The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 27, 2019

Filed:

Oct. 08, 2015
Applicant:

Nippon Telegraph and Telephone Corporation, Chiyoda-ku, JP;

Inventors:

Tomonori Ikuse, Musashino, JP;

Kazufumi Aoki, Musashino, JP;

Takeo Hariu, Musashino, JP;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 16/22 (2019.01); G06F 16/901 (2019.01); G06F 21/55 (2013.01); G06F 21/53 (2013.01); G06F 21/56 (2013.01);
U.S. Cl.
CPC ...
H04L 63/1425 (2013.01); G06F 16/22 (2019.01); G06F 16/9024 (2019.01); G06F 21/55 (2013.01); G06F 21/552 (2013.01); H04L 63/1408 (2013.01); G06F 21/53 (2013.01); G06F 21/566 (2013.01); H04L 2463/144 (2013.01);
Abstract

An identifying device monitors malware to be analyzed and acquires, as log data, the malware, download data downloaded from a communication destination, and a relation of data transfer performed with the malware or the communication destination of the download data. Then, the identifying device creates, by using the acquired log data, a dependency relation graph that is a digraph in which the malware, download data, and communication destination are set as nodes and a dependency relation of each node is set as an edge. Then, the identifying device detects a malicious node by collating the respective nodes of the created dependency relation graph with the known maliciousness information, and traces an edge in a direction from a terminal point to a start point while setting the malicious node as a base point, and then identifies the traced node as a new malicious node.


Find Patent Forward Citations

Loading…