Invention Grant
US07882542B2 Detecting compromised computers by correlating reputation data with web access logs
有权
通过将声誉数据与Web访问日志相关联来检测受感染的计算机
- Patent Title: Detecting compromised computers by correlating reputation data with web access logs
- Patent Title (中): 通过将声誉数据与Web访问日志相关联来检测受感染的计算机
-
Application No.: US11824649Application Date: 2007-06-30
-
Publication No.: US07882542B2Publication Date: 2011-02-01
- Inventor: John Neystadt , Efim Hudis , Yair Helman , Alexandra Faynburd
- Applicant: John Neystadt , Efim Hudis , Yair Helman , Alexandra Faynburd
- Applicant Address: US WA Redmond
- Assignee: Microsoft Corporation
- Current Assignee: Microsoft Corporation
- Current Assignee Address: US WA Redmond
- Agency: Mayer & Williams PC
- Main IPC: G06F15/16
- IPC: G06F15/16

Abstract:
Compromised host computers in an enterprise network environment comprising a plurality of security products called endpoints are detected in an automated manner by an arrangement in which a reputation service provides updates to identify resources including website URIs (Universal Resource Identifiers) and IP addresses (collectively “resources”) whose reputations have changed and represent potential threats or adversaries to the enterprise network. Responsively to the updates, a malware analyzer, which can be configured as a standalone endpoint, or incorporated into an endpoint having anti-virus/malware detection capability, or incorporated into the reputation service, will analyze logs maintained by another endpoint (typically a firewall, router, proxy server, or gateway) to identify, in a retroactive manner over some predetermined time window, those client computers in the environment that had any past communications with a resource that is newly categorized by the reputation service as malicious. Every client computer so identified is likely to be compromised.
Public/Granted literature
- US20080244748A1 Detecting compromised computers by correlating reputation data with web access logs Public/Granted day:2008-10-02
Information query