HIGH-CONFIDENCE MALWARE SEVERITY CLASSIFICATION OF REFERENCE FILE SET

    公开(公告)号:US20220229906A1

    公开(公告)日:2022-07-21

    申请号:US17151462

    申请日:2021-01-18

    Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.

    NETWORK ATTACK PREVENTION SYSTEMS AND METHODS

    公开(公告)号:US20230291751A1

    公开(公告)日:2023-09-14

    申请号:US17691930

    申请日:2022-03-10

    CPC classification number: H04L63/1408 G06F16/955 H04L41/16

    Abstract: A system and method for preventing access to potentially malicious network destinations. The method includes determining a plurality of network destinations and indicators of the plurality of network destinations including an indicator of a first network destination. A plurality of feature vectors are generated based on the plurality of network destinations including a first feature vector based on the first network destination. Access by a user via a computing device to a second network destination is detected. A second feature vector is generated, and an indicator is determined based on the second network destination. The second feature vector is compared to the plurality of feature vectors. The access by the user to the second network destination is blocked based on the indicator of the first network destination, the indicator of the second network destination, and the comparison of the second feature vector to the plurality of feature vectors.

    MALWARE DETECTION AND MITIGATION SYSTEM AND METHOD

    公开(公告)号:US20230131525A1

    公开(公告)日:2023-04-27

    申请号:US17512015

    申请日:2021-10-27

    Abstract: A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.

    AUTOMATED MALWARE CLASSIFICATION WITH HUMAN-READABLE EXPLANATIONS

    公开(公告)号:US20220237289A1

    公开(公告)日:2022-07-28

    申请号:US17159909

    申请日:2021-01-27

    Abstract: A malware classification is generated for an input data set with a human-readable explanation of the classification. An input data set having a hierarchical structure is received in a neural network that has an architecture based on a schema determined from a plurality of second input data sets and that is trained to classify received input data sets into one or more of a plurality of classes. An explanation is provided with the output of the neural network, the explanation comprising a subset of at least one input data set that caused the at least one input data set to be classified into a certain class using the schema of the generated neural network. The explanation may further be derived from the statistical contribution of one or more features of the input data set that caused the at least one input data set to be classified into a certain class.

    MALWARE ANALYSIS USING GROUP TESTING
    5.
    发明公开

    公开(公告)号:US20240362335A1

    公开(公告)日:2024-10-31

    申请号:US18306861

    申请日:2023-04-25

    CPC classification number: G06F21/577 G06F21/53 G06F2221/033

    Abstract: Malicious activity is identified in a plurality of sequences of computer instructions by identifying a plurality of sequences of computer instructions of interest, and assigning the plurality of sequences of computer instructions into two or more groups. A virtual machine sandbox is executed for each of the two or more groups, and each of the plurality of sequences of computer instructions is executed in the virtual machine sandbox into which the sequence of computer instructions has been assigned. Behavior of the executing instruction sequences is monitored, and is used to determine whether each of the groups has at least one executed sequence of computer instructions that is likely malicious.

    High-confidence malware severity classification of reference file set

    公开(公告)号:US11861006B2

    公开(公告)日:2024-01-02

    申请号:US17151462

    申请日:2021-01-18

    CPC classification number: G06F21/566 G06F18/217 G06F21/54 G06F21/568 G06N20/00

    Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.

    Malware detection and mitigation system and method

    公开(公告)号:US11831672B2

    公开(公告)日:2023-11-28

    申请号:US17512015

    申请日:2021-10-27

    CPC classification number: H04L63/145 H04L63/1408 H04L63/205

    Abstract: A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.

Patent Agency Ranking