发明名称 Detecting unauthorized use of computing devices based on behavioral patterns
摘要 Techniques for detecting unauthorized use (e.g., malicious attacks) of the computing systems (e.g., computing devices) are disclosed. Unauthorized use can be detected based on patterns of use (e.g., behavioral patterns of use typically associated with a human being) of the computing systems. Acceptable behavioral pattern data can be generated for a computing system by monitoring the use of a support system (e.g., an operating system, a virtual environment) operating on the computing system. For example, a plurality of system support provider components of a support system (e.g., system calls, device drivers) can be monitored in order to generate the acceptable behavioral pattern data in a form which effectively defines an acceptable pattern of use (usage pattern) for the monitored system support provider components, thereby allowing detection of unauthorized use of a computing system by detecting any deviation from the acceptable pattern of use of the monitored system support provider components.
申请公布号 US8595834(B2) 申请公布日期 2013.11.26
申请号 US20080025678 申请日期 2008.02.04
申请人 XIE LIANG;ZHANG XINWEN;SEIFERT JEAN-PIERRE;ACIICMEZ ONUR;LATIFI AFSHIN;SAMSUNG ELECTRONICS CO., LTD 发明人 XIE LIANG;ZHANG XINWEN;SEIFERT JEAN-PIERRE;ACIICMEZ ONUR;LATIFI AFSHIN
分类号 G06F21/00;H04L29/06 主分类号 G06F21/00
代理机构 代理人
主权项
地址