System and method for detecting malicious traffic using a virtual machine configured with a select software environment

    公开(公告)号:US11637857B1

    公开(公告)日:2023-04-25

    申请号:US16791933

    申请日:2020-02-14

    申请人: FireEye, Inc.

    发明人: Ashar Aziz

    IPC分类号: G06F21/00 H04L9/40 G06F9/455

    摘要: A system for detecting malware is described. The system features a traffic analysis device and a network device. The traffic analysis device is configured to receive data over a communication network, selectively filter the data, and output a first portion of the data to the network device. The network device is communicatively coupled with and remotely located from the traffic analysis device. The network device features software that, upon execution, (i) monitors behaviors of one or more virtual machines processing the first portion of the data received as output from the traffic analysis device, and (ii) detects, based on the monitored behaviors, a presence of malware in the first virtual machine.

    Systems and methods for analyzing PDF documents

    公开(公告)号:US09954890B1

    公开(公告)日:2018-04-24

    申请号:US15256367

    申请日:2016-09-02

    申请人: FireEye, Inc.

    IPC分类号: H04L29/06 G06F21/56

    摘要: A system and method for detecting malicious activity within a Portable Document Format (PDF) document. The system includes a parser and one or more virtual machines. The parser that, when executed by a hardware processor, examines one or more portions of the PDF document to determine if one or more suspicious characteristics indicative of malicious network content are included in the one or more examined portions of the PDF document. The examined portion(s) in total are less than an entirety of the PDF document. The virtual machine(s) are adapted to receive the PDF document in response to the one or more examined portions of the PDF document being determined to include one or more suspicious characteristics indicative of malicious network content. The virtual machine(s) to process at least the one or more examined portions of the PDF document so as to determine whether the PDF document includes malicious network content.

    Micro-virtualization architecture for threat-aware module deployment in a node of a network environment

    公开(公告)号:US09946568B1

    公开(公告)日:2018-04-17

    申请号:US15009664

    申请日:2016-01-28

    申请人: FireEye, Inc.

    IPC分类号: G06F9/455 G06F9/50

    摘要: A micro-virtualization architecture deploys a threat-aware microvisor as a module of a virtualization system configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing in a memory of a node in a network environment. The micro-virtualization architecture organizes the memory as a user space and kernel space, wherein the microvisor executes in the kernel space of the architecture, while the operating system processes, an operating system kernel, a virtual machine monitor (VMM) and its spawned virtual machines (VMs) execute in the user space. Notably, the microvisor executes at the highest privilege level of a central processing unit of the node to virtualize access to kernel resources. The operating system kernel executes under control of the microvisor at a privilege level lower than a highest privilege level of the microvisor. The VMM and its spawned VMs execute at the highest privilege level of the microvisor.

    Threat-aware microvisor
    8.
    发明授权

    公开(公告)号:US09740857B2

    公开(公告)日:2017-08-22

    申请号:US14229533

    申请日:2014-03-28

    申请人: FireEye, Inc.

    摘要: A threat-aware microvisor is configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing on a node of a network environment. The microvisor may be embodied as a module disposed or layered beneath (underlying) an operating system kernel executing on the node to thereby control privileges (i.e., access permissions) to kernel resources, such as one or more central processing units (CPUs), network interfaces, memory, and/or devices, of the node. Illustratively, the microvisor may be configured to control access to one or more of the resources in response to a request by an operating system process to access the resource.

    SYSTEMS AND METHODS FOR COMPUTER WORM DEFENSE
    9.
    发明申请
    SYSTEMS AND METHODS FOR COMPUTER WORM DEFENSE 有权
    计算机防御系统与方法

    公开(公告)号:US20160301703A1

    公开(公告)日:2016-10-13

    申请号:US15090563

    申请日:2016-04-04

    申请人: FireEye, Inc.

    发明人: Ashar Aziz

    IPC分类号: H04L29/06 G06F21/53 G06F9/455

    摘要: A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. In various embodiments, the computer worm may be transported from a production network, where the computer worm is not readily identifiable, to an alternate network in the worm sensor where the computer worm may be readily identifiable. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems.

    摘要翻译: 计算机蠕虫防御系统包括由管理系统捆绑在一起的多个遏制系统。 每个收容系统部署在单独的通信网络上,并包含蠕虫传感器和阻塞系统。 在各种实施例中,计算机蠕虫可以从计算机蠕虫不易识别的生产网络传输到蠕虫传感器中的可替代网络,其中计算机蠕虫可以容易地被识别。 由一个遏制系统的蠕虫传感器产生的计算机蠕虫标识符不仅可以被提供给相同遏制系统的阻塞系统,而且还可以由管理系统分配给其他遏制系统的阻塞系统。

    Distributed systems and methods for automatically detecting unknown bots and botnets
    10.
    发明授权
    Distributed systems and methods for automatically detecting unknown bots and botnets 有权
    用于自动检测未知机器人和僵尸网络的分布式系统和方法

    公开(公告)号:US09430646B1

    公开(公告)日:2016-08-30

    申请号:US13830573

    申请日:2013-03-14

    申请人: FireEye, Inc.

    IPC分类号: G06F11/00 G06F21/56 G06F21/57

    摘要: Techniques may automatically detect bots or botnets running in a computer or other digital device by detecting command and control communications, called “call-backs,” from malicious code that has previously gained entry into the digital device. Callbacks are detected using a distributed approach employing one or more local analyzers and a central analyzer. The local analyzers capture packets of outbound communications, generate header signatures, and analyze the captured packets using various techniques. The techniques may include packet header signature matching against verified callback signatures, deep packet inspection. The central analyzer receives the header signatures and related header information from the local analyzers, may perform further analysis (for example, on-line host reputation analysis); determines using a heuristics analysis whether the signatures correspond to callbacks; and generally coordinates among the local analyzers.

    摘要翻译: 技术可以通过从先前已经进入数字设备的恶意代码中检测到称为“回叫”的命令和控制通信来自动检测在计算机或其他数字设备中运行的机器人或僵尸网络。 使用采用一个或多个本地分析器和中央分析器的分布式方法来检测回调。 本地分析仪捕获出站通信的数据包,生成报头签名,并使用各种技术分析捕获的数据包。 这些技术可以包括针对经验证的回叫签名的分组报头签名匹配,深度分组检查。 中央分析仪从本地分析仪接收标题签名和相关标题信息,可以进行进一步分析(例如在线主机信誉分析); 使用启发式分析确定签名是否对应于回调; 并且通常在本地分析仪之间进行协调。