发明名称 Detection of malware beaconing activities
摘要 Malware beaconing activity detection is disclosed, including: monitoring a plurality of conversations between an internal device and one or more external destinations; extracting feature sets based at least in part on the plurality of conversations; and determining that a conversation of the plurality of conversations is anomalous based at least in part on the extracted feature sets.
申请公布号 US9038178(B1) 申请公布日期 2015.05.19
申请号 US201213532385 申请日期 2012.06.25
申请人 EMC Corporation 发明人 Lin Derek
分类号 G06F12/14;G06F17/00;H04L29/06;H04L9/32;G06F15/173 主分类号 G06F12/14
代理机构 Van Pelt, Yi & James LLP 代理人 Van Pelt, Yi & James LLP
主权项 1. A malware beaconing detection system, comprising: a processor configured to: identify a plurality of conversations between an internal device and one or more external destinations, wherein at least some of the plurality of conversations are determined from stored logs associated with communication between one or more internal devices associated with an enterprise network and the one or more external destinations, wherein identifying a first conversation of the plurality of conversations between a pair comprising the internal device and a first external destination of the one or more external destination comprises to: obtain a plurality of communication events among the stored logs that includes the pair comprising the internal device and the first external destination, wherein to obtain a communication event that includes the pair comprising the internal device and the first external destination includes to: identify traffic between a dynamically assigned Internal Protocol (IP) address and the first external destination; anddetermine that the dynamically assigned IP address maps to a statically assigned address associated with the internal device; andgenerate the first conversation between the pair comprising the internal device and the first external destination based at least in part on the plurality of communication events;extract feature sets based at least in part on the plurality of conversations; anddetermine that a conversation of the plurality of conversations is anomalous based at least in part on the extracted feature sets; and a memory coupled to the processor and configured to store the extracted feature sets.
地址 Hopkinton MA US