US20130133072A1 - Network protection system and method - Google Patents
Network protection system and method Download PDFInfo
- Publication number
- US20130133072A1 US20130133072A1 US13/810,450 US201113810450A US2013133072A1 US 20130133072 A1 US20130133072 A1 US 20130133072A1 US 201113810450 A US201113810450 A US 201113810450A US 2013133072 A1 US2013133072 A1 US 2013133072A1
- Authority
- US
- United States
- Prior art keywords
- data
- bot
- address
- asset
- machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012545 processing Methods 0.000 claims abstract description 18
- 238000004891 communication Methods 0.000 claims abstract description 17
- 238000013480 data collection Methods 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 10
- 238000004458 analytical method Methods 0.000 claims description 8
- 230000000116 mitigating effect Effects 0.000 claims description 8
- 238000003860 storage Methods 0.000 claims description 7
- 230000002155 anti-virotic effect Effects 0.000 claims description 5
- 238000013507 mapping Methods 0.000 claims description 5
- 238000001914 filtration Methods 0.000 claims description 4
- 230000002265 prevention Effects 0.000 claims description 4
- 244000035744 Hura crepitans Species 0.000 claims description 2
- 238000012544 monitoring process Methods 0.000 claims description 2
- 230000008520 organization Effects 0.000 description 10
- 230000000694 effects Effects 0.000 description 7
- 238000007726 management method Methods 0.000 description 5
- 230000001010 compromised effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000011160 research Methods 0.000 description 4
- 239000000463 material Substances 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000009193 crawling Effects 0.000 description 2
- 208000015181 infectious disease Diseases 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 229920001690 polydopamine Polymers 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- RJKFOVLPORLFTN-LEKSSAKUSA-N Progesterone Chemical compound C1CC2=CC(=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H](C(=O)C)[C@@]1(C)CC2 RJKFOVLPORLFTN-LEKSSAKUSA-N 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000004907 flux Effects 0.000 description 1
- 238000003306 harvesting Methods 0.000 description 1
- 238000012966 insertion method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010397 one-hybrid screening Methods 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 238000011897 real-time detection Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Definitions
- the present invention relates to internet security.
- the invention relates to protecting computers and networks from becoming part of a botnet.
- Malware types include examples such as worms, bankers, proxy, DDoS, password stealers, fake anti-virus, spammers, downloaders and the like.
- worms is given to self-replicating malware which uses a computer network to send copies of itself to other computers on the network.
- bankers is given to malware which steals banking information.
- proxy is given to malware which sets the infected computer as a proxy between other computers (for example as used for Fast Flux and the like).
- DoS is given to malware which is used for Denial-of-Service attack against websites or networks.
- malware stealers is given to malware which steals any type of information.
- malware which misleads users into paying for a fake removal of malware.
- Downloaders is given to malware which downloads other malware to an infected computer.
- Malware types may be differentiated according to criteria such as self-distribution, point of control, data stealing, level of protection and the like.
- the self-distribution is the capability of the malware to spread itself to other computers.
- Point of control refers to the capability of the malware to be controlled by a central remove server, for example its vulnerability to receiving commands, sending information, automatic updating and the like.
- Data stealing refers to the capability of the malware to send information from the computer to a remote server.
- the level of protection of malware refers to the systems put into place by the malware author in order to decrease detection by end point security products, such as anti-virus software, malware detection software, and the like, and gateway protection software, such as firewalls and the like.
- end point security products such as anti-virus software, malware detection software, and the like
- gateway protection software such as firewalls and the like.
- some malware is designed to be polymorphic, for example changing executable signature, while maintaining the malware payload.
- Some malware may use encryption of the network communication between the malware and a drop zone at a criminal server.
- Cyber criminals use different methods to infect machines with malware. Examples include the social engineering, exploitation of specific vulnerabilities, use of exploit kits, distribution of email attachment and the like.
- Social engineering is one method for deceiving users into downloading malware.
- a website which offers to show a video.
- the user In in order to view the video the user is required to download software purporting to be an update for commonly used software such as Adobe Flash or the like.
- the update In reality the update is an executable file installing malware onto the host.
- Specific vulnerability may be identified and exploited, certain malicious webpages, for example, exploit known vulnerabilities of a browser, application or operating system in order to install the malware surreptitiously.
- Exploit kits are a collections of exploits traded in the underground, and used by cyber criminals to increase the probability of installing the malware surreptitiously.
- a botnet generally comprises a set of malware infected computers, or bots, all connected to a common criminal sever, also known as a bot server, or a bot server set comprising a plurality of bot servers.
- the bot server or bot server set may include a command and control module, which is able to control all the infected computers, an update module which updates the malware code in the infected computers, and a drop zone for collecting data received from the infected computers.
- the client may have at least one client address, and the botnet may be controlled by at least one criminal server having at least one bot address.
- the botnet may be operable to communicate data between the at least one client address and the at least one bot address.
- the system may comprise at least one processing unit, the processing unit configured to classify the data into indexed data and to filter the indexed data into filtered data pertaining to data queries; at least one storage unit configured to store the indexed data; and at least one communication unit configured to receive the data queries and send filtered data pertaining to the data queries.
- the at least one client address and the at least one bot address may be selected from a group of formats consisting of: IP addresses, IPv4 addresses, IPv6 addresses, MAC addresses, Virtual IP addresses representing load-balanced clusters, domain name mappings, host names, domain controllers and combinations thereof.
- the at least one data collection system may be configured to collect the bot addresses from a plurality of sources.
- the plurality of sources may be selected from a group consisting of: data sent from the at least one client address to the at least one bot address, data sent from the at least one bot address to the at least one client address, malware sensors, public domain knowledge, publically available files located on criminal servers, open access logs on servers, sinkholes, sandboxes, intrusion detection systems, intrusion prevention systems, anti-virus logs, firewall logs, data leakage prevention systems, operating system logs, URL filtering systems, security information, event management systems and combinations thereof.
- the data collection system may comprise at least one machine operable to join at least one botnet.
- the at least one machine is a virtual machine.
- the machine may be operable to communicate with the at least one criminal server.
- the machine may be operable to download malicious content from the at least one criminal server.
- the machine may be operable to communicate with the at least one processing unit.
- the machine may be operable to send the malicious content to the at least one processing unit.
- the machine may be operable to receive machine-specific-data-queries and to analyse the malicious content. Accordingly, the machine may be operable to classify the malicious content into machine-specific-indexed-data and filter the machine-specific-indexed-data into machine-specific-filtered-data pertaining to the machine-specific-data-queries. In some embodiments, the machine may be capable of storing machine-specific-indexed-data in the storage unit.
- the machine further comprises a recording unit operable to record communication between at least one client address and the at least one bot address.
- the system may further comprise at least one display unit configured to display the filtered data pertaining to the data queries.
- a method for protecting at least one asset from becoming part of at least one botnet, the asset having at least one client address and the botnet being controlled by at least one criminal server having at least one bot address, the botnet operable to communicate data between the at least one client address and the at least one bot address.
- the method may comprise: defining at least one asset which requires botnet protection, the asset having at least one asset address; processing traffic sent to and from the at least one asset address and the at least one bot address; and identifying at least one bot attack pertaining to the at least one asset.
- Defining the at least one asset may comprise defining at least one IP range representing the asset.
- defining the at least one asset may comprise defining at least one network interface representing the asset.
- the method further comprises collecting potential bot data.
- collecting potential bot data comprises: exposing at least one honeypot asset having at least one honeypot address to a the traffic; monitoring honeypot-traffic, the honeypot-traffic traveling between the at least one honeypot address and the at least one bot address; and identifying bot-traffic patterns from the honeypot-traffic, the bot-traffic patterns indicative of at least one bot-infected asset.
- processing traffic sent to and from the at least one asset address and the at least one bot address may comprise: classifying the traffic into classified-traffic, the classifying performed according to the at least one IP range representing the at least one asset and according to the bot-traffic patterns.
- identifying the at least one bot attack pertaining to the asset comprises filtering the classified-traffic according to the at least one asset address.
- the method may further comprise displaying the at least one bot attack pertaining to the at least one asset. Furthermore, the method may further comprise mitigating the at least one bot attack.
- Still another aspect of the disclosure is to teach a method for protecting at least one client network from security threats.
- the method may comprise connecting to a remote intelligence gathering system, the system comprising at least one database and at least one virtual machine connected to a computer network, the virtual machine operable to communicate with at least one criminal server, to download at least one malicious software program, to analyse the malicious software, to store data pertaining to the malicious software, and to index the data in the database; sending a query to the intelligence gathering system, the query relating to characteristics of the client network; and receiving intelligence from the intelligence gathering system pertaining to the characteristics of the client network.
- the virtual machine is operable to join at least one botnet.
- the virtual machine may be operable to record communication between the at least one botnet and the at least one criminal server.
- Such an intelligence gathering system may be operable to identify at least one future domain name used by the criminal server, register the domain name, record data sent to the domain name from other members of the botnet.
- the virtual machine is further operable to identify other members of the botnet
- collected intelligence may comprise at least one item selected from: at least one current IP address of the criminal server, at least one future IP address of the criminal server, at least one current URL of the criminal server, at least one future URL of the criminal server, at least one current domain name of the criminal server, at least one future domain name of the criminal server, at least one geographical location of the security threat; at least one vulnerability exploited by the malicious software, time stamps and combinations thereof.
- FIG. 1 represents an example of a prior art network topology
- FIG. 2 represents a block diagram representing a typical botnet as known in the art
- FIGS. 3A and 3B are block diagrams representing selected components of a bot protection system
- FIG. 4 represents the components of distributed file environment
- FIG. 5 represents the steps in a bot protection method
- FIGS. 6A-F represent presentation options as screenshots in accordance with embodiment of the present disclosure
- FIG. 7 is a table representing examples of web interface settings which can be entered by a supervisor
- FIG. 8 is a flowchart representing the main processes in a method for protecting assets from becoming part of a botnet.
- FIG. 9 is a flowchart representing the main processes in a method for protecting at least one client network from security threats.
- the system includes cyber threat management services which are capable for minimizing business risks by providing real time detection of cybercrime events.
- the system is configured to gather and analyze intelligence from multiple sources, identify malicious content, hostile servers and botnets.
- the system is further capable of pin-pointing corporate specific attacks, alerting a user to specific personal or organizational assets that may be compromised, and potentially removing malicious content from infected assets.
- users such as network administrators and the like, may be capable of protecting or sealing a domain against cyber penetration and leakage.
- users may be able to identify cyber adversaries in real time and gain accurate visibility to compromised assets.
- the system may be capable of providing extensive coverage of many malware family types, regardless of their characteristics and methods of infection.
- Assets may be referred to herein as ‘clients’ and are typically defined by at least one ‘client address’.
- criminal servers are also typically defined by at least one ‘bot address’.
