首页> 外国专利> Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure

Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure

机译:计算机实现的技术,用于检测,调查和补救对IT基础结构的安全违规

摘要

A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system kernels on the plurality of target computer systems. Sequences of systems calls and call parameters of the monitored applications are correlated among different target computer systems to deduce malicious activities. Remedial action(s) are performed in response to malicious activities being deduced as being malicious by the correlating. Another method includes determining that network activity at a specific time is deemed to be suspicious. Using IP addresses involved in the suspicious network activity, computer system(s) are determined that are sources of the suspicious network activity. Based on the specific time and the determined computer system(s), application(s) are determined that are executing on the determined computer system(s) that are causing the suspicious network activity. Remedial action(s) are performed for the determined computer system(s).
机译:一种方法包括收集系统调用和被监视的应用程序为目标计算机系统调用的调用参数。从多个目标计算机系统上的操作系统内核接收系统调用和调用参数。系统调用的顺序和受监视应用程序的调用参数在不同的目标计算机系统之间相关联,以推断出恶意活动。响应于被相关性推断为恶意活动的恶意活动而执行补救措施。另一方法包括确定在特定时间的网络活动被认为是可疑的。使用可疑网络活动中涉及的IP地址,确定计算机系统是可疑网络活动的来源。基于特定时间和所确定的计算机系统,确定正在所确定的计算机系统上执行的,引起可疑网络活动的应用程序。对确定的计算机系统执行补救措施。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号