发明名称 Detecting compromised computers by correlating reputation data with web access logs
摘要 Compromised host computers in an enterprise network environment comprising a plurality of security products called endpoints are detected in an automated manner by an arrangement in which a reputation service provides updates to identify resources including website URIs (Universal Resource Identifiers) and IP addresses (collectively "resources") whose reputations have changed and represent potential threats or adversaries to the enterprise network. Responsively to the updates, a malware analyzer, which can be configured as a standalone endpoint, or incorporated into an endpoint having anti-virus/malware detection capability, or incorporated into the reputation service, will analyze logs maintained by another endpoint (typically a firewall, router, proxy server, or gateway) to identify, in a retroactive manner over some predetermined time window, those client computers in the environment that had any past communications with a resource that is newly categorized by the reputation service as malicious. Every client computer so identified is likely to be compromised.
申请公布号 US2008244748(A1) 申请公布日期 2008.10.02
申请号 US20070824649 申请日期 2007.06.30
申请人 MICROSOFT CORPORATION 发明人 NEYSTADT JOHN;HUDIS EFIM;HELMAN YAIR;FAYNBURD ALEXANDRA
分类号 G06F11/00 主分类号 G06F11/00
代理机构 代理人
主权项
地址