- a ‘client address’ or a ‘bot address’ is an IP address (such as IPv4 or IPv6).
- IP address such as IPv4 or IPv6
- MAC addresses Virtual IP addresses representing elements such as load balanced clusters, domain name mappings or the like may also be used as client addresses or bot addresses.
- client addresses are typically defined by a supervisor or an administrator of an asset or a group of assets, for example a domain administrator.
- bot addresses are addresses pertaining to at least one criminal server located in a networks such as public or private networks, the bot addresses accessible directly or indirectly by clients and assets in the same network or in other networks.
- a private network 10 comprises a plurality of client computers 12 A-E having a common gateway 20 to a public network 30 such as but not limited to the internet. It is noted that where required the gateway 20 may which may also serve as a firewall.
- the public network 30 comprises a plurality of servers, for example web servers 32 A and 32 B and bot servers 34 A and 34 B.
- the public network such as the internet or ‘the Web’, may be accessed by many different clients.
- the public network may contain servers such as innocent content servers and malicious bot servers.
- Content servers such as but not limited to commonly used domains CBS.com and USAToday.com, may provide content accessible by other computers connected to the public network either directly or through a network gateway.
- criminal servers such as bot servers, may exploit the public network to gain access to client computers optionally residing in public, private and protected networks.
- the firewall 20 may be used to protect the private network 10 from attack. It is noted however that known firewall applications typically require on-site installation of hardware and/or software within the private network or on the network edge. Furthermore, the client computers of the private network may be portable computers or the like which may be used in multiple environments including environments unprotected by firewalls and the like.
- botnet 50 comprises a plurality of infected computers 52 A, 52 B and 52 C in communication with a bot server 60 comprising a command and control component 62 , a bot update component 64 and a drop zone 66 .
- FIG. 3A illustrating a basic embodiment 100 of the bot protection system and method.
- a user such as a network manager may communicate with a remote intelligence gathering system 100 .
- the user may send queries relating to various characteristics of the client network 10 to the network manager and receive therefrom information relating to possible threats to the security of computers in a client network 10 .
- client network 10 is shown having one hybrid asset 104 , internal assets 106 A and 106 B, and external assets 108 A and 108 B.
- Assets may vary in number and type, and include combinations and sub-combinations of devices such as PCs, laptops, PDAs or the like.
- the remote intelligence gathering system 100 may include a processing unit 120 , a database 130 and at least one virtual machine 110 .
- non-virtual machines may be used, independently or in combination with virtual machines.
- the machines are operable to join at least one botnet, and to communicate with at least one criminal server.
- machines are operable to download malicious content from at least one criminal server, and optionally install the malicious content, manually or automatically.
- virtual machines 110 A and 110 B are each infected with at least one bot and are in communication with criminal bot servers 60 A, 60 B. It is noted that according to various embodiments, multiple virtual machines may be provided and operable to join many botnets. Where appropriate individual virtual machines may become members of a plurality of botnets and thereby gather data from more than one criminal server.
- the virtual machines 110 A and 110 B may be operable to communicate with sources of malicious software and deliberately download malware and other types of malicious content, thereby serving as honeypots and potentially joining at least one botnet.
- the machines are further capable of communicating directly or indirectly with a processing unit 120 .
- Processing unit 120 may be configured and operable to analyze malware. and to report communications between the command and control component of a criminal server 60 A, 60 B and the members of the botnet, members such as infected virtual machines 110 A and 110 B.
- a storage unit in the form of database 130 is provided to store the information gathered by the virtual machines 110 A, 110 B.
- the storage unit may be used to store data in various forms, filtered or unfiltered.
- Data forms may be records of raw traffic, bot-traffic patterns indicative of bot-infected assets, classified traffic, filtered traffic or the like.
- traffic may be classified in accordance with ‘client addresses’ representing corporate assets to be protected, ‘bot addresses’ representing criminal servers, known bots, traffic dates, or any other classification scheme optionally defined by a user.
- FIG. 3B illustrating various components of a remote intelligence gathering system 100 and the mode of operation between them.
- a general system includes a data collection system 150 capable of collecting data from a plurality of sources 148 A-F.
- Data collection may make use of accessible elements such as publically available files located on criminal servers, open access logs on servers, sinkholes and the like.
- data collected is analyzed and synthesized to produce bot addresses pertaining to criminal servers controlling botnets.
- a single criminal server may control a plurality of botnets, a collection of servers may control a single botnet, or a combination of servers can control a number of botnets according to various botnet topologies known in the art.
- Virtual machines 110 are then infected with malware according to the data collected by data collection system 150 .
- a classification sub-component 122 of processing unit 120 may be used to classify bots, and the classified bot info may be stored in bot database 130 .
- Researching public domain knowledge may comprise research samples from malware gathered in public web sites and databases.
- Searching may be performed for information to be correlated to organizational assets which are backdoors of the organization, for example using domain name and IP range belonging to the organization.
- organizational assets may be classified into internal assets 106 , external assets 108 and hybrid assets 104 .
- Internal assets include clients within the internal network.
- External assets include customers/partners of the organization, for example customers of a bank, or the like.
- Hybrid assets include enterprise employees working from a remote location.
- Hybrid assets may be identified using heuristics, for example and without limitation according to access type (https communication into the organization
- Malware sensing may be performed by virtual machines or computers infected with the malware. Infection can be performed manually or automatically as required.
- Tracking systems may be installed, possibly in the criminal server, which are capable of following the communication generated from the malware.
- Data may be accessed, possibly using distributed file system tools, such as Apache's Hadoop software framework or the like, as illustrated in FIG. 4 .
- distributed file environment 200 is capable of addressing data collected from sources and techniques, such as but not limited to botnet harvesting 202 , honeypots 204 and malware data 202 .
- the distributed file environment 200 typically supports data-intensive distributed applications and enables applications to work with thousands of nodes and to manage large amounts of data.
- a cluster for example, comprising a master and a plurality of worker nodes may be created for receiving raw data.
- a ‘Research Lab’ may be used to collect data.
- Data collection may include the collecting of computer IPs associated with terminals which communicated with a bot server. In some cases it is possible to retrieve other attributes such as the MAC address of infected computers, if the bot server collects this data.
- the output generated by the malware may be classified, indexed or otherwise organized. Classification may be performed for malware that communicates with a bot management server.
- Lists may be produced of bot management servers with which the malware communicates.
- the list may include the, URLs, domain names or Internet Protocol (IP) addresses of bot management servers, but other attributes such as the threat types being used by the server may also be collected.
- IP Internet Protocol
- IPs/URLs IPs/URLs
- security risk presented by various threats may also be graded.
- Data may be mapped according to queries provided by a customer regarding specific computers in the organization which may be bot targets.
- Data queries may include an information set about the computers.
- the information may include the IP address of the bot target computer, a timestamp of communication with malware server, a Bot server IP address or the like.
- the information set may include a unique identifier of the bot target computer (for example and without limitation a GUID of the machine which includes name of machine), or any other information set components which are capable of providing sufficient criteria for mapping the data collected.
- a unique identifier of the bot target computer for example and without limitation a GUID of the machine which includes name of machine
- any other information set components which are capable of providing sufficient criteria for mapping the data collected.
- the identity of the infected computers may be determined.
- Another data collection technique involves a method of automating sinkhole data collection for example by redirecting of traffic intended for a bot server to a system database.
- the automated sinkhole data collection typically uses a load balanced cluster with high availability.
- the Malware may be used to generate a dynamic or static list of domains. Generation may be performed either with an algorithm or via a configuration file.
- the system automatically identifies the domains, registers them and points them to a Sinkhole server for the data collection.
- FIG. 5 illustrating a bot protection method 300 .
- the method comprises malware coverage 310 as illustrated above, bot servers detection 320 , mitigation 330 and presentation 340 .
- a detection component enables detection 320 of various malware family types, executable files and exploit kits or the like.
- a generic detection API may be provided to organizations.
- the detection component may be configured to perform various functions including but not limited to the following examples. Data gathering may be performed using web sensors crawling over the internet.
- Web sensors may inspect malware samples. For example, web sensors crawling over the internet may review the pages a user is looking at to detect problematic web pages, for example pages which exploit a weakness or download a file to the user's computer. Alternatively or additionally, community based forums may be accessed, such as malwaredomainlist.com or the like. Data may also be gathered by collecting malware from partners and other customers
- Malware network communication with external servers may be recorded and automatically analyzed.
- Malware may be reverse engineered for special capabilities such as communication encryption keys.
- Malware activity may be imitated using external servers in order to get updates or to send false data.
- the probability may be determined that a machine is part of a network's assets or contains employee identities. Probability may be determined, for example, by setting a comparative scoring system. Each score represents the probability of leaked traffic being part of the network's assets or identity.
- scoring may be set between 1-10, wherein 1 stands for the lowest probability and 10 stands for the highest probability.
- the score may be determined by metadata such as:
- Future malicious domains may be predicted before they are registered for cyber criminal activity. For example, malware may incorporate or access a list of domains, IP addressses or the like, which may be registered at some point in the future.
- the detection component 320 may be operable to inspect such lists and alert a user to the future threat imposed by such targets. It will be appreciated that this prediction feature may be used as a superior alternative to zero-day protection.
- the system may further include a Mitigation component 330 , which enables information distribution to the user.
- the mitigation component may be operable to imitate malware activity, scan for suspicious network activity and, alert the user of potentially infected machines, and perform actions such as but not limited to uninstalling malware from infected machines.
- Mitigation may be automatic or manual, according to settings defined by the organization's administrator and/or the administrator of the infected machine.
- malware activity may be imitated allowing unique access to data on drop-zone servers, Command & Control servers, servers hosting exploit kits or the like.
- scanning may be caried out for network activity originating from infected machines within corporate networks and targeting external bot servers.
- the scan is automated.
- the system may further include a presentation component 340 , which enables information to be presented to the user.
- FIGS. 6A-6F Various presentation options are shown in the screenshots of FIGS. 6A-6F .
- dashboard presentation of global and corporate specific information may include elements such as but not limited to a map of malware external servers 602 , lists of top rated threats 610 , and visual representations of online threat statistics, possibly in the form of a pie chart 604 or threat level gauge 606 , threat level graph 608 .
- the statistics may be presented relating to global threats and/or corporate specific threats. Threats may be presented related to corporate specific compromised machines as well as statistics of corporate data
- the lists of top rated threats 610 may present the highest ranked vulnerabilities exploited by cyber criminals, possibly based on exploit kits analysis found on external servers.
- global and corporate threat metrics may be presented visually in a number of ways as will occur to those skilled in the art including, inter alia, charts, bar charts, histograms, tables, pie charts, gauges, graphs and the like.
- the bot protection system and method may further include a configuration component.
- the configuration component allows for effective, quick and substantially simple setup of the system within enterprises. Usability of the configuration and setup components may enable enterprises to benefit from the system within a matter of minutes.
