发明名称 Computer defenses and counterattacks
摘要 A method includes instantiating a first detection agent based on detection criteria, where the first detection agent includes first program code executable by a second computing device to monitor network activity. The method further includes sending the first program code of the first detection agent to the second computing device for execution. When the first program code of the first detection agent is executed at the second computing device, the first detection agent causes network activity data to be transmitted to a network monitor, and the network monitor updates the detection criteria based on the network activity data to generate updated detection criteria. The method also includes instantiating a second detection agent based on the updated detection criteria and sending second program code of the second detection agent to the second computing device for execution.
申请公布号 US9591022(B2) 申请公布日期 2017.03.07
申请号 US201414574076 申请日期 2014.12.17
申请人 THE BOEING COMPANY 发明人 Purpura William J.
分类号 H04L29/06 主分类号 H04L29/06
代理机构 Toler Law Group, PC 代理人 Toler Law Group, PC
主权项 1. A system comprising: a processing system including one or more processors; memory accessible to the processing system, wherein the memory stores instructions executable by at least one processor of the one or more processors to cause the at least one processor to: instantiate a first detection agent based on detection criteria, wherein the first detection agent includes first program code executable by a second processor to monitor network activity;send the first program code of the first detection agent to a remote computing device for execution, wherein, when the first program code of the first detection agent is executed at the remote computing device, the first detection agent is configured to: monitor operations of components of the remote computing device including operations of a trusted component,generate an operational signature corresponding to the monitored operations of the trusted component of the remote computing device,monitor network activity of the remote computing device based on the operational signature while emulating activity of the trusted component of the remote computing device, andtransmit network activity data to the processing system, and wherein the processing system updates the detection criteria based on the network activity data and generates updated detection criteria;instantiate a second detection agent based on the updated detection criteria, wherein the second detection agent includes second program code; andsend the second program code of the second detection agent to the remote computing device for execution.
地址 Chicago IL US