System and method for capturing malicious flows and associated context for threat analysis

    公开(公告)号:US12261859B2

    公开(公告)日:2025-03-25

    申请号:US17985089

    申请日:2022-11-10

    Applicant: VMware LLC

    Abstract: Some embodiments of the invention provide, for an intrusion detection and prevention system (IDPS) engine operating on a host computer deployed in a software-defined datacenter (SDDC), a method for detecting and analyzing malicious packet flows. Upon detecting a new packet flow, the method captures packets belonging to the new packet flow in a file. When the new packet flow ends, the method determines that a particular packet belonging to the new packet flow has triggered an alert indicating the particular packet includes a potentially malicious payload. The method annotates the file for the new packet flow with a set of contextual data that (1) specifies the new packet flow as a potentially malicious packet flow and (2) identifies the particular packet and at least one signature associated with the alert triggered by the particular packet. The method sends the annotated file to a network management server to analyze the set of contextual data to extract further information regarding the potentially malicious payload.

    SYSTEM AND METHOD FOR CAPTURING MALICIOUS FLOWS AND ASSOCIATED CONTEXT FOR THREAT ANALYSIS

    公开(公告)号:US20240163294A1

    公开(公告)日:2024-05-16

    申请号:US17985089

    申请日:2022-11-10

    Applicant: VMware LLC

    CPC classification number: H04L63/1416 H04L63/1425 H04L63/1441

    Abstract: Some embodiments of the invention provide, for an intrusion detection and prevention system (IDPS) engine operating on a host computer deployed in a software-defined datacenter (SDDC), a method for detecting and analyzing malicious packet flows. Upon detecting a new packet flow, the method captures packets belonging to the new packet flow in a file. When the new packet flow ends, the method determines that a particular packet belonging to the new packet flow has triggered an alert indicating the particular packet includes a potentially malicious payload. The method annotates the file for the new packet flow with a set of contextual data that (1) specifies the new packet flow as a potentially malicious packet flow and (2) identifies the particular packet and at least one signature associated with the alert triggered by the particular packet. The method sends the annotated file to a network management server to analyze the set of contextual data to extract further information regarding the potentially malicious payload.

Patent Agency Ranking