-
公开(公告)号:US20130145466A1
公开(公告)日:2013-06-06
申请号:US13312767
申请日:2011-12-06
IPC分类号: G06F21/00
CPC分类号: G06F21/562
摘要: In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware.
摘要翻译: 在一个实施例中,一种方法包括使用一个或多个处理器识别便携式文档格式(PDF)文件的多个特征。 该方法还包括使用一个或多个处理器对于多个特征中的每一个来确定对应于该特征的得分。 另外,该方法包括将所确定的分数与第一阈值进行比较。 至少基于所确定的分数与第一阈值的比较,该方法包括使用一个或多个处理器来确定该PDF文件是潜在的恶意软件。
-
公开(公告)号:US09213837B2
公开(公告)日:2015-12-15
申请号:US13312767
申请日:2011-12-06
CPC分类号: G06F21/562
摘要: In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware.
摘要翻译: 在一个实施例中,一种方法包括使用一个或多个处理器识别便携式文档格式(PDF)文件的多个特征。 该方法还包括使用一个或多个处理器对于多个特征中的每一个来确定对应于该特征的得分。 另外,该方法包括将所确定的分数与第一阈值进行比较。 至少基于所确定的分数与第一阈值的比较,该方法包括使用一个或多个处理器来确定该PDF文件是潜在的恶意软件。
-
公开(公告)号:US08635700B2
公开(公告)日:2014-01-21
申请号:US13312716
申请日:2011-12-06
CPC分类号: G06F21/562 , G06F21/564
摘要: In one embodiment, a method includes identifying a plurality of portions of a file and comparing the plurality of portions of the file to a plurality of stored patterns. The plurality of stored patterns include portions of known malware. The method also includes determining, from the plurality of portions of the file and based on the comparing of the plurality of portions of the file to the plurality of stored patterns, a set of matching portions. The set of matching portions include one or more of the plurality of portions of the file. In addition, the method includes determining a score for each portion in the set of matching portions and providing information regarding the set of matching portions. The information includes the scores determined for each portion of the set of matching portions.
摘要翻译: 在一个实施例中,一种方法包括识别文件的多个部分并将文件的多个部分与多个存储的模式进行比较。 多个存储的图案包括已知恶意软件的部分。 该方法还包括从文件的多个部分中确定文件的多个部分与多个存储的模式的比较,一组匹配部分。 该组匹配部分包括文件的多个部分中的一个或多个部分。 此外,该方法包括确定匹配部分组中的每个部分的得分,并提供关于该匹配部分的集合的信息。 该信息包括为该组匹配部分的每个部分确定的得分。
-
公开(公告)号:US20130145471A1
公开(公告)日:2013-06-06
申请号:US13312716
申请日:2011-12-06
CPC分类号: G06F21/562 , G06F21/564
摘要: In one embodiment, a method includes identifying a plurality of portions of a file and comparing the plurality of portions of the file to a plurality of stored patterns. The plurality of stored patterns include portions of known malware. The method also includes determining, from the plurality of portions of the file and based on the comparing of the plurality of portions of the file to the plurality of stored patterns, a set of matching portions. The set of matching portions include one or more of the plurality of portions of the file. In addition, the method includes determining a score for each portion in the set of matching portions and providing information regarding the set of matching portions. The information includes the scores determined for each portion of the set of matching portions.
摘要翻译: 在一个实施例中,一种方法包括识别文件的多个部分并将文件的多个部分与多个存储的模式进行比较。 多个存储的图案包括已知恶意软件的部分。 该方法还包括从文件的多个部分中确定文件的多个部分与多个存储的模式的比较,一组匹配部分。 该组匹配部分包括文件的多个部分中的一个或多个部分。 此外,该方法包括确定匹配部分组中的每个部分的得分,并提供关于该匹配部分的集合的信息。 该信息包括为该组匹配部分的每个部分确定的得分。
-
公开(公告)号:US08839434B2
公开(公告)日:2014-09-16
申请号:US13087447
申请日:2011-04-15
IPC分类号: G06F21/56
CPC分类号: G06F21/567
摘要: A computer-implemented method includes accessing, by an analysis console, information related to a first file received at a first host of a plurality of hosts. Each host is capable of running a corresponding set of malware detection processes. The information includes: an identifier of the first file; and data indicating a first result of the first host applying the set of malware detection processes to the first file. The identifier is generated by the first host and is usable by each of the hosts to determine whether a second file comprises content substantially equivalent to content of the first file. The analysis console generates a first output including: the identifier of the first file; and a second result indicating whether the first file comprises malware. The second result is usable by each of the hosts to determine whether the second file comprises malware. The first output is propagated to the hosts.
