发明名称 DETECTING COMPROMISED COMPUTERS BY CORRELATING REPUTATION DATA WITH WEB ACCESS LOGS
摘要 Compromised host computers (130) in an enterprise network environment (102) comprising a plurality of security products called endpoints (140) are detected in an automated manner by an arrangement in which a reputation service provides updates to identify resources including website URIs (Universal Resource Identifiers) and IP addresses (collectively "resources") whose reputations have changed and represent potential threats or adversaries to the enterprise network (102). Responsively to the updates, a malware analyzer, which can be configured as a standalone endpoint, or incorporated into an endpoint having anti-virus/malware detection capability, or incorporated into the reputation service, will analyze logs maintained by another endpoint (typically a firewall, router, proxy server, or gateway) to identify, in a retroactive manner over some predetermined time window, those client computers (130) in the environment that had any past communications with a resource that is newly categorized by the reputation service as malicious. Every client computer (130) so identified is likely to be compromised.
申请公布号 WO2008122058(A3) 申请公布日期 2009.03.12
申请号 WO2008US65501 申请日期 2008.06.02
申请人 MICROSOFT CORPORATION 发明人 NEYSTADT, JOHN;HUDIS, EFIM;HELMAN, YAIR;FAYNBURD, ALEXANDRA
分类号 G06F21/22;G06F12/00 主分类号 G06F21/22
代理机构 代理人
主权项
地址