The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 11, 2022

Filed:

Feb. 24, 2021
Applicant:

Netskope, Inc., Santa Clara, CA (US);

Inventors:

Ghanashyam Satpathy, Bangalore, IN;

Benjamin Chang, Fremont, CA (US);

Assignee:

Netskope, Inc., Santa Clara, CA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04N 7/16 (2011.01); G06F 7/04 (2006.01); G06F 21/56 (2013.01); G06N 5/00 (2006.01); G06N 20/00 (2019.01); G06F 21/53 (2013.01);
U.S. Cl.
CPC ...
G06F 21/56 (2013.01); G06F 21/53 (2013.01); G06N 5/003 (2013.01); G06N 20/00 (2019.01);
Abstract

The technology disclosed relates to cybersecurity attacks and cloud-based security. The technology disclosed is a method and apparatus for detecting documents with embedded threats in the form of malicious macros and malicious OLE objects. The technology disclosed detects obfuscated malicious code using a trained machine learning model to predict documents having malicious code without a known signature. The technology disclosed can thus predict which documents include signatureless malicious code. Feature engineering is used to define a set of features for detecting malicious macros and malicious OLE objects, based on features selected from a list of known characteristics and attributes possessed by files that have historically indicated malicious content. The selected features are used to train a supervised machine learning model. In another aspect, an office classifier receives incoming documents over a network, parses those documents, and applies the machine learning algorithm to classify the documents as to threat level, as safe, suspicious, or malicious. Safe documents are allowed into the network. Suspicious documents are subjected to additional processing, including quarantining or sandboxing methods. Malicious documents are rejected from the network. In a further aspect, the disclosed technology combines machine learning with other network security methods, to further increase the capability of a network security system to detect malicious macros and malicious OLE files.


Find Patent Forward Citations

Loading…