首页> 外国专利> METHODS AND SYSTEMS FOR RECIPROCAL GENERATION OF WATCH-LISTS AND MALWARE SIGNATURES

METHODS AND SYSTEMS FOR RECIPROCAL GENERATION OF WATCH-LISTS AND MALWARE SIGNATURES

机译:周期性生成监视列表和恶意软件签名的方法和系统

摘要

The present disclosure is directed to methods and systems for reciprocal generation of watch-lists and traffic models characteristic of malicious network activity. In some aspects, the described methods and systems relate to maintaining data for recognition of malicious network activity. In general, the methods include monitoring network traffic; comparing endpoint data from monitored data packets to endpoints in a watch-list of network endpoints and comparing packet data from monitored data packets to traffic models in a catalog of traffic models characterizing malicious network activity; and determining, based on the comparisons, that a set of data packets comprise suspect network activity. The methods include adding a network endpoint to the watch-list when the determination is based on comparing packet data to a traffic model or adding a traffic model to the catalog when the determination is based on comparing endpoint data.
机译:本公开针对用于相互生成恶意网络活动特征的监视列表和流量模型的方法和系统。在一些方面,所描述的方法和系统涉及维护用于识别恶意网络活动的数据。通常,这些方法包括监视网络流量;在网络端点监视列表中,将受监视数据包中的端点数据与端点进行比较,并在表征恶意网络活动的流量模型目录中,将受监视数据包中的分组数据与流量模型进行比较;根据比较结果确定一组数据包包括可疑网络活动。该方法包括:当确定基于将分组数据与流量模型进行比较时,将网络端点添加到监视列表;或者,当确定基于对端点数据进行比较时,将网络模型添加到目录。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号