发明申请
- 专利标题: Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT Infrastructure
- 专利标题(中): 用于检测,调查和修复IT基础架构安全违规的计算机实施技术
-
申请号: US14501976申请日: 2014-09-30
-
公开(公告)号: US20150264077A1公开(公告)日: 2015-09-17
- 发明人: Stefan Berger , Yangyi Chen , Xin Hu , Dimitrious Pendarakis , Josyula Rao , Douglas Lee Schales , Reiner Sailer , Marc Stoecklin
- 申请人: International Business Machines Corporation
- 主分类号: H04L29/06
- IPC分类号: H04L29/06 ; G06F9/445 ; G06F17/30
摘要:
A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system kernels on the plurality of target computer systems. Sequences of systems calls and call parameters of the monitored applications are correlated among different target computer systems to deduce malicious activities. Remedial action(s) are performed in response to malicious activities being deduced as being malicious by the correlating. Another method includes determining that network activity at a specific time is deemed to be suspicious. Using IP addresses involved in the suspicious network activity, computer system(s) are determined that are sources of the suspicious network activity. Based on the specific time and the determined computer system(s), application(s) are determined that are executing on the determined computer system(s) that are causing the suspicious network activity. Remedial action(s) are performed for the determined computer system(s).
公开/授权文献
信息查询