首页> 外国专利> Identifying malware-suspect end points through entropy changes in consolidated logs

Identifying malware-suspect end points through entropy changes in consolidated logs

机译:通过合并日志中的熵变化识别可疑恶意软件的端点

摘要

Detecting a malware attack includes monitoring an event log of a first device, wherein the event log identifies events indicating that the first device is likely compromised, determining an expected rate of log entries during a time window, identifying that an actual rate of log entries during the time window satisfies a threshold, determining, in response to the identifying, that the first device is a compromised device, and performing an action in response to determining that the first device is a compromised device.
机译:检测恶意软件攻击包括监视第一设备的事件日志,其中该事件日志标识指示该第一设备可能受到入侵的事件,确定时间窗口期间的预期日志条目速率,标识在此期间的实际日志条目速率时间窗口满足阈值,响应于该标识确定第一设备是受感染设备,并且响应于确定第一设备是受感染设备而执行动作。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号