作者: Alfred Huger , Elias Levy , Zulfikar Ramzan , Oliver Friedrichs
DOI:
关键词: State (computer science) 、 Resource (project management) 、 Utility computing 、 Laptop 、 Resource allocation (computer) 、 Computer security 、 Malware 、 Computer science 、 Visibility 、 End user 、 World Wide Web
摘要: The present invention relates to the security of general purpose computing devices, such as laptop or desktop PCs, and more specifically detection malicious software (malware) on a device. A challenge in maintaining plurality systems is that it may be required have visibility into extensive collection related resources located across those well information about together with their behaviors evolutions within systems. Examples include files, file names, registry keys, entries network communications logs, etc. Accordingly, we novel methods, components, for keeping track these presenting this an ultimate end user. More specifically, describe perform data analytics system obtain report upon resource trajectory information, when particular were seen environment, actions associated resources, other original resources. If believed otherwise undesirable, then can determined which on, how arrived systems, what did are resource, might need removed from restore them desirable state. Through disclosed invention, administrators will better able determine effectively address issues presence