Just in time memory analysis for malware detection

    公开(公告)号:US10902122B2

    公开(公告)日:2021-01-26

    申请号:US15890192

    申请日:2018-02-06

    申请人: SonicWALL Inc.

    IPC分类号: G06F21/55 G06F21/56

    摘要: Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set.

    Instant Secure Wireless Network Setup
    2.
    发明申请

    公开(公告)号:US20200344608A1

    公开(公告)日:2020-10-29

    申请号:US16397935

    申请日:2019-04-29

    申请人: SonicWALL Inc.

    摘要: The present disclosure relates to securely setting up mesh networks in a manner that does not require a physical network cable being attached to a wireless mesh device and that does not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus consistent with the present disclosure may allow a user to choose which mesh nodes can join a network and that user may specificity a custom profile that may include rules that may identify how mesh network identifiers are used, that identify passcodes/passphrases assigned to a particular network, may identify types of traffic that may be passed through particular 802.11 radio channels, or other parameters that may control how traffic is switched between devices in a particular wireless mesh network. This combined with dual factor verification and the use of different types of communication channels make wireless mesh networks easy to deploy and expand.

    Securing transmission paths in a mesh network

    公开(公告)号:US12075246B2

    公开(公告)日:2024-08-27

    申请号:US16911111

    申请日:2020-06-24

    申请人: SonicWALL Inc.

    摘要: Securely setting up mesh networks in a secure manner that does not require a physical network cable being attached to a wireless device and that do not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus may use different communication interfaces and different types of channels to ensure that devices included in or being added to a wireless mesh network always communicate securely. Methods and apparatus may use a combination of conventional secure communication methods, such as secure hypertext transfer protocol (HTTPS) communications, low power signals that travel over short distances, and other types of communications to create a system that only uses secure communications when setting up or expanding a wireless mesh network.

    Analysis of historical network traffic to identify network vulnerabilities

    公开(公告)号:US11693961B2

    公开(公告)日:2023-07-04

    申请号:US17111414

    申请日:2020-12-03

    申请人: SonicWALL Inc.

    IPC分类号: G06F21/56 H04L9/40

    摘要: Methods and apparatus consistent with the present disclosure may be used after a computer network has been successfully attacked by new malicious program code. Such methods may include collecting data from computers that have been affected by the new malicious program code and this data may be used to identify a type of damage performed by the new malicious code. The collected data may also include a copy of the new malicious program code. Methods consistent with the present disclosure may also include allowing the new malicious program code to execute at an isolated computer while actions and instructions that cause the damage are identified. Signatures may be generated from the identified instructions after which the signatures or data that describes the damaging actions are provided to computing resources such that those resources can detect the new malware program code.

    ANALYSIS OF HISTORICAL NETWORK TRAFFIC TO IDENTIFY NETWORK VULNERABILITIES

    公开(公告)号:US20210165879A1

    公开(公告)日:2021-06-03

    申请号:US17111414

    申请日:2020-12-03

    申请人: SonicWall Inc.

    IPC分类号: G06F21/56 H04L29/06

    摘要: Methods and apparatus consistent with the present disclosure may be used after a computer network has been successfully attacked by new malicious program code. Such methods may include collecting data from computers that have been affected by the new malicious program code and this data may be used to identify a type of damage performed by the new malicious code. The collected data may also include a copy of the new malicious program code. Methods consistent with the present disclosure may also include allowing the new malicious program code to execute at an isolated computer while actions and instructions that cause the damage are identified. Signatures may be generated from the identified instructions after which the signatures or data that describes the damaging actions are provided to computing resources such that those resources can detect the new malware program code.

    Instant secure wireless network setup

    公开(公告)号:US10972916B2

    公开(公告)日:2021-04-06

    申请号:US16397935

    申请日:2019-04-29

    申请人: SonicWALL Inc.

    摘要: The present disclosure relates to securely setting up mesh networks in a manner that does not require a physical network cable being attached to a wireless mesh device and that does not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus consistent with the present disclosure may allow a user to choose which mesh nodes can join a network and that user may specificity a custom profile that may include rules that may identify how mesh network identifiers are used, that identify passcodes/passphrases assigned to a particular network, may identify types of traffic that may be passed through particular 802.11 radio channels, or other parameters that may control how traffic is switched between devices in a particular wireless mesh network. This combined with dual factor verification and the use of different types of communication channels make wireless mesh networks easy to deploy and expand.

    Visualization tool for real-time network risk assessment

    公开(公告)号:US12058147B2

    公开(公告)日:2024-08-06

    申请号:US17862948

    申请日:2022-07-12

    申请人: SONICWALL INC.

    摘要: The present disclosure relates to methods and apparatus that collect data regarding malware threats, that organizes this collected malware threat data, and that provides this data to computers or people such that damage associated with these software threats can be quantified and reduced. The present disclosure is also directed to preventing the spread of malware before that malware can damage computers or steal computer data. Methods consistent with the present disclosure may optimize tests performed at different levels of a multi-level threat detection and prevention system. As such, methods consistent with the present disclosure may collect data from various sources that may include endpoint computing devices, firewalls/gateways, or isolated (e.g. “sandbox”) computers. Once this information is collected, it may then be organized, displayed, and analyzed in ways that were not previously possible.

    Analysis of historical network traffic to identify network vulnerabilities

    公开(公告)号:US12056237B2

    公开(公告)日:2024-08-06

    申请号:US18215943

    申请日:2023-06-29

    申请人: SONICWALL INC.

    IPC分类号: G06F21/56 H04L9/40

    摘要: Methods and apparatus consistent with the present disclosure may be used after a computer network has been successfully attacked by new malicious program code. Such methods may include collecting data from computers that have been affected by the new malicious program code and this data may be used to identify a type of damage performed by the new malicious code. The collected data may also include a copy of the new malicious program code. Methods consistent with the present disclosure may also include allowing the new malicious program code to execute at an isolated computer while actions and instructions that cause the damage are identified. Signatures may be generated from the identified instructions after which the signatures or data that describes the damaging actions are provided to computing resources such that those resources can detect the new malware program code.

    Establishing simultaneous mesh node connections

    公开(公告)号:US11997635B2

    公开(公告)日:2024-05-28

    申请号:US16883275

    申请日:2020-05-26

    申请人: SonicWALL Inc.

    摘要: Methods and apparatus that registers a plurality of mesh node devices to operate as part of a wireless mesh network after a user device scans encoded information that is unique to each mesh node of a plurality of different mesh nodes. After codes associated with different respective mesh nodes are scanned by a user device, that user device may communicate with these different mesh nodes via a low power communication interface and the user device may send registration information to a registration computer via a secure communication channel. Apparatus may also receive a validation code from the registration computer via a communication channel that is different from the secure communication channel and these apparatus may then send the validation code to the registration computer via the secure communication channel when the user device is validated by the registration computer.

    Elastic Security Services and Load Balancing in a Wireless Mesh Network

    公开(公告)号:US20220240091A1

    公开(公告)日:2022-07-28

    申请号:US17716860

    申请日:2022-04-08

    申请人: SONICWALL INC.

    摘要: The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network by allowing different wireless nodes to receive and store content ratings regarding requested content in caches associated with respective wireless nodes. Apparatus and methods consistent with the present disclosure perform a load balancing function because they distribute content ratings to different nodes in a wireless network without increasing messaging traffic. As response messages regarding access requests are passed back to a requestor, cache memories at nodes along a communication path are updated to include information that cross-references data identifiers with received content ratings. The cross-referenced data identifiers and content ratings allow each respective wireless node along the communication path to block requests to bad content.