- Basic configuration requires that a supervisor or an administrator provides initial data to the bot protection system.
- the supervisor is defined in the user accounts of the organization.
- Initial data provided to the system typically includes parameters such as but not limited to External IP ranges and Network Interfaces (otherwise known as Web Interfaces).
- external IP ranges the supervisor may indicate a plurality of IP ranges which he considers to be part of his organization whether internally or part of a perimeter network such as a demilitarized zone (DMZ).
- the IP ranges may be indicated in the form of IPv4 addresses, IPv6 addresses, or any other form as suit requirements.
- the IPs can be inserted in different formats such as CIDR, IP Ranges, Net Masks or the like.
- External IP ranges may be deducted automatically from the Internal/DMZ IP ranges that the administrator indicated, or alternatively specified explicitly by the supervisor.
- the supervisor may also indicate IP ranges which are not to be examined by the bot protection system, or IP ranges to be examined with different security levels by the bot protection system.
- the supervisor preferably enters at least one internal and at least one external website name, or other resources that the organization's customers/partners/employees or other relevant parties may browse.
- the supervisor preferably indicates the type of network access, for example and without limitation, internal access, external access, for employee only access, partner only access or the like.
- Interface names may be resolved by a plurality of methods, such as but not limited to domain name server (DNS) lookup.
- DNS domain name server
- Entering data may be performed using standard user interface controls such as text boxes, list boxes, combo-boxes, or any other data insertion method which suits requirements according to the display media used for communicating with the user (for example standard screens, touch or multi-touch screens, appliance keypads, pointing devices, voice activated interfaces or the like).
- the display media may be presented on a local or a remote display unit, such as but not limited to various types of screens such as cathode ray tubes, liquid crystal displays (LCD) displays, light emitting diode (LED) displays, touch screens, plasma displays or the like integrated with remote terminal units, computers, laptops, PDAs, cellular phones or the like.
- LCD liquid crystal displays
- LED light emitting diode
- Displaying data to a user administrator may be used by a display unit integrated with a user's personal device.
- a network administrator may use a central display unit to view and control bot information relevant to a plurality of member assets in the network.
- a bot protecting method 800 for protecting assets from becoming part of a botnet may require that a user or an administrator defines at least one asset which requires botnet protection 810 , processing traffic sent to and from that asset and at least one bot-address pertaining to a criminal server 820 , and identifying at least one bot attack pertaining to the asset 840 .
- Defining the asset may involve defining at least one IP range 812 and/or defining a network interface representing the asset 814 .
- the method may further involve collecting potential bot data 830 .
- Collecting bot data may comprise exposing at least one honeypot asset having at least one honeypot address to botnet traffic 832 .
- the honeypot asset may be a virtual machine. Traffic from the honeypot asset to the criminal server will be referred to herein as honeypot traffic.
- the honeypot traffic may be monitored 834 . Patterns may be synthesized and identified from the honeypot traffic, the patterns typically indicative of bot-infected assets 836 .
- the traffic can later be classified 842 into classified-traffic, optionally according to asset addresses, traffic dates, known patterns or any other classification scheme or combination of classification schemes which suits requirements.
- the classified data may then be used to identify bot attacks pertaining to compromised assets selected from the assets defined by a user or an administrator as assets requiring botnet protection.
- bot attacks are displayed to the user 850 .
- the attacks are optionally classified in the display according to specific assets or asset groups.
- Bot attacks may be mitigated 860 automatically or manually, preferably according to administrators' preferences. Mitigation may comprise deleting malware from bot-infected assets by un-installing programs, deleting files and registry keys, or any other mitigation action.
- the method as defined herein may be used as a futuristic detection and protection method superior even to zero-day attacks recognition.
- the analysis performed on the traffic may be used to identify potential attacks yet to be executed by criminal servers.
- the criminal servers may be in a latent state, but the analysis of traffic may identify them before they launch their attacks.
- the method includes connecting to a remote intelligence gathering system 910 , sending a query to the intelligence gathering system 920 , the query relating to characteristics of the client network, receiving intelligence from the intelligence gathering system pertaining to the characteristics of the client network 930 , and optionally acting on the received intelligence 940 .
- Such the intelligence gathered and presented by the system may include a variety of data relating to threats and vulnerabilities such as current and future IP addresses of the criminal server, current and future URLs of the criminal server, current and future domain names used by the criminal server, geographical locations of the security threat; frequencies and identities of vulnerabilities exploited by the malicious software, time stamps and such like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- The present invention relates to internet security. In particular the invention relates to protecting computers and networks from becoming part of a botnet.
- Internet security is challenging, and the types of threats computers are exposed to are rapidly increasing. Software infecting computers is commonly known as malware. Malware types include examples such as worms, bankers, proxy, DDoS, password stealers, fake anti-virus, spammers, downloaders and the like.
- The term ‘worms’ is given to self-replicating malware which uses a computer network to send copies of itself to other computers on the network. The term ‘bankers’ is given to malware which steals banking information.
- The term ‘proxy’ is given to malware which sets the infected computer as a proxy between other computers (for example as used for Fast Flux and the like). The term ‘DoS’ is given to malware which is used for Denial-of-Service attack against websites or networks.
- The term ‘password stealers’ is given to malware which steals any type of information.
- The term ‘Fake Anti-Virus’ is given to malware which misleads users into paying for a fake removal of malware.
- The term ‘Spammers’ is given to malware which uses an infected computer to send spam emails.
- The term ‘Downloaders’ is given to malware which downloads other malware to an infected computer.
- Malware types may be differentiated according to criteria such as self-distribution, point of control, data stealing, level of protection and the like. The self-distribution is the capability of the malware to spread itself to other computers. Point of control refers to the capability of the malware to be controlled by a central remove server, for example its vulnerability to receiving commands, sending information, automatic updating and the like. Data stealing refers to the capability of the malware to send information from the computer to a remote server.
- The level of protection of malware refers to the systems put into place by the malware author in order to decrease detection by end point security products, such as anti-virus software, malware detection software, and the like, and gateway protection software, such as firewalls and the like. For example, some malware is designed to be polymorphic, for example changing executable signature, while maintaining the malware payload. Some malware may use encryption of the network communication between the malware and a drop zone at a criminal server.
- Cyber criminals use different methods to infect machines with malware. Examples include the social engineering, exploitation of specific vulnerabilities, use of exploit kits, distribution of email attachment and the like.
- Social engineering is one method for deceiving users into downloading malware. In one example a website which offers to show a video. In in order to view the video the user is required to download software purporting to be an update for commonly used software such as Adobe Flash or the like. In reality the update is an executable file installing malware onto the host.
- Specific vulnerability may be identified and exploited, certain malicious webpages, for example, exploit known vulnerabilities of a browser, application or operating system in order to install the malware surreptitiously.
- Exploit kits are a collections of exploits traded in the underground, and used by cyber criminals to increase the probability of installing the malware surreptitiously.
- Email attachments are often used to distribute malware to unsuspecting recipients. For example, executable files may be attached to spam email or email purporting to be from a member of the user's contact list. A botnet generally comprises a set of malware infected computers, or bots, all connected to a common criminal sever, also known as a bot server, or a bot server set comprising a plurality of bot servers. The bot server or bot server set may include a command and control module, which is able to control all the infected computers, an update module which updates the malware code in the infected computers, and a drop zone for collecting data received from the infected computers.
- It is according to one aspect of the current disclosure to present a system for protecting at least one client from becoming part of at least one botnet. The client may have at least one client address, and the botnet may be controlled by at least one criminal server having at least one bot address. The botnet may be operable to communicate data between the at least one client address and the at least one bot address. The system may comprise at least one processing unit, the processing unit configured to classify the data into indexed data and to filter the indexed data into filtered data pertaining to data queries; at least one storage unit configured to store the indexed data; and at least one communication unit configured to receive the data queries and send filtered data pertaining to the data queries.
- Variously, the at least one client address and the at least one bot address may be selected from a group of formats consisting of: IP addresses, IPv4 addresses, IPv6 addresses, MAC addresses, Virtual IP addresses representing load-balanced clusters, domain name mappings, host names, domain controllers and combinations thereof.
- Where appropriate, the at least one data collection system may be configured to collect the bot addresses from a plurality of sources. For example, the plurality of sources may be selected from a group consisting of: data sent from the at least one client address to the at least one bot address, data sent from the at least one bot address to the at least one client address, malware sensors, public domain knowledge, publically available files located on criminal servers, open access logs on servers, sinkholes, sandboxes, intrusion detection systems, intrusion prevention systems, anti-virus logs, firewall logs, data leakage prevention systems, operating system logs, URL filtering systems, security information, event management systems and combinations thereof.
- Accordingly, the data collection system may comprise at least one machine operable to join at least one botnet. Optionally, the at least one machine is a virtual machine. The machine may be operable to communicate with the at least one criminal server. Furthermore, the machine may be operable to download malicious content from the at least one criminal server. Moreover, the machine may be operable to communicate with the at least one processing unit. Alternatively or additionally, the machine may be operable to send the malicious content to the at least one processing unit.
- Where required, the machine may be operable to receive machine-specific-data-queries and to analyse the malicious content. Accordingly, the machine may be operable to classify the malicious content into machine-specific-indexed-data and filter the machine-specific-indexed-data into machine-specific-filtered-data pertaining to the machine-specific-data-queries. In some embodiments, the machine may be capable of storing machine-specific-indexed-data in the storage unit.
- Where appropriate, the machine further comprises a recording unit operable to record communication between at least one client address and the at least one bot address. Optionally, the system may further comprise at least one display unit configured to display the filtered data pertaining to the data queries.
- According to another aspect of the disclosure a method is taught for protecting at least one asset from becoming part of at least one botnet, the asset having at least one client address and the botnet being controlled by at least one criminal server having at least one bot address, the botnet operable to communicate data between the at least one client address and the at least one bot address. The method may comprise: defining at least one asset which requires botnet protection, the asset having at least one asset address; processing traffic sent to and from the at least one asset address and the at least one bot address; and identifying at least one bot attack pertaining to the at least one asset.
- Defining the at least one asset may comprise defining at least one IP range representing the asset. Alternatively or additionally, defining the at least one asset may comprise defining at least one network interface representing the asset.
- Optionally the method further comprises collecting potential bot data. Optionally, collecting potential bot data comprises: exposing at least one honeypot asset having at least one honeypot address to a the traffic; monitoring honeypot-traffic, the honeypot-traffic traveling between the at least one honeypot address and the at least one bot address; and identifying bot-traffic patterns from the honeypot-traffic, the bot-traffic patterns indicative of at least one bot-infected asset.
- Where appropriate, processing traffic sent to and from the at least one asset address and the at least one bot address may comprise: classifying the traffic into classified-traffic, the classifying performed according to the at least one IP range representing the at least one asset and according to the bot-traffic patterns.