摘要翻译: 计算机实现的方法包括通过分析控制台访问与在多个主机的第一主机处接收到的第一文件相关的信息。 每个主机都能够运行相应的恶意软件检测过程。 该信息包括:第一文件的标识符; 以及指示将所述一组恶意软件检测处理应用于所述第一文件的所述第一主机的第一结果的数据。 标识符由第一主机生成,并且可由每个主机使用,以确定第二文件是否包含与第一文件的内容基本相同的内容。 分析控制台生成第一输出,包括:第一文件的标识符; 以及指示第一文件是否包括恶意软件的第二结果。 每个主机可以使用第二个结果来确定第二个文件是否包含恶意软件。 第一个输出传播到主机。
-
公开(公告)号:US20120266245A1
公开(公告)日:2012-10-18
申请号:US13087447
申请日:2011-04-15
IPC分类号: G06F21/00
CPC分类号: G06F21/567
摘要: A computer-implemented method includes accessing, by an analysis console, information related to a first file received at a first host of a plurality of hosts. Each host is capable of running a corresponding set of malware detection processes. The information includes: an identifier of the first file; and data indicating a first result of the first host applying the set of malware detection processes to the first file. The identifier is generated by the first host and is usable by each of the hosts to determine whether a second file comprises content substantially equivalent to content of the first file. The analysis console generates a first output including: the identifier of the first file; and a second result indicating whether the first file comprises malware. The second result is usable by each of the hosts to determine whether the second file comprises malware. The first output is propagated to the hosts.
摘要翻译: 计算机实现的方法包括通过分析控制台访问与在多个主机的第一主机处接收到的第一文件相关的信息。 每个主机都能够运行相应的恶意软件检测过程。 该信息包括:第一文件的标识符; 以及指示将所述一组恶意软件检测处理应用于所述第一文件的所述第一主机的第一结果的数据。 标识符由第一主机生成,并且可由每个主机使用,以确定第二文件是否包含与第一文件的内容基本相同的内容。 分析控制台生成第一输出,包括:第一文件的标识符; 以及指示第一文件是否包括恶意软件的第二结果。 每个主机可以使用第二个结果来确定第二个文件是否包含恶意软件。 第一个输出传播到主机。
-
公开(公告)号:US08863279B2
公开(公告)日:2014-10-14
申请号:US12719535
申请日:2010-03-08
申请人: Monty D. McDougal , Randy S. Jennings , Jeffrey C. Brown , Jesse J. Lee , Brian N. Smith , Darin J. De Rita , Kevin L. Cariker , William E. Sterns , Michael K. Daly
发明人: Monty D. McDougal , Randy S. Jennings , Jeffrey C. Brown , Jesse J. Lee , Brian N. Smith , Darin J. De Rita , Kevin L. Cariker , William E. Sterns , Michael K. Daly
CPC分类号: H04L63/1416 , G06F21/56
摘要: According to one embodiment, a computer-implemented method for execution on one or more processors includes receiving a first file and determining a file type of the first file. The method also includes determining, according to a first policy, a plurality of malware detection schemes to apply to the first file based on the determined file type of the first file. In addition, the method includes scheduling the application of the determined plurality of malware detection schemes to the first file amongst a plurality of detection nodes according to a second policy. Further, the method includes determining, in response to determining the results of applying the plurality of malware detection schemes, that the first file is malware or determining that the first file is suspected malware according to a third policy.
摘要翻译: 根据一个实施例,用于在一个或多个处理器上执行的计算机实现的方法包括接收第一文件并确定第一文件的文件类型。 该方法还包括根据第一策略确定多个恶意软件检测方案,以基于所确定的第一文件的文件类型来应用于第一文件。 此外,该方法包括根据第二策略在多个检测节点之中对所确定的多个恶意软件检测方案的应用调度到第一文件。 此外,该方法包括响应于确定应用多个恶意软件检测方案的结果,确定第一文件是恶意软件,或者根据第三策略确定第一文件是可疑的恶意软件。
-
公开(公告)号:US20110219450A1
公开(公告)日:2011-09-08
申请号:US12719535
申请日:2010-03-08
申请人: Monty D. McDougal , Randy S. Jennings , Jeffrey C. Brown , Jesse J. Lee , Brian N. Smith , Darin J. De Rita , Kevin L. Cariker , William E. Sterns , Michael K. Daly
发明人: Monty D. McDougal , Randy S. Jennings , Jeffrey C. Brown , Jesse J. Lee , Brian N. Smith , Darin J. De Rita , Kevin L. Cariker , William E. Sterns , Michael K. Daly
CPC分类号: H04L63/1416 , G06F21/56
摘要: According to one embodiment, a computer-implemented method for execution on one or more processors includes receiving a first file and determining a file type of the first file. The method also includes determining, according to a first policy, a plurality of malware detection schemes to apply to the first file based on the determined file type of the first file. In addition, the method includes scheduling the application of the determined plurality of malware detection schemes to the first file amongst a plurality of detection nodes according to a second policy. Further, the method includes determining, in response to determining the results of applying the plurality of malware detection schemes, that the first file is malware or determining that the first file is suspected malware according to a third policy.
