发明名称 Rootkit Detection in a Computer Network
摘要 Systems and methods are provided for detecting a rootkit by way of a call timing deviation anomaly in a computer. The rootkits may be embedded in the operating system (OS) kernel, an application or other system function. An object call duration baseline is established for durations of object calls (e.g., a system or application call) initiated by the computer, where each object call has an associated call-type and the timing baseline is established on an object call-type basis. Object call durations initiated by the computers are monitored. An object call duration anomaly is detected when the object call duration fails a call duration deviation measurement test, and an indication of the call duration anomaly is generated when detected.
申请公布号 US2015074808(A1) 申请公布日期 2015.03.12
申请号 US201414451725 申请日期 2014.08.05
申请人 Triumfant, Inc. 发明人 QUINN Mitchell N.
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method for detecting a rootkit in a computer, comprising: establishing an object call duration timing baseline for durations of object calls initiated by the computer, wherein each object call has an associated object call-type and the timing baseline is established on a on an object call-type basis; monitoring object call durations initiated by the computer; detecting an object call duration anomaly when the object call duration fails an object call duration deviation measurement test based on the associated object call-type and the timing baseline for a given object call-type; and generating an indication of the object call duration anomaly when detected.
地址 Research Triangle Park NC US