (en) * 2006-06-21 2007-12-27 Eun Young Kim System and method for detecting hidden process using system event information
US7523502B1 (en) * 2006-09-21 2009-04-21 Symantec Corporation Distributed anti-malware
US20080148407A1 (en) * 2006-12-18 2008-06-19 Cat Computer Services Pvt Ltd Virus Detection in Mobile Devices Having Insufficient Resources to Execute Virus Detection Software
US20080320594A1 (en) * 2007-03-19 2008-12-25 Xuxian Jiang Malware Detector
US20090007269A1 (en) * 2007-06-29 2009-01-01 Network Security Technologies, Inc. Using imported data from security tools

Cited By (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070169192A1 (en) * 2005-12-23 2007-07-19 Reflex Security, Inc. Detection of system compromise by per-process network modeling
US8931096B2 (en) * 2008-10-29 2015-01-06 International Business Machines Corporation Detecting malicious use of computer resources by tasks running on a computer system
US20120084862A1 (en) * 2008-10-29 2012-04-05 International Business Machines Corporation Detecting Malicious Use of Computer Resources by Tasks Running on a Computer System
US20150074812A1 (en) * 2008-10-29 2015-03-12 International Business Machines Corporation Detecting Malicious Use of Computer Resources by Tasks Running on a Computer System
US9251345B2 (en) * 2008-10-29 2016-02-02 International Business Machines Corporation Detecting malicious use of computer resources by tasks running on a computer system
US8918876B2 (en) * 2009-04-30 2014-12-23 Telefonaktiebolaget L M Ericsson (Publ) Deviating behaviour of a user terminal
US20120060219A1 (en) * 2009-04-30 2012-03-08 Telefonaktiebolaget L.M Ericsson (Publ) Deviating Behaviour of a User Terminal
US20100333199A1 (en) * 2009-06-25 2010-12-30 Accenture Global Services Gmbh Method and system for scanning a computer system for sensitive content
US9721106B2 (en) * 2009-06-25 2017-08-01 Accenture Global Services Limited Method and system for scanning a computer system for sensitive content
US20150067843A1 (en) * 2009-06-25 2015-03-05 Accenture Global Services Limited Method and System for Scanning a Computer System for Sensitive Content
US8898774B2 (en) * 2009-06-25 2014-11-25 Accenture Global Services Limited Method and system for scanning a computer system for sensitive content
US9391858B2 (en) * 2009-09-03 2016-07-12 Mcafee, Inc. Host information collection
US20110055381A1 (en) * 2009-09-03 2011-03-03 Mcafee, Inc. Host information collection
US9521154B2 (en) 2011-08-03 2016-12-13 Hewlett Packard Enterprise Development Lp Detecting suspicious network activity using flow sampling
US20130160129A1 (en) * 2011-12-19 2013-06-20 Verizon Patent And Licensing Inc. System security evaluation
EP2624163A1 (en) * 2012-01-31 2013-08-07 Trusteer Ltd. Method for detecting malware
US9659173B2 (en) 2012-01-31 2017-05-23 International Business Machines Corporation Method for detecting a malware
US20130219493A1 (en) * 2012-02-22 2013-08-22 iScan Online, Inc. Remote Security Self-Assessment Framework
US9032520B2 (en) * 2012-02-22 2015-05-12 iScanOnline, Inc. Remote security self-assessment framework
US9189624B2 (en) 2012-05-14 2015-11-17 Qualcomm Incorporated Adaptive observation of behavioral features on a heterogeneous platform
US9202047B2 (en) 2012-05-14 2015-12-01 Qualcomm Incorporated System, apparatus, and method for adaptive observation of mobile device behavior
US9152787B2 (en) 2012-05-14 2015-10-06 Qualcomm Incorporated Adaptive observation of behavioral features on a heterogeneous platform
US9292685B2 (en) 2012-05-14 2016-03-22 Qualcomm Incorporated Techniques for autonomic reverting to behavioral checkpoints
US9298494B2 (en) 2012-05-14 2016-03-29 Qualcomm Incorporated Collaborative learning for efficient behavioral analysis in networked mobile device
US9690635B2 (en) 2012-05-14 2017-06-27 Qualcomm Incorporated Communicating behavior information in a mobile computing device
US9324034B2 (en) 2012-05-14 2016-04-26 Qualcomm Incorporated On-device real-time behavior analyzer
US9609456B2 (en) 2012-05-14 2017-03-28 Qualcomm Incorporated Methods, devices, and systems for communicating behavioral analysis information
