发明名称 System and method for detecting exfiltration content
摘要 Techniques for detecting exfiltration content are described herein. According to one embodiment, a malicious content suspect is executed within a virtual machine that simulates a target operating environment associated with the malicious content suspect. A packet inspection is performed on outbound network traffic initiated by the malicious content suspect to determine whether the outbound network traffic matches a predetermined network traffic pattern. An alert is generated indicating that the malicious content suspect should be declared as malicious, in response to determining that the outbound network traffic matches the predetermined network traffic pattern.
申请公布号 US9565202(B1) 申请公布日期 2017.02.07
申请号 US201313801573 申请日期 2013.03.13
申请人 FireEye, Inc. 发明人 Kindlund Darien;Wolf Julia;Bennett James
分类号 G06F12/14;G06F9/455;G06F11/30;H04L29/06;G06F21/56 主分类号 G06F12/14
代理机构 Rutan & Tucker, LLP 代理人 Rutan & Tucker, LLP
主权项 1. A computer-implemented method for detecting exfiltration content, comprising: executing, by a processor, a malicious content suspect within a virtual machine that simulates a target operating environment associated with the malicious content suspect; prior to outbound network traffic initiated by the malicious content suspect leaving the virtual machine, performing a packet inspection, by a packet inspector executed by the processor and running within the virtual machine, on the outbound network traffic, the packet inspection to determine whether a portion of the outbound network traffic matches one or more portions of predetermined network traffic patterns or signatures; responsive to determining the portion of the outbound network traffic matches the one or more portions of predetermined network traffic patterns or signatures, determining whether the outbound network traffic includes at least one environmental property of the virtual machine that is unique to the virtual machine; responsive to determining the outbound network traffic includes the at least one environmental property of the virtual machine that is unique to the virtual machine, precluding migration of the outbound network traffic outside of the virtual machine to avoid the malicious content suspect from (i) gaining access to other components or (ii) signaling that the packet inspection is being conducted; and generating an alert by a module executed by the processor, the alert indicating that the malicious content suspect is attempting to perform an exfiltration of data based on determining that the outbound network traffic includes the at least one unique environmental property of the virtual machine.
地址 Milpitas CA US