发明名称 Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT Infrastructure
摘要 A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system kernels on the plurality of target computer systems. Sequences of systems calls and call parameters of the monitored applications are correlated among different target computer systems to deduce malicious activities. Remedial action(s) are performed in response to malicious activities being deduced as being malicious by the correlating. Another method includes determining that network activity at a specific time is deemed to be suspicious. Using IP addresses involved in the suspicious network activity, computer system(s) are determined that are sources of the suspicious network activity. Based on the specific time and the determined computer system(s), application(s) are determined that are executing on the determined computer system(s) that are causing the suspicious network activity. Remedial action(s) are performed for the determined computer system(s).
申请公布号 US2015264077(A1) 申请公布日期 2015.09.17
申请号 US201414501976 申请日期 2014.09.30
申请人 International Business Machines Corporation 发明人 Berger Stefan;Chen Yangyi;Hu Xin;Pendarakis Dimitrious;Rao Josyula;Schales Douglas Lee;Sailer Reiner;Stoecklin Marc
分类号 H04L29/06;G06F9/445;G06F17/30 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method, comprising: collecting, by a computer system, system calls and call parameters invoked by monitored applications for each of a plurality of target computer systems, where the system calls and call parameters are received from operating system kernels on the plurality of target computer systems, where the operating system kernels have been instrumented to report system calls and call parameters invoked by the monitored applications; correlating, by the computer system, sequences of systems calls and call parameters of the monitored applications among different target computer systems to deduce malicious activities; and performing, by the computer system, one or more remedial actions in response to one or more malicious activities being deduced as being malicious by the correlating.
地址 Armonk NY US