US9349001B2 (en) 2012-05-14 2016-05-24 Qualcomm Incorporated Methods and systems for minimizing latency of behavioral analysis
US9898602B2 (en) 2012-05-14 2018-02-20 Qualcomm Incorporated System, apparatus, and method for adaptive observation of mobile device behavior
US9495537B2 (en) 2012-08-15 2016-11-15 Qualcomm Incorporated Adaptive observation of behavioral features on a mobile device
US9330257B2 (en) 2012-08-15 2016-05-03 Qualcomm Incorporated Adaptive observation of behavioral features on a mobile device
US9319897B2 (en) 2012-08-15 2016-04-19 Qualcomm Incorporated Secure behavior analysis over trusted execution environment
US9747440B2 (en) 2012-08-15 2017-08-29 Qualcomm Incorporated On-line behavioral analysis engine in mobile device with multiple analyzer model providers
US10089582B2 (en) 2013-01-02 2018-10-02 Qualcomm Incorporated Using normalized confidence values for classifying mobile device behaviors
US9686023B2 (en) 2013-01-02 2017-06-20 Qualcomm Incorporated Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors
US9684870B2 (en) 2013-01-02 2017-06-20 Qualcomm Incorporated Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors
WO2014111863A1 (en) * 2013-01-16 2014-07-24 Light Cyber Ltd. Automated forensics of computer systems using behavioral intelligence
US9979739B2 (en) 2013-01-16 2018-05-22 Palo Alto Networks (Israel Analytics) Ltd. Automated forensics of computer systems using behavioral intelligence
US9742559B2 (en) 2013-01-22 2017-08-22 Qualcomm Incorporated Inter-module authentication for securing application execution integrity within a computing device
US9491187B2 (en) 2013-02-15 2016-11-08 Qualcomm Incorporated APIs for obtaining device-specific behavior classifier models from the cloud
US20140379714A1 (en) * 2013-06-25 2014-12-25 Compellent Technologies Detecting hardware and software problems in remote systems
US9817742B2 (en) * 2013-06-25 2017-11-14 Dell International L.L.C. Detecting hardware and software problems in remote systems
US10158660B1 (en) * 2013-10-17 2018-12-18 Tripwire, Inc. Dynamic vulnerability correlation
US11722514B1 (en) 2013-10-17 2023-08-08 Tripwire, Inc. Dynamic vulnerability correlation
US11128652B1 (en) 2013-10-17 2021-09-21 Tripwire, Inc. Dynamic vulnerability correlation
US20150277950A1 (en) * 2014-03-28 2015-10-01 International Business Machines Corporation Detecting operation of a virtual machine
US9384034B2 (en) * 2014-03-28 2016-07-05 International Business Machines Corporation Detecting operation of a virtual machine
US10075461B2 (en) 2015-05-31 2018-09-11 Palo Alto Networks (Israel Analytics) Ltd. Detection of anomalous administrative actions
US10686829B2 (en) 2016-09-05 2020-06-16 Palo Alto Networks (Israel Analytics) Ltd. Identifying changes in use of user credentials
US10999304B2 (en) 2018-04-11 2021-05-04 Palo Alto Networks (Israel Analytics) Ltd. Bind shell attack detection
US11233703B2 (en) * 2018-11-20 2022-01-25 Cisco Technology, Inc. Extending encrypted traffic analytics with traffic flow data
US11070569B2 (en) 2019-01-30 2021-07-20 Palo Alto Networks (Israel Analytics) Ltd. Detecting outlier pairs of scanned ports
US11184376B2 (en) 2019-01-30 2021-11-23 Palo Alto Networks (Israel Analytics) Ltd. Port scan detection using destination profiles
US11184378B2 (en) 2019-01-30 2021-11-23 Palo Alto Networks (Israel Analytics) Ltd. Scanner probe detection
US11184377B2 (en) 2019-01-30 2021-11-23 Palo Alto Networks (Israel Analytics) Ltd. Malicious port scan detection using source profiles
US11316872B2 (en) 2019-01-30 2022-04-26 Palo Alto Networks (Israel Analytics) Ltd. Malicious port scan detection using port profiles
US11012492B1 (en) 2019-12-26 2021-05-18 Palo Alto Networks (Israel Analytics) Ltd. Human activity detection in computing device transmissions
US11509680B2 (en) 2020-09-30 2022-11-22 Palo Alto Networks (Israel Analytics) Ltd. Classification of cyber-alerts into security incidents
US12039017B2 (en) 2021-10-20 2024-07-16 Palo Alto Networks (Israel Analytics) Ltd. User entity normalization and association
US11799880B2 (en) 2022-01-10 2023-10-24 Palo Alto Networks (Israel Analytics) Ltd. Network adaptive alert prioritization system

