会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Distributed system and method for the detection of eThreats
    • 分布式系统和检测eThreats的方法
    • US07941853B2
    • 2011-05-10
    • US12125263
    • 2008-05-22
    • Boris RozenbergEhud GudesYuval Elovici
    • Boris RozenbergEhud GudesYuval Elovici
    • G06F11/00
    • H04L63/1425G06N5/043H04L63/145
    • The invention relates to a distributed system for detecting eThreats that propagate in a network, which comprises: (a) graphs database storing at least one propagation graph, each graph describing the typical propagation over time of one eThreat class or a legitimate executable class within the network; (b) plurality of agents that are distributed in corresponding plurality of hosts within the network, each of said agents continuously monitoring the corresponding host and reporting to a Central Decision Maker (CDM) the identity of any new suspected executable, and the time in which said suspected executable has been first detected by said agent; (c) a CDM for: (c.1) receiving all said reports from said plurality of agents; (c.2) creating from said reports for each suspected executable a corresponding propagation graph which reflects the propagation characteristics over time of said suspected executable within the network, and (c.3) comparing each of said created graphs with said stored at least one propagation graph; (c.4) upon finding a similarity above a predefined threshold between a created graph and one of the stored graphs, concluding respectively that said executable belongs to the class as defined by said stored graph; and (c.5) conveying said conclusion to said agents, for optionally taking an appropriate action.
    • 本发明涉及一种用于检测在网络中传播的威胁的分布式系统,其包括:(a)存储至少一个传播图的图形数据库,每个图形描述一个eThreat类别内的典型传播随时间流逝的内容 网络; (b)分布在网络内的相应多个主机中的多个代理,每个所述代理持续监视对应的主机并向中央决策者(CDM)报告任何新的可疑可执行文件的身份,以及其中 所述疑似可执行文件已被所述代理首先检测到; (c)清洁发展机制:(c.1)从所述多个代理人接收所有所述报告; (c.2)从所述报告中为每个可疑可执行文件创建反映在所述网络内的所述可疑可执行文件随时间的传播特性的相应传播图,以及(c.3)将所述创建的图形中的每一个与所存储的至少一个 传播图; (c.4)在找到在所创建的图和存储的图之一之间的预定阈值之上的相似度时,分别结束所述可执行文件属于由所述存储的图形定义的类; 和(c.5)将所述结论传达给所述代理人,以选择采取适当的行动。
    • 4. 发明申请
    • DISTRIBUTED SYSTEM AND METHOD FOR THE DETECTION OF eTHREATS
    • 分布式系统及其检测方法
    • US20080313734A1
    • 2008-12-18
    • US12125263
    • 2008-05-22
    • Boris RozenbergEhud GudesYuval Elovici
    • Boris RozenbergEhud GudesYuval Elovici
    • G06F21/00
    • H04L63/1425G06N5/043H04L63/145
    • The invention relates to a distributed system for detecting eThreats that propagate in a network, which comprises: (a) graphs database storing at least one propagation graph, each graph describing the typical propagation over time of one eThreat class or a legitimate executable class within the network; (b) plurality of agents that are distributed in corresponding plurality of hosts within the network, each of said agents continuously monitoring the corresponding host and reporting to a Central Decision Maker (CDM) the identity of any new suspected executable, and the time in which said suspected executable has been first detected by said agent; (c) a CDM for: (c.1) receiving all said reports from said plurality of agents; (c.2) creating from said reports for each suspected executable a corresponding propagation graph which reflects the propagation characteristics over time of said suspected executable within the network, and (c.3) comparing each of said created graphs with said stored at least one propagation graph; (c.4) upon finding a similarity above a predefined threshold between a created graph and one of the stored graphs, concluding respectively that said executable belongs to the class as defined by said stored graph; and (c.5) conveying said conclusion to said agents, for optionally taking an appropriate action.
    • 本发明涉及一种用于检测在网络中传播的威胁的分布式系统,其包括:(a)存储至少一个传播图的图形数据库,每个图形描述一个eThreat类别内的典型传播随时间流逝的内容 网络; (b)分布在网络内的相应多个主机中的多个代理,每个所述代理持续监视对应的主机并向中央决策者(CDM)报告任何新的可疑可执行文件的身份,以及其中 所述疑似可执行文件已被所述代理首先检测到; (c)清洁发展机制:(c.1)从所述多个代理人接收所有所述报告; (c.2)从所述报告中为每个可疑可执行文件创建反映在所述网络内的所述可疑可执行文件随时间的传播特性的相应传播图,以及(c.3)将所述创建的图形中的每一个与所存储的至少一个 传播图; (c.4)在找到在所创建的图和存储的图之一之间的预定阈值之上的相似度时,分别结束所述可执行文件属于由所述存储的图形定义的类; 和(c.5)将所述结论传达给所述代理人,以选择采取适当的行动。