发明名称 Identifying malicious web infrastructures
摘要 Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible servers and invisible servers involved in network traffic redirection chains are determined based on determined graph-based features within a bipartite graph corresponding to invisible server vertices involved in the network traffic redirection chains and determined distance-based features corresponding to the invisible server vertices involved in the network traffic redirection chains. Malicious server vertices are identified in the bipartite graph based on the determined malicious edges between the server vertices corresponding to the visible servers and invisible servers involved in the network traffic redirection chains. Access by client devices is blocked to malicious servers corresponding to the identified malicious server vertices in the bipartite graph.
申请公布号 US9578042(B2) 申请公布日期 2017.02.21
申请号 US201514742997 申请日期 2015.06.18
申请人 International Business Machines Corporation 发明人 Hu Xin;Jang Jiyong;Wang Ting;Zhang Jialong
分类号 G06F21/55;H04L29/06;G06F15/16 主分类号 G06F21/55
代理机构 Yee & Associates, P.C. 代理人 Yee & Associates, P.C. ;LaBaw Jeffrey S.
主权项 1. A computer-implemented method for identifying malicious servers, the computer-implemented method comprising: searching, by a computer, a set of server domain name white lists to determine whether a server in a plurality of identified servers within a network is listed in the set of server domain name white lists; querying, by the computer, a set of search engines to determine whether the server in the plurality of identified servers within the network is listed in a server domain name search result; responsive to the computer determining that the server in the plurality of identified servers within the network is not listed in the set of server domain name white lists and not listed in the server domain name search result, identifying, by the computer, the server as an invisible server and adding, by the computer, the server to an invisible server list; responsive to the computer determining that the server in the plurality of identified servers within the network is listed in at least one of the set of server domain name white lists and the server domain name search result, identifying, by the computer, the server in the plurality of identified servers as a visible server and adding, by the computer, the server to a visible server list; placing, by the computer, each server in the plurality of identified servers within the network in a bipartite graph based on locating each server in one of the visible server list or the invisible server list; determining, by the computer, malicious edges between server vertices corresponding to visible servers and invisible servers involved in network traffic redirection chains based on determined graph-based features within the bipartite graph corresponding to visible and invisible server vertices involved in the network traffic redirection chains and determined distance-based features corresponding to the invisible server vertices involved in the network traffic redirection chains; identifying, by the computer, malicious server vertices in the bipartite graph based on the determined malicious edges between the server vertices corresponding to the visible servers and invisible servers involved in the network traffic redirection chains; and blocking, by the computer, access by client devices to malicious servers corresponding to the identified malicious server vertices in the bipartite graph.
地址 Armonk NY US