Method and apparatus for identifying computing resource trajectory

作者: Alfred Huger , Elias Levy , Zulfikar Ramzan , Oliver Friedrichs

DOI:

关键词: State (computer science)Resource (project management)Utility computingLaptopResource allocation (computer)Computer securityMalwareComputer scienceVisibilityEnd userWorld Wide Web

摘要: The present invention relates to the security of general purpose computing devices, such as laptop or desktop PCs, and more specifically detection malicious software (malware) on a device. A challenge in maintaining plurality systems is that it may be required have visibility into extensive collection related resources located across those well information about together with their behaviors evolutions within systems. Examples include files, file names, registry keys, entries network communications logs, etc. Accordingly, we novel methods, components, for keeping track these presenting this an ultimate end user. More specifically, describe perform data analytics system obtain report upon resource trajectory information, when particular were seen environment, actions associated resources, other original resources. If believed otherwise undesirable, then can determined which on, how arrived systems, what did are resource, might need removed from restore them desirable state. Through disclosed invention, administrators will better able determine effectively address issues presence

参考文章(17)
Amit Klein, Mickey Boodaei, A method for detecting and removing malware ,(2012)
Alfred Huger, Adam J. O'Donnell, Oliver Friedrichs, Method and apparatus for detecting malicious software using generic signatures ,(2011)
Robert R. Peterson, Kulvir S. Bhogal, System and Method for Virus Notification Based on Social Groups ,(2007)
Michael P. Greene, Paul L. Piccard, Systems and methods for identifying sources of malware ,(2005)
Daniel Stroud, Michael Alonso, James Carter, Thomas H. Beeson, Timothy C. Nader, William E. Brunsen, Systems and methods for generating reports ,(2002)
James Norris, Daniel G. LaMastres, John Everson, System, computer program, and method for network resource inventory ,(2001)
Michael Stephen Abdon Tonido, Francis Mari Estepa Saguiguit, Arman Castro Catacutan, Bryant S. Tan, Lennard L. Galang, On-demand cleanup system ,(2007)