- In some embodiments, identifying the at least one bot attack pertaining to the asset comprises filtering the classified-traffic according to the at least one asset address.
- Optionally, the method may further comprise displaying the at least one bot attack pertaining to the at least one asset. Furthermore, the method may further comprise mitigating the at least one bot attack.
- Still another aspect of the disclosure is to teach a method for protecting at least one client network from security threats. The method may comprise connecting to a remote intelligence gathering system, the system comprising at least one database and at least one virtual machine connected to a computer network, the virtual machine operable to communicate with at least one criminal server, to download at least one malicious software program, to analyse the malicious software, to store data pertaining to the malicious software, and to index the data in the database; sending a query to the intelligence gathering system, the query relating to characteristics of the client network; and receiving intelligence from the intelligence gathering system pertaining to the characteristics of the client network.
- Optionally, the virtual machine is operable to join at least one botnet. As required, the virtual machine may be operable to record communication between the at least one botnet and the at least one criminal server.
- Such an intelligence gathering system may be operable to identify at least one future domain name used by the criminal server, register the domain name, record data sent to the domain name from other members of the botnet. Optionally, the virtual machine is further operable to identify other members of the botnet Variously, collected intelligence may comprise at least one item selected from: at least one current IP address of the criminal server, at least one future IP address of the criminal server, at least one current URL of the criminal server, at least one future URL of the criminal server, at least one current domain name of the criminal server, at least one future domain name of the criminal server, at least one geographical location of the security threat; at least one vulnerability exploited by the malicious software, time stamps and combinations thereof.
- Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Although methods and materials similar or equivalent to those described herein can be used in the practice or testing of the present invention, suitable methods and materials are described below. In case of conflict, the patent specification, including definitions, will control. In addition, the materials, methods, and examples are illustrative only and not intended to be limiting.
- For a better understanding of the invention and to show how it may be carried into effect, reference will now be made, purely by way of example, to the accompanying drawings.
- With specific reference now to the drawing in detail, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of the preferred embodiments of the present invention only, and are presented in the cause of providing what is believed to be the most useful and readily understood description of the principles and conceptual aspects of the invention. In this regard, no attempt is made to show structural details of the invention in more detail than is necessary for a fundamental understanding of the invention; the description taken with the drawing making apparent to those skilled in the art how the several forms of the invention may be embodied in practice. In discussion of the various figures described herein below, like numbers refer to like parts. The drawings are generally not to scale.
- In the accompanying drawings:
-
FIG. 1 represents an example of a prior art network topology; -
FIG. 2 represents a block diagram representing a typical botnet as known in the art; -
FIGS. 3A and 3B are block diagrams representing selected components of a bot protection system; -
FIG. 4 represents the components of distributed file environment; -
FIG. 5 represents the steps in a bot protection method; -
FIGS. 6A-F represent presentation options as screenshots in accordance with embodiment of the present disclosure; -
FIG. 7 is a table representing examples of web interface settings which can be entered by a supervisor; -
FIG. 8 is a flowchart representing the main processes in a method for protecting assets from becoming part of a botnet; and -
FIG. 9 is a flowchart representing the main processes in a method for protecting at least one client network from security threats. - Various embodiments of a bot protection system and method are disclosed hereinbelow. The system includes cyber threat management services which are capable for minimizing business risks by providing real time detection of cybercrime events. The system is configured to gather and analyze intelligence from multiple sources, identify malicious content, hostile servers and botnets. The system is further capable of pin-pointing corporate specific attacks, alerting a user to specific personal or organizational assets that may be compromised, and potentially removing malicious content from infected assets. Using the system, users, such as network administrators and the like, may be capable of protecting or sealing a domain against cyber penetration and leakage. Furthermore users may be able to identify cyber adversaries in real time and gain accurate visibility to compromised assets.
- In contradistinction to other malware protection systems known in the art, no software or hardware installations or network configuration changes are required upon any computers or other devices within the protected organization.
- The system may be capable of providing extensive coverage of many malware family types, regardless of their characteristics and methods of infection.
- Assets may be referred to herein as ‘clients’ and are typically defined by at least one ‘client address’. Criminal servers are also typically defined by at least one ‘bot address’. In preferred embodiments, a ‘client address’ or a ‘bot address’ is an IP address (such as IPv4 or IPv6). MAC addresses, Virtual IP addresses representing elements such as load balanced clusters, domain name mappings or the like may also be used as client addresses or bot addresses.
- It will be demonstrated hereinbelow, that ‘client addresses’ are typically defined by a supervisor or an administrator of an asset or a group of assets, for example a domain administrator. ‘bot addresses’ are addresses pertaining to at least one criminal server located in a networks such as public or private networks, the bot addresses accessible directly or indirectly by clients and assets in the same network or in other networks.
- Reference is now made to
FIG. 1 showing a typical network topology as known in the art. Aprivate network 10 comprises a plurality of client computers 12A-E having acommon gateway 20 to apublic network 30 such as but not limited to the internet. It is noted that where required thegateway 20 may which may also serve as a firewall. Thepublic network 30 comprises a plurality of servers, forexample web servers bot servers - The public network, such as the internet or ‘the Web’, may be accessed by many different clients. The public network may contain servers such as innocent content servers and malicious bot servers. Content servers such as but not limited to commonly used domains CBS.com and USAToday.com, may provide content accessible by other computers connected to the public network either directly or through a network gateway. Criminal servers, such as bot servers, may exploit the public network to gain access to client computers optionally residing in public, private and protected networks.
- The
firewall 20 may be used to protect theprivate network 10 from attack. It is noted however that known firewall applications typically require on-site installation of hardware and/or software within the private network or on the network edge. Furthermore, the client computers of the private network may be portable computers or the like which may be used in multiple environments including environments unprotected by firewalls and the like. - Reference is made to the block diagram of
FIG. 2 representing atypical botnet 50 as known in the art. In this embodiment,botnet 50 comprises a plurality ofinfected computers bot server 60 comprising a command andcontrol component 62, abot update component 64 and adrop zone 66. - Reference is made to
FIG. 3A illustrating abasic embodiment 100 of the bot protection system and method. - A user, such as a network manager may communicate with a remote
intelligence gathering system 100. The user may send queries relating to various characteristics of theclient network 10 to the network manager and receive therefrom information relating to possible threats to the security of computers in aclient network 10. - In this embodiment,
client network 10 is shown having onehybrid asset 104,internal assets external assets - The remote
intelligence gathering system 100 may include aprocessing unit 120, adatabase 130 and at least onevirtual machine 110. Alternatively, non-virtual machines may be used, independently or in combination with virtual machines. The machines are operable to join at least one botnet, and to communicate with at least one criminal server. Preferably, machines are operable to download malicious content from at least one criminal server, and optionally install the malicious content, manually or automatically. - In this embodiment,
virtual machines criminal bot servers - The
virtual machines processing unit 120.Processing unit 120 may be configured and operable to analyze malware. and to report communications between the command and control component of acriminal server virtual machines - A storage unit in the form of
database 130 is provided to store the information gathered by thevirtual machines - Reference is made to the schematic diagram of
FIG. 3B , illustrating various components of a remoteintelligence gathering system 100 and the mode of operation between them. - A general system includes a
data collection system 150 capable of collecting data from a plurality ofsources 148A-F. Data collection may make use of accessible elements such as publically available files located on criminal servers, open access logs on servers, sinkholes and the like. In preferred embodiments, data collected is analyzed and synthesized to produce bot addresses pertaining to criminal servers controlling botnets. A single criminal server may control a plurality of botnets, a collection of servers may control a single botnet, or a combination of servers can control a number of botnets according to various botnet topologies known in the art. -
Virtual machines 110 are then infected with malware according to the data collected bydata collection system 150. Aclassification sub-component 122 ofprocessing unit 120 may be used to classify bots, and the classified bot info may be stored inbot database 130. - Various techniques may be used such as described below.
- Researching public domain knowledge may comprise research samples from malware gathered in public web sites and databases.
- Searching may be performed for information to be correlated to organizational assets which are backdoors of the organization, for example using domain name and IP range belonging to the organization.
- Referring back to
FIG. 3A , organizational assets may be classified into internal assets 106, external assets 108 andhybrid assets 104. Internal assets include clients within the internal network. External assets include customers/partners of the organization, for example customers of a bank, or the like. Hybrid assets include enterprise employees working from a remote location. Hybrid assets may be identified using heuristics, for example and without limitation according to access type (https communication into the organization - Malware sensing may be performed by virtual machines or computers infected with the malware. Infection can be performed manually or automatically as required.
- Tracking systems may be installed, possibly in the criminal server, which are capable of following the communication generated from the malware.
- Data may be accessed, possibly using distributed file system tools, such as Apache's Hadoop software framework or the like, as illustrated in
FIG. 4 . In this embodiment, distributedfile environment 200 is capable of addressing data collected from sources and techniques, such as but not limited tobotnet harvesting 202,honeypots 204 andmalware data 202. The distributedfile environment 200 typically supports data-intensive distributed applications and enables applications to work with thousands of nodes and to manage large amounts of data. A cluster, for example, comprising a master and a plurality of worker nodes may be created for receiving raw data. - A ‘Research Lab’ may be used to collect data. Data collection may include the collecting of computer IPs associated with terminals which communicated with a bot server. In some cases it is possible to retrieve other attributes such as the MAC address of infected computers, if the bot server collects this data.
- The output generated by the malware may be classified, indexed or otherwise organized. Classification may be performed for malware that communicates with a bot management server.
- Lists may be produced of bot management servers with which the malware communicates. The list may include the, URLs, domain names or Internet Protocol (IP) addresses of bot management servers, but other attributes such as the threat types being used by the server may also be collected.
- Data collected in the Research lab may be analyzed. Such analysis may result in identification of bot servers (IPs/URLs) and identification of infected clients communicating with the bot servers. Furthermore, the security risk presented by various threats may also be graded.
- Data may be mapped according to queries provided by a customer regarding specific computers in the organization which may be bot targets. Data queries may include an information set about the computers. The information may include the IP address of the bot target computer, a timestamp of communication with malware server, a Bot server IP address or the like.
- Alternatively, the information set may include a unique identifier of the bot target computer (for example and without limitation a GUID of the machine which includes name of machine), or any other information set components which are capable of providing sufficient criteria for mapping the data collected.
- It is noted that using the data collected, the identity of the infected computers may be determined.
- Another data collection technique involves a method of automating sinkhole data collection for example by redirecting of traffic intended for a bot server to a system database. The automated sinkhole data collection typically uses a load balanced cluster with high availability.
- The Malware may be used to generate a dynamic or static list of domains. Generation may be performed either with an algorithm or via a configuration file. The system automatically identifies the domains, registers them and points them to a Sinkhole server for the data collection.
