The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 28, 2017

Filed:

Sep. 30, 2014
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Stefan Berger, Larchmont, NY (US);

Yangyi Chen, Bloomington, IN (US);

Xin Hu, White Plains, NY (US);

Dimitrios Pendarakis, Westport, CT (US);

Josyula Rao, Briarcliff Manor, NY (US);

Reiner Sailer, Scarsdale, NY (US);

Douglas Lee Schales, Ardsley, NY (US);

Marc Stoecklin, Bern, CH;

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/51 (2013.01); G06F 21/56 (2013.01); G06F 21/55 (2013.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); G06F 21/51 (2013.01); G06F 21/554 (2013.01); G06F 21/566 (2013.01); H04L 63/06 (2013.01); H04L 63/1416 (2013.01); H04L 63/1441 (2013.01); H04L 63/14 (2013.01);
Abstract

A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system kernels on the plurality of target computer systems. Sequences of systems calls and call parameters of the monitored applications are correlated among different target computer systems to deduce malicious activities. Remedial action(s) are performed in response to malicious activities being deduced as being malicious by the correlating. Another method includes determining that network activity at a specific time is deemed to be suspicious. Using IP addresses involved in the suspicious network activity, computer system(s) are determined that are sources of the suspicious network activity. Based on the specific time and the determined computer system(s), application(s) are determined that are executing on the determined computer system(s) that are causing the suspicious network activity. Remedial action(s) are performed for the determined computer system(s).


Find Patent Forward Citations

Loading…