会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Multi-behavior policy matching for malware detection
    • 用于恶意软件检测的多行为策略匹配
    • US08370931B1
    • 2013-02-05
    • US12212250
    • 2008-09-17
    • Hao-Liang ChienMing-Chang ShihChun-Da Wu
    • Hao-Liang ChienMing-Chang ShihChun-Da Wu
    • G06F11/00
    • G06F11/3072G06F21/566
    • Multi-behavior matching in a computer system is performed in order to identify suspicious sequences of activities. System behavior is captured using driver hooks. A behavior monitoring system determines the process to which the system behavior belongs by processing a table. This includes using the process ID and thread ID of the system behavior as lookups into the table. A multi-behavior matching algorithm is applied to determine if there is any matching suspicious behavior by matching sets of rules (a policy) to system events caused by a particular process. A state machine is used to keep track of matching policies. Options to the rules and policies (such as “offset,” “depth,” “distance,” “within,” “ordered” and “occurrence/interval”) are used to refine when a rule or policy is allowed to produce a positive match, reducing false positives.
    • 执行计算机系统中的多行为匹配以便识别活动的可疑序列。 使用驱动程序钩子捕获系统行为。 行为监控系统通过处理表来确定系统行为所属的过程。 这包括将进程ID和系统行为的线程ID用作表中的查找。 应用多行为匹配算法来确定是否存在与特定进程引起的系统事件匹配的规则集(策略)是否存在任何匹配的可疑行为。 状态机用于跟踪匹配策略。 使用规则和策略的选项(如偏移量,深度,距离,内部,有序和出现/间隔)来优化何时允许规则或策略产生正匹配,从而减少误报。
    • 3. 发明授权
    • Reducing false positives during behavior monitoring
    • 行为监测期间减少误报
    • US08079085B1
    • 2011-12-13
    • US12254599
    • 2008-10-20
    • Chun-Da WuMing-Yan SunChien-Hua Lu
    • Chun-Da WuMing-Yan SunChien-Hua Lu
    • G06F11/00G06F12/14G06F12/16G08B23/00G06F7/04G06F17/30G06F11/30H04N7/16
    • G06F21/56G06F21/55G06F21/566
    • A program installed on a computer system registers and is placed on an installed program list or an uninstall software list. A check of the uninstall software list (USL) is added as a secondary verification mechanism to a behavior monitoring engine. A signature-based malware scan engine may be used. If the scan engine does not flag the file as malware, then the behavior monitoring engine monitors the activities performed by the underlying application. When the behavior monitoring engine flags an activity as potentially suspicious, the USL is checked to determine if the application running the process is on the USL. If so, then the process is treated as legitimate and there is no need to alert the user. Only if both the behavior is flagged as suspicious and the application performing the behavior is not on the USL will the user receive an alert as to the potential malware.
    • 安装在计算机系统上的程序注册并放置在已安装的程序列表或卸载软件列表中。 将卸载软件列表(USL)的检查作为辅助验证机制添加到行为监视引擎。 可以使用基于签名的恶意软件扫描引擎。 如果扫描引擎不将文件标记为恶意软件,则行为监视引擎将监视底层应用程序执行的活动。 当行为监视引擎将活动标记为潜在可疑时,将检查USL以确定运行该进程的应用程序是否在USL上。 如果是这样,那么该过程被视为合法的,并且不需要提醒用户。 只有当这两个行为被标记为可疑且执行该行为的应用程序不在USL上时,用户将收到关于潜在恶意软件的警报。