Also Published As

Publication number Publication date
US8931096B2 (en) 2015-01-06
US20120084862A1 (en) 2012-04-05
US9251345B2 (en) 2016-02-02
KR20110076976A (en) 2011-07-06
EP2294786B1 (en) 2016-07-27
CA2719495C (en) 2018-07-17
JP5490127B2 (en) 2014-05-14
US20150074812A1 (en) 2015-03-12
CA2719495A1 (en) 2010-05-06
WO2010049273A2 (en) 2010-05-06
EP2294786A2 (en) 2011-03-16
WO2010049273A3 (en) 2010-09-16
JP2012507094A (en) 2012-03-22
CN102171987A (en) 2011-08-31

Similar Documents

Publication Publication Date Title
CA2719495C (en) System, method and program product for detecting presence of malicious software running on a computer system
Milajerdi et al. Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
Zipperle et al. Provenance-based intrusion detection systems: A survey
US20210064751A1 (en) Provenance-based threat detection tools and stealthy malware detection
US8555385B1 (en) Techniques for behavior based malware analysis
US8091127B2 (en) Heuristic malware detection
US7475135B2 (en) Systems and methods for event detection
US8621624B2 (en) Apparatus and method for preventing anomaly of application program
Xie et al. Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments
US8108931B1 (en) Method and apparatus for identifying invariants to detect software tampering
US20100192222A1 (en) Malware detection using multiple classifiers
RU2430411C1 (en) System and method of detecting malware
CN107004088B (en) Determining device, determining method and recording medium
US10097569B2 (en) System and method for tracking malware route and behavior for defending against cyberattacks
US20210110037A1 (en) Malware detection system
Seacord et al. A structured approach to classifying security vulnerabilities
Thummapudi et al. Detection of ransomware attacks using processor and disk usage data
Jang et al. Function‐Oriented Mobile Malware Analysis as First Aid
US11233807B2 (en) Effective detection of a communication apparatus performing an abnormal communication
DeMott et al. Systematic bug finding and fault localization enhanced with input data tracking
Ravula et al. Learning attack features from static and dynamic analysis of malware
Van Randwyk et al. Farm: An automated malware analysis environment
RU2825975C1 (en) Method of combining large language model and security agent
KR102176336B1 (en) Security Vulnerability Diagnosis Error Classification Method and Its System
Alimardani et al. A taxonomy on recent mobile malware: Features, analysis methods, and detection techniques

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OLLMANN, GUNTER;REEL/FRAME:021759/0001

Effective date: 20081028

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: KYNDRYL, INC., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:058213/0912

Effective date: 20211118