发明名称 |
System and method for determining a security status of potentially malicious files |
摘要 |
Disclosed are systems, methods and computer program products for determining a security status of at least one potentially malicious file in a customer network. An example method comprising receiving, by a client computer system, client heuristics information from a server system for determining a security status of client data generated by at least one client application; monitoring and identifying at least one suspicious file of the client data as a potentially malicious file by analyzing metadata associated with the at least one suspicious file using the client heuristics information; collecting threat-identification information of the potentially malicious file to exclude confidential information associated with a content of the potentially malicious file; transmitting the threat-identification information to the server system for determining a security status of the potentially malicious file; and receiving security tools from the server system to block or remove the potentially malicious file. |
申请公布号 |
US8863284(B1) |
申请公布日期 |
2014.10.14 |
申请号 |
US201414287172 |
申请日期 |
2014.05.26 |
申请人 |
Kaspersky Lab ZAO |
发明人 |
Polyakov Alexey A.;Sapronov Konstantin V. |
分类号 |
H04L12/22;G06F21/56;H04L29/06;H04L12/26 |
主分类号 |
H04L12/22 |
代理机构 |
Arent Fox LLP |
代理人 |
Arent Fox LLP ;Fainberg Michael |
主权项 |
1. A method for determining a security status of at least one potentially malicious file in a customer network, comprising:
receiving, by a client computer system comprising one or more processors and memory, client heuristics information from a server system for determining a security status of client data generated by at least one client application; monitoring and identifying at least one suspicious file of the client data as a potentially malicious file by analyzing metadata associated with the at least one suspicious file using the received client heuristics information; collecting threat-identification information of the potentially malicious file to exclude confidential information associated with a content of the potentially malicious file; transmitting the threat-identification information to the server system for determining a security status of the potentially malicious file based on heuristic information not shared with the client computer system; determining to transfer the potentially malicious file to the server system in response to a request based on a confidentiality level determined for the potentially malicious file; and receiving security tools from the server system to block or remove the potentially malicious file. |
地址 |
Moscow RU |