- Reference is now made to
FIG. 5 illustrating abot protection method 300. The method comprisesmalware coverage 310 as illustrated above,bot servers detection 320,mitigation 330 andpresentation 340. - A detection component enables
detection 320 of various malware family types, executable files and exploit kits or the like. In some cases, a generic detection API may be provided to organizations. Amongst others, the detection component may be configured to perform various functions including but not limited to the following examples. Data gathering may be performed using web sensors crawling over the internet. - Web sensors may inspect malware samples. For example, web sensors crawling over the internet may review the pages a user is looking at to detect problematic web pages, for example pages which exploit a weakness or download a file to the user's computer. Alternatively or additionally, community based forums may be accessed, such as malwaredomainlist.com or the like. Data may also be gathered by collecting malware from partners and other customers
- Multiple virtual environments may be created to be deliberately infected by the malware
- Malware network communication with external servers may be recorded and automatically analyzed.
- Malware may be reverse engineered for special capabilities such as communication encryption keys.
- Malware activity may be imitated using external servers in order to get updates or to send false data.
- The probability may be determined that a machine is part of a network's assets or contains employee identities. Probability may be determined, for example, by setting a comparative scoring system. Each score represents the probability of leaked traffic being part of the network's assets or identity.
- In some embodiments, scoring may be set between 1-10, wherein 1 stands for the lowest probability and 10 stands for the highest probability. The score may be determined by metadata such as:
-
- Visited host (per domain type): External, Internal
- Domain Controller Name
- Posted Data Such as Email address
- Protected Storage such as Cookies within Corporate IP address
- Future malicious domains may be predicted before they are registered for cyber criminal activity. For example, malware may incorporate or access a list of domains, IP addressses or the like, which may be registered at some point in the future. The
detection component 320 may be operable to inspect such lists and alert a user to the future threat imposed by such targets. It will be appreciated that this prediction feature may be used as a superior alternative to zero-day protection. - The system may further include a
Mitigation component 330, which enables information distribution to the user. The mitigation component may be operable to imitate malware activity, scan for suspicious network activity and, alert the user of potentially infected machines, and perform actions such as but not limited to uninstalling malware from infected machines. Mitigation may be automatic or manual, according to settings defined by the organization's administrator and/or the administrator of the infected machine. - It is noted that malware activity may be imitated allowing unique access to data on drop-zone servers, Command & Control servers, servers hosting exploit kits or the like.
- Furthermore, scanning may be caried out for network activity originating from infected machines within corporate networks and targeting external bot servers. In preferred embodiments, the scan is automated.
- The system may further include a
presentation component 340, which enables information to be presented to the user. - Various presentation options are shown in the screenshots of
FIGS. 6A-6F . - Referring particularly to the screenshot of
FIG. 6F , dashboard presentation of global and corporate specific information, may include elements such as but not limited to a map of malwareexternal servers 602, lists of top ratedthreats 610, and visual representations of online threat statistics, possibly in the form of apie chart 604 orthreat level gauge 606,threat level graph 608. - It is particularly noted that the statistics may be presented relating to global threats and/or corporate specific threats. Threats may be presented related to corporate specific compromised machines as well as statistics of corporate data
- The lists of top rated
threats 610, for example may present the highest ranked vulnerabilities exploited by cyber criminals, possibly based on exploit kits analysis found on external servers. - As noted, global and corporate threat metrics according to the current and over time threat level may be presented visually in a number of ways as will occur to those skilled in the art including, inter alia, charts, bar charts, histograms, tables, pie charts, gauges, graphs and the like.
- The bot protection system and method may further include a configuration component. In some embodiments, the configuration component allows for effective, quick and substantially simple setup of the system within enterprises. Usability of the configuration and setup components may enable enterprises to benefit from the system within a matter of minutes.
- Basic configuration requires that a supervisor or an administrator provides initial data to the bot protection system. In some embodiments for organizations such as but not limited to medium and large corporates, the supervisor is defined in the user accounts of the organization.
- Initial data provided to the system typically includes parameters such as but not limited to External IP ranges and Network Interfaces (otherwise known as Web Interfaces). With regard to external IP ranges—the supervisor may indicate a plurality of IP ranges which he considers to be part of his organization whether internally or part of a perimeter network such as a demilitarized zone (DMZ). The IP ranges may be indicated in the form of IPv4 addresses, IPv6 addresses, or any other form as suit requirements. The IPs can be inserted in different formats such as CIDR, IP Ranges, Net Masks or the like. External IP ranges may be deducted automatically from the Internal/DMZ IP ranges that the administrator indicated, or alternatively specified explicitly by the supervisor. The supervisor may also indicate IP ranges which are not to be examined by the bot protection system, or IP ranges to be examined with different security levels by the bot protection system.
- With regard to network interfaces, the supervisor preferably enters at least one internal and at least one external website name, or other resources that the organization's customers/partners/employees or other relevant parties may browse. In order to access corporate resources over a public network, for example and without limitation, by means of VPN, the supervisor preferably indicates the type of network access, for example and without limitation, internal access, external access, for employee only access, partner only access or the like. Interface names may be resolved by a plurality of methods, such as but not limited to domain name server (DNS) lookup.
- Some web access examples are demonstrated in the table of
FIG. 7 . The examples listed in the table refer to terminology known in the art. It should be noted, however, that the options presented in the table are for demonstration only, and should not be regarded as limiting. - Entering data may be performed using standard user interface controls such as text boxes, list boxes, combo-boxes, or any other data insertion method which suits requirements according to the display media used for communicating with the user (for example standard screens, touch or multi-touch screens, appliance keypads, pointing devices, voice activated interfaces or the like). The display media may be presented on a local or a remote display unit, such as but not limited to various types of screens such as cathode ray tubes, liquid crystal displays (LCD) displays, light emitting diode (LED) displays, touch screens, plasma displays or the like integrated with remote terminal units, computers, laptops, PDAs, cellular phones or the like.
- Displaying data to a user administrator may be used by a display unit integrated with a user's personal device. A network administrator may use a central display unit to view and control bot information relevant to a plurality of member assets in the network.
- Referring now to the flowchart of
FIG. 8 , abot protecting method 800 for protecting assets from becoming part of a botnet may require that a user or an administrator defines at least one asset which requiresbotnet protection 810, processing traffic sent to and from that asset and at least one bot-address pertaining to acriminal server 820, and identifying at least one bot attack pertaining to theasset 840. Defining the asset may involve defining at least oneIP range 812 and/or defining a network interface representing theasset 814. - The method may further involve collecting
potential bot data 830. Collecting bot data may comprise exposing at least one honeypot asset having at least one honeypot address tobotnet traffic 832. The honeypot asset may be a virtual machine. Traffic from the honeypot asset to the criminal server will be referred to herein as honeypot traffic. - The honeypot traffic may be monitored 834. Patterns may be synthesized and identified from the honeypot traffic, the patterns typically indicative of bot-infected
assets 836. The traffic can later be classified 842 into classified-traffic, optionally according to asset addresses, traffic dates, known patterns or any other classification scheme or combination of classification schemes which suits requirements. - The classified data may then be used to identify bot attacks pertaining to compromised assets selected from the assets defined by a user or an administrator as assets requiring botnet protection. Optionally, bot attacks are displayed to the
user 850. The attacks are optionally classified in the display according to specific assets or asset groups. Bot attacks may be mitigated 860 automatically or manually, preferably according to administrators' preferences. Mitigation may comprise deleting malware from bot-infected assets by un-installing programs, deleting files and registry keys, or any other mitigation action. - The method as defined herein may be used as a futuristic detection and protection method superior even to zero-day attacks recognition. The analysis performed on the traffic may be used to identify potential attacks yet to be executed by criminal servers. The criminal servers may be in a latent state, but the analysis of traffic may identify them before they launch their attacks.
- Reference is now made to the flowchart of
FIG. 9 representing the main methods of a method for protecting at least one client network fromsecurity threats 900. The method includes connecting to a remoteintelligence gathering system 910, sending a query to theintelligence gathering system 920, the query relating to characteristics of the client network, receiving intelligence from the intelligence gathering system pertaining to the characteristics of theclient network 930, and optionally acting on the receivedintelligence 940. - Such the intelligence gathered and presented by the system may include a variety of data relating to threats and vulnerabilities such as current and future IP addresses of the criminal server, current and future URLs of the criminal server, current and future domain names used by the criminal server, geographical locations of the security threat; frequencies and identities of vulnerabilities exploited by the malicious software, time stamps and such like.
- Thus the disclosure hereinabove presents various methods and systems which may be used to protect networks against cyber threats, particularly from criminal servers, botnets and the like. The scope of the present invention is defined by the appended claims and includes both combinations and sub combinations of the various features described hereinabove as well as variations and modifications thereof, which would occur to persons skilled in the art upon reading the foregoing description.
- In the claims, the word “comprise”, and variations thereof such as “comprises”, “comprising” and the like indicate that the components listed are included, but not generally to the exclusion of other components.
