Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery
dc.contributor.assignee | Virginia Tech Intellectual Properties, Inc. | en |
dc.contributor.department | Computer Science | en |
dc.contributor.inventor | Zhang, Hao | en |
dc.contributor.inventor | Yao, Danfeng (Daphne) | en |
dc.date.accessed | 2019-02-15 | en |
dc.date.accessioned | 2019-02-26T22:24:00Z | en |
dc.date.available | 2019-02-26T22:24:00Z | en |
dc.date.filed | 2014-05-01 | en |
dc.date.issued | 2018-02-06 | en |
dc.description.abstract | A computer system for distinguishing user-initiated network traffic from malware-initiated network traffic comprising at least one central processing unit (CPU) and a memory communicatively coupled to the CPU. The memory includes a program code executable by the CPU to monitor individual network events to determine for an individual network event whether the event has a legitimate root-trigger. Malware-initiated traffic is identified as an individual network event that does not have a legitimate root-trigger. | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.applicationnumber | 14267422 | en |
dc.identifier.patentnumber | 9888030 | en |
dc.identifier.uri | http://hdl.handle.net/10919/87831 | en |
dc.identifier.url | http://pimg-fpiw.uspto.gov/fdd/30/880/098/0.pdf | en |
dc.language.iso | en_US | en |
dc.publisher | United States Patent and Trademark Office | en |
dc.subject.cpc | G06F21/316 | en |
dc.subject.cpc | G06F21/32 | en |
dc.subject.cpc | G06F21/566 | en |
dc.subject.cpc | G06F21/57 | en |
dc.subject.cpc | G06F2221/2133 | en |
dc.subject.cpc | H04L63/145 | en |
dc.title | Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery | en |
dc.type | Patent | en |
dc.type.dcmitype | Text | en |
dc.type.patenttype | utility | en |
Files
Original bundle
1 - 1 of 1