摘要翻译: 根据一个实施例,用于在一个或多个处理器上执行的计算机实现的方法包括接收第一文件并确定第一文件的文件类型。 该方法还包括根据第一策略确定多个恶意软件检测方案,以基于所确定的第一文件的文件类型来应用于第一文件。 此外,该方法包括根据第二策略在多个检测节点之中对所确定的多个恶意软件检测方案的应用调度到第一文件。 此外,该方法包括响应于确定应用多个恶意软件检测方案的结果,确定第一文件是恶意软件,或者根据第三策略确定第一文件是可疑的恶意软件。
-
公开(公告)号:US08875293B2
公开(公告)日:2014-10-28
申请号:US13240567
申请日:2011-09-22
CPC分类号: G06F21/554 , G06F21/56
摘要: In accordance with particular embodiments, a method includes intercepting a communication and extracting metadata associated with the communication. The extracted metadata comprises a plurality of different fields from communication metadata and file metadata. The method further includes determining a score, based on previous communications, for each field of the extracted metadata. The score is indicative of a likelihood that the communication is a malicious communication. The method additionally includes combining the scores to generate a combined score for the communication based on an algorithm developed from the previous communications. The method also includes generating, based on the combined score at a first time, a predicted classification as to whether the communication is a malicious communication. The method further includes receiving, at a second time subsequent to the first time, an indication of whether the communication is a malicious communication and updating the algorithm based on the indication.
摘要翻译: 根据特定实施例,一种方法包括拦截通信并提取与通信相关联的元数据。 所提取的元数据包括来自通信元数据和文件元数据的多个不同的字段。 该方法还包括基于先前的通信确定所提取的元数据的每个字段的得分。 该分数表示通信是恶意通信的可能性。 该方法还包括组合分数以基于从先前通信开发的算法生成用于通信的组合分数。 该方法还包括基于第一次的组合得分,生成关于通信是恶意通信的预测分类。 该方法还包括在第一次之后的第二时间接收关于通信是恶意通信的指示,还是基于该指示来更新算法。
-
10.
公开(公告)号:US09009820B1
公开(公告)日:2015-04-14
申请号:US13027046
申请日:2011-02-14
CPC分类号: G06F21/566 , G06F21/56 , G06F21/567 , H04L63/1416
摘要: In certain embodiments, a method includes receiving, at a first malware detection node, from a malware detection system a request to apply a first malware detection technique to a file. The malware detection system is configured to determine whether the file is suspected malware by analyzing a plurality of predefined result states received in response to the first malware detection node applying the first malware detection technique to the file and a second malware detection node applying a second malware detection technique to the file. The method includes receiving at least one result from a malware detection engine of applying the first malware detection technique to the file and determining at least one predefined result state based on the received at least one result. The method includes reporting, by the first malware detection node, the at least one predefined result state to the malware detection system.
摘要翻译: 在某些实施例中,一种方法包括在第一恶意软件检测节点处从恶意软件检测系统接收将第一恶意软件检测技术应用于文件的请求。 所述恶意软件检测系统被配置为通过分析响应于将所述第一恶意软件检测技术应用于所述文件而接收到的多个预定义结果状态来确定所述文件是否是可疑的恶意软件;以及第二恶意软件检测节点应用第二恶意软件 检测技术到文件。 该方法包括从恶意软件检测引擎接收至少一个结果,该引擎将第一恶意软件检测技术应用于该文件,并且基于接收到的至少一个结果来确定至少一个预定义的结果状态。 该方法包括由第一恶意软件检测节点向恶意软件检测系统报告至少一个预定义的结果状态。
-
-
-
-
-
-
-
-
-