Claims (30)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/810,450 US9270690B2 (en) | 2010-07-21 | 2011-07-21 | Network protection system and method |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US36616810P | 2010-07-21 | 2010-07-21 | |
US41100610P | 2010-11-08 | 2010-11-08 | |
US201161482223P | 2011-05-04 | 2011-05-04 | |
US13/810,450 US9270690B2 (en) | 2010-07-21 | 2011-07-21 | Network protection system and method |
PCT/IB2011/053253 WO2012011070A1 (en) | 2010-07-21 | 2011-07-21 | Network protection system and method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2011/053253 A-371-Of-International WO2012011070A1 (en) | 2010-07-21 | 2011-07-21 | Network protection system and method |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/738,959 Continuation-In-Part US10397246B2 (en) | 2010-07-21 | 2015-06-15 | System and methods for malware detection using log based crowdsourcing analysis |
US14/991,957 Continuation US9641550B2 (en) | 2010-07-21 | 2016-01-10 | Network protection system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
US20130133072A1 true US20130133072A1 (en) | 2013-05-23 |
US9270690B2 US9270690B2 (en) | 2016-02-23 |
Family
ID=45496579
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/810,450 Active 2031-11-18 US9270690B2 (en) | 2010-07-21 | 2011-07-21 | Network protection system and method |
US14/991,957 Active US9641550B2 (en) | 2010-07-21 | 2016-01-10 | Network protection system and method |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/991,957 Active US9641550B2 (en) | 2010-07-21 | 2016-01-10 | Network protection system and method |
Country Status (2)
Country | Link |
---|---|
US (2) | US9270690B2 (en) |
WO (1) | WO2012011070A1 (en) |
Cited By (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140344931A1 (en) * | 2013-05-17 | 2014-11-20 | Arbor Networks, Inc. | Systems and methods for extracting cryptographic keys from malware |
US20150154043A1 (en) * | 2012-02-27 | 2015-06-04 | Ca, Inc. | System and method for isolated virtual image and appliance communication within a cloud environment |
US20150186645A1 (en) * | 2013-12-26 | 2015-07-02 | Fireeye, Inc. | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits |
US20150207812A1 (en) * | 2014-01-17 | 2015-07-23 | Gregory Thomas BACK | Systems and methods for identifying and performing an action in response to identified malicious network traffic |
US9092782B1 (en) * | 2012-06-29 | 2015-07-28 | Emc Corporation | Methods and apparatus for risk evaluation of compromised credentials |
WO2015171789A1 (en) * | 2014-05-07 | 2015-11-12 | Attivo Networks Inc. | Emulating shellcode attacks |
US20160080414A1 (en) * | 2014-09-12 | 2016-03-17 | Topspin Security Ltd. | System and a Method for Identifying Malware Network Activity Using a Decoy Environment |
US9356942B1 (en) * | 2012-03-05 | 2016-05-31 | Neustar, Inc. | Method and system for detecting network compromise |
US9459987B2 (en) | 2014-03-31 | 2016-10-04 | Intuit Inc. | Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems |
US9473481B2 (en) | 2014-07-31 | 2016-10-18 | Intuit Inc. | Method and system for providing a virtual asset perimeter |
US9501345B1 (en) | 2013-12-23 | 2016-11-22 | Intuit Inc. | Method and system for creating enriched log data |
US9516051B1 (en) | 2015-05-14 | 2016-12-06 | International Business Machines Corporation | Detecting web exploit kits by tree-based structural similarity search |
US9516064B2 (en) * | 2013-10-14 | 2016-12-06 | Intuit Inc. | Method and system for dynamic and comprehensive vulnerability management |
US20170006054A1 (en) * | 2015-06-30 | 2017-01-05 | Norse Networks, Inc. | Systems and platforms for intelligently monitoring risky network activities |
US9553888B2 (en) | 2011-07-15 | 2017-01-24 | Norse Networks, Inc. | Systems and methods for dynamic protection from electronic attacks |
US20170054754A1 (en) * | 2013-09-11 | 2017-02-23 | NSS Labs, Inc. | Malware and exploit campaign detection system and method |
US9596321B2 (en) | 2015-06-24 | 2017-03-14 | Cisco Technology, Inc. | Server grouping system |
US9596251B2 (en) | 2014-04-07 | 2017-03-14 | Intuit Inc. | Method and system for providing security aware applications |
JP2017068776A (en) * | 2015-10-02 | 2017-04-06 | 富士通株式会社 | Communication control device, communication control method, and communication control program |
US20170111391A1 (en) * | 2015-10-15 | 2017-04-20 | International Business Machines Corporation | Enhanced intrusion prevention system |
US9686301B2 (en) | 2014-02-03 | 2017-06-20 | Intuit Inc. | Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud computing environment |
US9712520B1 (en) | 2015-06-23 | 2017-07-18 | Amazon Technologies, Inc. | User authentication using client-side browse history |
US9742794B2 (en) | 2014-05-27 | 2017-08-22 | Intuit Inc. | Method and apparatus for automating threat model generation and pattern identification |
US9866581B2 (en) | 2014-06-30 | 2018-01-09 | Intuit Inc. | Method and system for secure delivery of information to computing environments |
USD810775S1 (en) | 2015-04-21 | 2018-02-20 | Norse Networks, Inc. | Computer display panel with a graphical live electronic threat intelligence visualization interface |
US9900322B2 (en) | 2014-04-30 | 2018-02-20 | Intuit Inc. | Method and system for providing permissions management |
US9923913B2 (en) * | 2013-06-04 | 2018-03-20 | Verint Systems Ltd. | System and method for malware detection learning |
US9923909B2 (en) | 2014-02-03 | 2018-03-20 | Intuit Inc. | System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment |
USD814494S1 (en) | 2015-03-02 | 2018-04-03 | Norse Networks, Inc. | Computer display panel with an icon image of a live electronic threat intelligence visualization interface |
US9942250B2 (en) | 2014-08-06 | 2018-04-10 | Norse Networks, Inc. | Network appliance for dynamic protection from risky network activities |
US10061922B2 (en) | 2012-04-30 | 2018-08-28 | Verint Systems Ltd. | System and method for malware detection |
US10079857B2 (en) * | 2013-12-23 | 2018-09-18 | Orange | Method of slowing down a communication in a network |
US10091222B1 (en) * | 2015-03-31 | 2018-10-02 | Juniper Networks, Inc. | Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs |
US10097570B2 (en) * | 2016-04-26 | 2018-10-09 | Seculayer Co., Ltd. | Method for detecting real-time event and server using the same |
US10102082B2 (en) | 2014-07-31 | 2018-10-16 | Intuit Inc. | Method and system for providing automated self-healing virtual assets |
US10182046B1 (en) * | 2015-06-23 | 2019-01-15 | Amazon Technologies, Inc. | Detecting a network crawler |
US10193924B2 (en) * | 2014-09-17 | 2019-01-29 | Acalvio Technologies, Inc. | Network intrusion diversion using a software defined network |
US10243957B1 (en) * | 2015-08-27 | 2019-03-26 | Amazon Technologies, Inc. | Preventing leakage of cookie data |
US10257226B2 (en) | 2016-03-24 | 2019-04-09 | 802 Secure, Inc. | Identifying and trapping wireless based attacks on networks using deceptive network emulation |
US10290022B1 (en) | 2015-06-23 | 2019-05-14 | Amazon Technologies, Inc. | Targeting content based on user characteristics |
US10404472B2 (en) | 2016-05-05 | 2019-09-03 | Neustar, Inc. | Systems and methods for enabling trusted communications between entities |
US10432650B2 (en) | 2016-03-31 | 2019-10-01 | Stuart Staniford | System and method to protect a webserver against application exploits and attacks |
US10757135B2 (en) * | 2016-10-25 | 2020-08-25 | Huawei Technologies Co., Ltd. | Bot characteristic detection method and apparatus |
US10757133B2 (en) | 2014-02-21 | 2020-08-25 | Intuit Inc. | Method and system for creating and deploying virtual assets |
US20200287915A1 (en) * | 2019-03-04 | 2020-09-10 | Microsoft Technology Licensing, Llc | Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform |
US10791128B2 (en) * | 2017-09-28 | 2020-09-29 | Microsoft Technology Licensing, Llc | Intrusion detection |
US10929878B2 (en) * | 2018-10-19 | 2021-02-23 | International Business Machines Corporation | Targeted content identification and tracing |
US10958725B2 (en) | 2016-05-05 | 2021-03-23 | Neustar, Inc. | Systems and methods for distributing partial data to subnetworks |
US20210092142A1 (en) * | 2016-02-25 | 2021-03-25 | Imperva, Inc. | Techniques for targeted botnet protection |
US11025428B2 (en) | 2016-05-05 | 2021-06-01 | Neustar, Inc. | Systems and methods for enabling trusted communications between controllers |
US11108562B2 (en) | 2016-05-05 | 2021-08-31 | Neustar, Inc. | Systems and methods for verifying a route taken by a communication |
US11277439B2 (en) | 2016-05-05 | 2022-03-15 | Neustar, Inc. | Systems and methods for mitigating and/or preventing distributed denial-of-service attacks |
US11294700B2 (en) | 2014-04-18 | 2022-04-05 | Intuit Inc. | Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets |
US11349856B2 (en) * | 2019-01-30 | 2022-05-31 | International Business Machines Corporation | Exploit kit detection |
US11580218B2 (en) | 2019-05-20 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
US11579857B2 (en) | 2020-12-16 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach |
US11616812B2 (en) | 2016-12-19 | 2023-03-28 | Attivo Networks Inc. | Deceiving attackers accessing active directory data |
US11625485B2 (en) | 2014-08-11 | 2023-04-11 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
US11687653B2 (en) * | 2012-05-09 | 2023-06-27 | SunStone Information Defense, Inc. | Methods and apparatus for identifying and removing malicious applications |
US11695800B2 (en) | 2016-12-19 | 2023-07-04 | SentinelOne, Inc. | Deceiving attackers accessing network data |
US11716342B2 (en) | 2017-08-08 | 2023-08-01 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US11886591B2 (en) | 2014-08-11 | 2024-01-30 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
US11888897B2 (en) | 2018-02-09 | 2024-01-30 | SentinelOne, Inc. | Implementing decoys in a network environment |
US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI592821B (en) | 2012-06-07 | 2017-07-21 | 普波因特股份有限公司 | Method for providing threat dashboard and cloud-based threat detection system |
US8844045B2 (en) * | 2012-09-14 | 2014-09-23 | Mastercard International Incorporated | Methods and systems for evaluating software for known vulnerabilities |
WO2015010742A1 (en) * | 2013-07-25 | 2015-01-29 | Telefonaktiebolaget L M Ericsson (Publ) | Detecting fraudulent traffic in a telecommunications system |
US9686121B2 (en) * | 2013-09-23 | 2017-06-20 | Amazon Technologies, Inc. | Client-premise resource control via provider-defined interfaces |
US9886581B2 (en) * | 2014-02-25 | 2018-02-06 | Accenture Global Solutions Limited | Automated intelligence graph construction and countermeasure deployment |
GB201603118D0 (en) | 2016-02-23 | 2016-04-06 | Eitc Holdings Ltd | Reactive and pre-emptive security system based on choice theory |
US10764311B2 (en) | 2016-09-21 | 2020-09-01 | Cequence Security, Inc. | Unsupervised classification of web traffic users |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10791138B1 (en) * | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
CN109218250A (en) * | 2017-06-29 | 2019-01-15 | 北京多点在线科技有限公司 | DDOS defence method and system based on failure Autonomic Migration Framework system |
