System And Method Of Detecting File System Modifications Via Multi-layer File System State

    公开(公告)号:US20210012000A1

    公开(公告)日:2021-01-14

    申请号:US16504464

    申请日:2019-07-08

    Applicant: Google LLC

    Abstract: The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat.

    System And Method Of Detecting File System Modifications Via Multi-layer File System State

    公开(公告)号:US20230028056A1

    公开(公告)日:2023-01-26

    申请号:US17949320

    申请日:2022-09-21

    Applicant: Google LLC

    Abstract: The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat.

    BEHAVIOR-BASED VM RESOURCE CAPTURE FOR FORENSICS

    公开(公告)号:US20250094205A1

    公开(公告)日:2025-03-20

    申请号:US18964631

    申请日:2024-12-01

    Applicant: Google LLC

    Abstract: A method including monitoring, using a standard level of auditing, one or more processes of a VM and, based on monitoring the process(es), detecting aberrant behavior indicating that an attack against the VM is imminent. Based on detecting aberrant behavior indicating that the attack is imminent, the method includes monitoring, using a heightened level of auditing, the process(es), the heightened level of auditing generating log data representative of memory accesses performed by the VM, and notifying a user of the VM that the imminent attack is detected. During the attack against the VM, maintaining the monitoring of the process(es) using the heightened level of auditing, the method includes determining that the attack has concluded and, based on determining that the attack has concluded, processing the log data to determine an action performed by the detected attack; and monitoring, using the standard level of auditing, the process(es).

    Behavior-based VM resource capture for forensics

    公开(公告)号:US11494216B2

    公开(公告)日:2022-11-08

    申请号:US16542897

    申请日:2019-08-16

    Applicant: Google LLC

    Abstract: A method for capturing VM resources for forensics includes receiving an indication of compromise (IoC). The indication of compromise indicates an attack is imminent against a virtual machine. The method also includes, in response to receiving the IoC and before the attack begins, snapshotting a memory state of memory used by the virtual machine and increasing a level of auditing of the virtual machine from a standard level of auditing to a heightened level of auditing. The heightened level of auditing generates data representative of all accesses to the memory used by the virtual machine. After the attack against the virtual machine has begun, the method includes maintaining the heightened level of auditing for a threshold period of time, notifying a user of the virtual machine of the indication of compromise, and storing the data in memory external to the virtual machine.

    System and method of detecting file system modifications via multi-layer file system state

    公开(公告)号:US11481487B2

    公开(公告)日:2022-10-25

    申请号:US16504464

    申请日:2019-07-08

    Applicant: Google LLC

    Abstract: The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat.

    Behavior-based VM resource capture for forensics

    公开(公告)号:US12182604B2

    公开(公告)日:2024-12-31

    申请号:US18048532

    申请日:2022-10-21

    Applicant: Google LLC

    Abstract: A method for capturing VM resources for forensics includes receiving an indication of compromise (IoC). The indication of compromise indicates an attack is imminent against a virtual machine. The method also includes, in response to receiving the IoC and before the attack begins, snapshotting a memory state of memory used by the virtual machine and increasing a level of auditing of the virtual machine from a standard level of auditing to a heightened level of auditing. The heightened level of auditing generates data representative of all accesses to the memory used by the virtual machine. After the attack against the virtual machine has begun, the method includes maintaining the heightened level of auditing for a threshold period of time, notifying a user of the virtual machine of the indication of compromise, and storing the data in memory external to the virtual machine.

    Behavior-Based VM Resource Capture for Forensics

    公开(公告)号:US20210049031A1

    公开(公告)日:2021-02-18

    申请号:US16542897

    申请日:2019-08-16

    Applicant: Google LLC

    Abstract: A method for capturing VM resources for forensics includes receiving an indication of compromise (IoC). The indication of compromise indicates an attack is imminent against a virtual machine. The method also includes, in response to receiving the IoC and before the attack begins, snapshotting a memory state of memory used by the virtual machine and increasing a level of auditing of the virtual machine from a standard level of auditing to a heightened level of auditing. The heightened level of auditing generates data representative of all accesses to the memory used by the virtual machine. After the attack against the virtual machine has begun, the method includes maintaining the heightened level of auditing for a threshold period of time, notifying a user of the virtual machine of the indication of compromise, and storing the data in memory external to the virtual machine.

Patent Agency Ranking