摘要 |
Compromised host computers (130) in an enterprise network environment (102) comprising a plurality of security products called endpoints (140) are detected in an automated manner by an arrangement in which a reputation service provides updates to identify resources including website URIs (Universal Resource Identifiers) and IP addresses (collectively "resources") whose reputations have changed and represent potential threats or adversaries to the enterprise network (102). Responsively to the updates, a malware analyzer, which can be configured as a standalone endpoint, or incorporated into an endpoint having anti-virus/malware detection capability, or incorporated into the reputation service, will analyze logs maintained by another endpoint (typically a firewall, router, proxy server, or gateway) to identify, in a retroactive manner over some predetermined time window, those client computers (130) in the environment that had any past communications with a resource that is newly categorized by the reputation service as malicious. Every client computer (130) so identified is likely to be compromised. |