DK3588897T3 (en) | 2018-06-30 | 2020-05-25 | Ovh | PROCEDURE AND SYSTEM TO DEFEND AN INFRASTRUCTURE AGAINST A DISTRIBUTED DENIAL OF SERVICE ATTACK |
CN109495440A (en) * | 2018-09-06 | 2019-03-19 | 国家电网有限公司 | A kind of random device of Intranet dynamic security |
US20220353279A1 (en) * | 2021-04-29 | 2022-11-03 | KnowBe4, Inc. | Systems and methods for determination of indicators of malicious elements within messages |
US12267299B2 (en) | 2022-01-12 | 2025-04-01 | Bank Of America Corporation | Preemptive threat detection for an information system |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090249481A1 (en) * | 2008-03-31 | 2009-10-01 | Men Long | Botnet spam detection and filtration on the source machine |
US20100162350A1 (en) * | 2008-12-24 | 2010-06-24 | Korea Information Security Agency | Security system of managing irc and http botnets, and method therefor |
US7904958B2 (en) * | 2007-02-27 | 2011-03-08 | Symantec Corporation | Spam honeypot domain identification |
US20110126136A1 (en) * | 2009-11-25 | 2011-05-26 | At&T Intellectual Property I, L.P. | Method and Apparatus for Botnet Analysis and Visualization |
US8156541B1 (en) * | 2007-10-17 | 2012-04-10 | Mcafee, Inc. | System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking |
US20120203900A1 (en) * | 2008-09-12 | 2012-08-09 | Xinyuan Wang | Botmaster Traceback |
US20130091570A1 (en) * | 2009-09-15 | 2013-04-11 | Symantec Corporation | Short-range mobile honeypot for sampling and tracking threats |
US8510840B2 (en) * | 2005-12-29 | 2013-08-13 | At&T Intellectual Property Ii, L.P. | Method and apparatus for detecting scans in real-time |
US8769684B2 (en) * | 2008-12-02 | 2014-07-01 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for masquerade attack detection by monitoring computer user behavior |
US8793787B2 (en) * | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US20140245436A1 (en) * | 2005-10-27 | 2014-08-28 | Georgia Tech Research Corporation | Method and system for detecting and responding to attacking networks |
US9009829B2 (en) * | 2007-06-12 | 2015-04-14 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for baiting inside attackers |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8533819B2 (en) * | 2006-09-29 | 2013-09-10 | At&T Intellectual Property Ii, L.P. | Method and apparatus for detecting compromised host computers |
US8612523B1 (en) * | 2007-05-22 | 2013-12-17 | Trend Micro Incorporated | Methods and apparatus for detecting botnet attacks |
US20080307526A1 (en) * | 2007-06-07 | 2008-12-11 | Mi5 Networks | Method to perform botnet detection |
US8745731B2 (en) | 2008-04-03 | 2014-06-03 | Microsoft Corporation | Clustering botnet behavior using parameterized models |
US10027688B2 (en) * | 2008-08-11 | 2018-07-17 | Damballa, Inc. | Method and system for detecting malicious and/or botnet-related domain names |
US8850571B2 (en) | 2008-11-03 | 2014-09-30 | Fireeye, Inc. | Systems and methods for detecting malicious network content |
CN102045214B (en) * | 2009-10-20 | 2013-06-26 | 成都市华为赛门铁克科技有限公司 | Botnet detection method, device and system |
US8549642B2 (en) * | 2010-01-20 | 2013-10-01 | Symantec Corporation | Method and system for using spam e-mail honeypots to identify potential malware containing e-mails |
-
2011
- 2011-07-21 WO PCT/IB2011/053253 patent/WO2012011070A1/en active Application Filing
- 2011-07-21 US US13/810,450 patent/US9270690B2/en active Active
-
2016
- 2016-01-10 US US14/991,957 patent/US9641550B2/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8793787B2 (en) * | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US20140245436A1 (en) * | 2005-10-27 | 2014-08-28 | Georgia Tech Research Corporation | Method and system for detecting and responding to attacking networks |
US8510840B2 (en) * | 2005-12-29 | 2013-08-13 | At&T Intellectual Property Ii, L.P. | Method and apparatus for detecting scans in real-time |
US7904958B2 (en) * | 2007-02-27 | 2011-03-08 | Symantec Corporation | Spam honeypot domain identification |
US9009829B2 (en) * | 2007-06-12 | 2015-04-14 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for baiting inside attackers |
US8156541B1 (en) * | 2007-10-17 | 2012-04-10 | Mcafee, Inc. | System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking |
US20090249481A1 (en) * | 2008-03-31 | 2009-10-01 | Men Long | Botnet spam detection and filtration on the source machine |
US20120203900A1 (en) * | 2008-09-12 | 2012-08-09 | Xinyuan Wang | Botmaster Traceback |
US8769684B2 (en) * | 2008-12-02 | 2014-07-01 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for masquerade attack detection by monitoring computer user behavior |
US20100162350A1 (en) * | 2008-12-24 | 2010-06-24 | Korea Information Security Agency | Security system of managing irc and http botnets, and method therefor |
US20130091570A1 (en) * | 2009-09-15 | 2013-04-11 | Symantec Corporation | Short-range mobile honeypot for sampling and tracking threats |
US20110126136A1 (en) * | 2009-11-25 | 2011-05-26 | At&T Intellectual Property I, L.P. | Method and Apparatus for Botnet Analysis and Visualization |
Cited By (115)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9553888B2 (en) | 2011-07-15 | 2017-01-24 | Norse Networks, Inc. | Systems and methods for dynamic protection from electronic attacks |
US20150154043A1 (en) * | 2012-02-27 | 2015-06-04 | Ca, Inc. | System and method for isolated virtual image and appliance communication within a cloud environment |
US9817687B2 (en) * | 2012-02-27 | 2017-11-14 | Ca, Inc. | System and method for isolated virtual image and appliance communication within a cloud environment |
US9356942B1 (en) * | 2012-03-05 | 2016-05-31 | Neustar, Inc. | Method and system for detecting network compromise |
US9674222B1 (en) | 2012-03-05 | 2017-06-06 | Neustar, Inc. | Method and system for detecting network compromise |
US10230761B1 (en) | 2012-03-05 | 2019-03-12 | Neustar, Inc. | Method and system for detecting network compromise |
US11316878B2 (en) | 2012-04-30 | 2022-04-26 | Cognyte Technologies Israel Ltd. | System and method for malware detection |
US10061922B2 (en) | 2012-04-30 | 2018-08-28 | Verint Systems Ltd. | System and method for malware detection |
US11687653B2 (en) * | 2012-05-09 | 2023-06-27 | SunStone Information Defense, Inc. | Methods and apparatus for identifying and removing malicious applications |
US9092782B1 (en) * | 2012-06-29 | 2015-07-28 | Emc Corporation | Methods and apparatus for risk evaluation of compromised credentials |
US20140344931A1 (en) * | 2013-05-17 | 2014-11-20 | Arbor Networks, Inc. | Systems and methods for extracting cryptographic keys from malware |
US20180278636A1 (en) * | 2013-06-04 | 2018-09-27 | Verint Systems, Ltd. | System and method for malware detection learning |
US9923913B2 (en) * | 2013-06-04 | 2018-03-20 | Verint Systems Ltd. | System and method for malware detection learning |
US11038907B2 (en) * | 2013-06-04 | 2021-06-15 | Verint Systems Ltd. | System and method for malware detection learning |
US10084817B2 (en) | 2013-09-11 | 2018-09-25 | NSS Labs, Inc. | Malware and exploit campaign detection system and method |
WO2018089380A1 (en) * | 2013-09-11 | 2018-05-17 | NSS Labs, Inc. | Malware and exploit campaign detection system and method |
US20170054754A1 (en) * | 2013-09-11 | 2017-02-23 | NSS Labs, Inc. | Malware and exploit campaign detection system and method |
US9516064B2 (en) * | 2013-10-14 | 2016-12-06 | Intuit Inc. | Method and system for dynamic and comprehensive vulnerability management |
US10079857B2 (en) * | 2013-12-23 | 2018-09-18 | Orange | Method of slowing down a communication in a network |
US9501345B1 (en) | 2013-12-23 | 2016-11-22 | Intuit Inc. | Method and system for creating enriched log data |
US20150186645A1 (en) * | 2013-12-26 | 2015-07-02 | Fireeye, Inc. | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits |
US9756074B2 (en) * | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US10432658B2 (en) * | 2014-01-17 | 2019-10-01 | Watchguard Technologies, Inc. | Systems and methods for identifying and performing an action in response to identified malicious network traffic |
US20150207812A1 (en) * | 2014-01-17 | 2015-07-23 | Gregory Thomas BACK | Systems and methods for identifying and performing an action in response to identified malicious network traffic |
US10360062B2 (en) | 2014-02-03 | 2019-07-23 | Intuit Inc. | System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment |
US9686301B2 (en) | 2014-02-03 | 2017-06-20 | Intuit Inc. | Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud computing environment |
US9923909B2 (en) | 2014-02-03 | 2018-03-20 | Intuit Inc. | System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment |
US10757133B2 (en) | 2014-02-21 | 2020-08-25 | Intuit Inc. | Method and system for creating and deploying virtual assets |
US11411984B2 (en) | 2014-02-21 | 2022-08-09 | Intuit Inc. | Replacing a potentially threatening virtual asset |
US9459987B2 (en) | 2014-03-31 | 2016-10-04 | Intuit Inc. | Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems |
US9596251B2 (en) | 2014-04-07 | 2017-03-14 | Intuit Inc. | Method and system for providing security aware applications |
US11294700B2 (en) | 2014-04-18 | 2022-04-05 | Intuit Inc. | Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets |
US10055247B2 (en) | 2014-04-18 | 2018-08-21 | Intuit Inc. | Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets |
US9900322B2 (en) | 2014-04-30 | 2018-02-20 | Intuit Inc. | Method and system for providing permissions management |
WO2015171789A1 (en) * | 2014-05-07 | 2015-11-12 | Attivo Networks Inc. | Emulating shellcode attacks |
US9769204B2 (en) * | 2014-05-07 | 2017-09-19 | Attivo Networks Inc. | Distributed system for Bot detection |
US20150326587A1 (en) * | 2014-05-07 | 2015-11-12 | Attivo Networks Inc. | Distributed system for bot detection |
US10567431B2 (en) | 2014-05-07 | 2020-02-18 | Attivo Networks Inc. | Emulating shellcode attacks |
US9742794B2 (en) | 2014-05-27 | 2017-08-22 | Intuit Inc. | Method and apparatus for automating threat model generation and pattern identification |
US9866581B2 (en) | 2014-06-30 | 2018-01-09 | Intuit Inc. | Method and system for secure delivery of information to computing environments |
US10050997B2 (en) | 2014-06-30 | 2018-08-14 | Intuit Inc. | Method and system for secure delivery of information to computing environments |
US10102082B2 (en) | 2014-07-31 | 2018-10-16 | Intuit Inc. | Method and system for providing automated self-healing virtual assets |
US9473481B2 (en) | 2014-07-31 | 2016-10-18 | Intuit Inc. | Method and system for providing a virtual asset perimeter |
US9942250B2 (en) | 2014-08-06 | 2018-04-10 | Norse Networks, Inc. | Network appliance for dynamic protection from risky network activities |
US12026257B2 (en) | 2014-08-11 | 2024-07-02 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
US11886591B2 (en) | 2014-08-11 | 2024-01-30 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
US11625485B2 (en) | 2014-08-11 | 2023-04-11 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
US12235962B2 (en) | 2014-08-11 | 2025-02-25 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
US20160080414A1 (en) * | 2014-09-12 | 2016-03-17 | Topspin Security Ltd. | System and a Method for Identifying Malware Network Activity Using a Decoy Environment |
US9992225B2 (en) * | 2014-09-12 | 2018-06-05 | Topspin Security Ltd. | System and a method for identifying malware network activity using a decoy environment |
US10193924B2 (en) * | 2014-09-17 | 2019-01-29 | Acalvio Technologies, Inc. | Network intrusion diversion using a software defined network |
USD814494S1 (en) | 2015-03-02 | 2018-04-03 | Norse Networks, Inc. | Computer display panel with an icon image of a live electronic threat intelligence visualization interface |
US10091222B1 (en) * | 2015-03-31 | 2018-10-02 | Juniper Networks, Inc. | Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs |
USD810775S1 (en) | 2015-04-21 | 2018-02-20 | Norse Networks, Inc. | Computer display panel with a graphical live electronic threat intelligence visualization interface |
US9516051B1 (en) | 2015-05-14 | 2016-12-06 | International Business Machines Corporation | Detecting web exploit kits by tree-based structural similarity search |
US9723016B2 (en) | 2015-05-14 | 2017-08-01 | International Business Machines Corporation | Detecting web exploit kits by tree-based structural similarity search |
US10560471B2 (en) | 2015-05-14 | 2020-02-11 | Hcl Technologies Limited | Detecting web exploit kits by tree-based structural similarity search |
US10290022B1 (en) | 2015-06-23 | 2019-05-14 | Amazon Technologies, Inc. | Targeting content based on user characteristics |
US10212170B1 (en) | 2015-06-23 | 2019-02-19 | Amazon Technologies, Inc. | User authentication using client-side browse history |
US10182046B1 (en) * | 2015-06-23 | 2019-01-15 | Amazon Technologies, Inc. | Detecting a network crawler |
US9712520B1 (en) | 2015-06-23 | 2017-07-18 | Amazon Technologies, Inc. | User authentication using client-side browse history |
US9596321B2 (en) | 2015-06-24 | 2017-03-14 | Cisco Technology, Inc. | Server grouping system |
US9813442B2 (en) | 2015-06-24 | 2017-11-07 | Cisco Technology, Inc. | Server grouping system |
US9923914B2 (en) * | 2015-06-30 | 2018-03-20 | Norse Networks, Inc. | Systems and platforms for intelligently monitoring risky network activities |
US20170006054A1 (en) * | 2015-06-30 | 2017-01-05 | Norse Networks, Inc. | Systems and platforms for intelligently monitoring risky network activities |
US10243957B1 (en) * | 2015-08-27 | 2019-03-26 | Amazon Technologies, Inc. | Preventing leakage of cookie data |
US11095647B2 (en) | 2015-08-27 | 2021-08-17 | Amazon Technologies, Inc. | Preventing leakage of cookie data |
US11729171B1 (en) | 2015-08-27 | 2023-08-15 | Amazon Technologies, Inc. | Preventing leakage of cookie data |
JP2017068776A (en) * | 2015-10-02 | 2017-04-06 | 富士通株式会社 | Communication control device, communication control method, and communication control program |
US20170111391A1 (en) * | 2015-10-15 | 2017-04-20 | International Business Machines Corporation | Enhanced intrusion prevention system |
US20210092142A1 (en) * | 2016-02-25 | 2021-03-25 | Imperva, Inc. | Techniques for targeted botnet protection |
US10257226B2 (en) | 2016-03-24 | 2019-04-09 | 802 Secure, Inc. | Identifying and trapping wireless based attacks on networks using deceptive network emulation |
US10432650B2 (en) | 2016-03-31 | 2019-10-01 | Stuart Staniford | System and method to protect a webserver against application exploits and attacks |
US10097570B2 (en) * | 2016-04-26 | 2018-10-09 | Seculayer Co., Ltd. | Method for detecting real-time event and server using the same |
US12192379B2 (en) | 2016-05-05 | 2025-01-07 | Neustar, Inc. | Systems and methods for enabling trusted communications between controllers |
US11665004B2 (en) | 2016-05-05 | 2023-05-30 | Neustar, Inc. | Systems and methods for enabling trusted communications between controllers |
US11277439B2 (en) | 2016-05-05 | 2022-03-15 | Neustar, Inc. | Systems and methods for mitigating and/or preventing distributed denial-of-service attacks |
US12192380B2 (en) | 2016-05-05 | 2025-01-07 | Neustar, Inc. | Systems and methods for enabling trusted communications between controllers |
US11108562B2 (en) | 2016-05-05 | 2021-08-31 | Neustar, Inc. | Systems and methods for verifying a route taken by a communication |
US12095812B2 (en) | 2016-05-05 | 2024-09-17 | Neustar, Inc. | Systems and methods for mitigating and/or preventing distributed denial-of-service attacks |
US11025428B2 (en) | 2016-05-05 | 2021-06-01 | Neustar, Inc. | Systems and methods for enabling trusted communications between controllers |
US12015666B2 (en) | 2016-05-05 | 2024-06-18 | Neustar, Inc. | Systems and methods for distributing partial data to subnetworks |
US10958725B2 (en) | 2016-05-05 | 2021-03-23 | Neustar, Inc. | Systems and methods for distributing partial data to subnetworks |
US10404472B2 (en) | 2016-05-05 | 2019-09-03 | Neustar, Inc. | Systems and methods for enabling trusted communications between entities |
US11804967B2 (en) | 2016-05-05 | 2023-10-31 | Neustar, Inc. | Systems and methods for verifying a route taken by a communication |
US11290484B2 (en) | 2016-10-25 | 2022-03-29 | Huawei Technologies Co., Ltd. | Bot characteristic detection method and apparatus |
US10757135B2 (en) * | 2016-10-25 | 2020-08-25 | Huawei Technologies Co., Ltd. | Bot characteristic detection method and apparatus |
US11695800B2 (en) | 2016-12-19 | 2023-07-04 | SentinelOne, Inc. | Deceiving attackers accessing network data |
US11616812B2 (en) | 2016-12-19 | 2023-03-28 | Attivo Networks Inc. | Deceiving attackers accessing active directory data |
US11997139B2 (en) | 2016-12-19 | 2024-05-28 | SentinelOne, Inc. | Deceiving attackers accessing network data |
US12261884B2 (en) | 2016-12-19 | 2025-03-25 | SentinelOne, Inc. | Deceiving attackers accessing active directory data |
US20240007503A1 (en) * | 2016-12-19 | 2024-01-04 | SentinelOne, Inc. | Deceiving Attackers Accessing Network Data |
US11716342B2 (en) | 2017-08-08 | 2023-08-01 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US12177241B2 (en) | 2017-08-08 | 2024-12-24 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US11838306B2 (en) | 2017-08-08 | 2023-12-05 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US12244626B2 (en) | 2017-08-08 | 2025-03-04 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US11876819B2 (en) | 2017-08-08 | 2024-01-16 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US12206698B2 (en) | 2017-08-08 | 2025-01-21 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US11973781B2 (en) | 2017-08-08 | 2024-04-30 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US11722506B2 (en) | 2017-08-08 | 2023-08-08 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US11716341B2 (en) | 2017-08-08 | 2023-08-01 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US11838305B2 (en) | 2017-08-08 | 2023-12-05 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US10791128B2 (en) * | 2017-09-28 | 2020-09-29 | Microsoft Technology Licensing, Llc | Intrusion detection |
US11888897B2 (en) | 2018-02-09 | 2024-01-30 | SentinelOne, Inc. | Implementing decoys in a network environment |
US10929878B2 (en) * | 2018-10-19 | 2021-02-23 | International Business Machines Corporation | Targeted content identification and tracing |
US11349856B2 (en) * | 2019-01-30 | 2022-05-31 | International Business Machines Corporation | Exploit kit detection |
US20200287915A1 (en) * | 2019-03-04 | 2020-09-10 | Microsoft Technology Licensing, Llc | Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform |
US12289321B2 (en) * | 2019-03-04 | 2025-04-29 | Microsoft Technology Licensing, Llc | Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform |
US12169556B2 (en) | 2019-05-20 | 2024-12-17 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
US11580218B2 (en) | 2019-05-20 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
US11790079B2 (en) | 2019-05-20 | 2023-10-17 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
US11579857B2 (en) | 2020-12-16 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach |
US11748083B2 (en) | 2020-12-16 | 2023-09-05 | Sentinel Labs Israel Ltd. | Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach |
US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
US12259967B2 (en) | 2021-07-13 | 2025-03-25 | SentinelOne, Inc. | Preserving DLL hooks |
Also Published As
Publication number | Publication date |
---|---|
US9641550B2 (en) | 2017-05-02 |
US20160127413A1 (en) | 2016-05-05 |
US9270690B2 (en) | 2016-02-23 |
WO2012011070A1 (en) | 2012-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9641550B2 (en) | Network protection system and method | |
JP6894003B2 (en) | Defense against APT attacks | |
US11831785B2 (en) | Systems and methods for digital certificate security | |
US10237283B2 (en) | Malware domain detection using passive DNS | |
US10193920B2 (en) | Managing security actions in a computing environment based on communication activity of a security threat | |
US9942270B2 (en) | Database deception in directory services | |
US9609019B2 (en) | System and method for directing malicous activity to a monitoring system | |
US10601844B2 (en) | Non-rule based security risk detection | |
US8127353B2 (en) | Real-time user awareness for a computer network | |
US8375120B2 (en) | Domain name system security network | |
US9185127B2 (en) | Network protection service | |
US20170272469A1 (en) | Using Private Threat Intelligence in Public Cloud | |
US20100235915A1 (en) | Using host symptoms, host roles, and/or host reputation for detection of host infection | |
WO2016037024A1 (en) | System for tracking data security threats and method for same | |
CN105915532A (en) | Method and device for recognizing fallen host | |
WO2016081561A1 (en) | System and method for directing malicious activity to a monitoring system | |
Tundis et al. | An exploratory analysis on the impact of Shodan scanning tool on the network attacks | |
US20110185166A1 (en) | Slider Control for Security Grouping and Enforcement | |
Li | An empirical analysis on threat intelligence: Data characteristics and real-world uses | |
Vishnu et al. | Identifying key strategies for reconnaissance in cybersecurity | |
Barron | Addressing the Imbalance between Attackers and Defenders Using Cyber Deception | |
EP4312400A1 (en) | Attack situation output program, attack situation output device, and attack situation output system | |
WO2006092785A2 (en) | Method and apparatus for the dynamic defensive masquerading of computing resources | |
Owen | Threat intelligence & siem | |
Haakila | Implementing Security Monitoring at Small and Medium sized Businesses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SECULERT LTD., ISRAEL Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KRAITSMAN, RON;MILSTEIN, ALEX;RAFF, AVIV;AND OTHERS;SIGNING DATES FROM 20130120 TO 20130219;REEL/FRAME:029912/0500 |
|
AS | Assignment |
Owner name: CITY NATIONAL BANK, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:SECULERT LTD.;SECULERT, INC.;REEL/FRAME:037287/0062 Effective date: 20151030 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: SECULERT, ISRAEL Free format text: RELEASE OF REEL/FRAME 039077/0130;ASSIGNOR:CITY NATIONAL BANK;REEL/FRAME:041644/0941 Effective date: 20170201 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |