System and method for detecting and remediating a cybersecurity attack

作者: Hatem Eyada

DOI:

关键词: Computer networkCode (cryptography)CallbackOperabilityComputer scienceMalware

摘要: According to one embodiment, a computerized method is directed neutralizing callback malware. This involves intercepting message an endpoint device, where the in response sent from malware operating on device. Thereafter, first portion of information within substituted with second information. The includes code that configured overwrite at least and cause become inoperable or mitigate its operability.

参考文章(604)
Paul Mayfield, Bernard Aboba, Controlling network access ,(2005)
Nick J. Harbour, Peter J. Silberman, II James R. Butler, System and method for detecting executable machine instructions in a data stream ,(2010)
G. Apostolopoulos, C. Hassapis, V-eM: A Cluster of Virtual Machines for Robust, Detailed, and High-Performance Network Emulation modeling, analysis, and simulation on computer and telecommunication systems. pp. 117- 126 ,(2006) , 10.1109/MASCOTS.2006.51
Everett Lai, Patrick Gardner, John Meade, Method for mitigating false positive generation in antivirus software ,(2008)
Steven K. Rogers, Richard A. Raines, Thomas E. Dube, Malware Target Recognition ,(2012)
Jayaraman Manni, Wei-Lung Lai, Ashar Aziz, Systems and methods for detecting communication channels of bots ,(2007)
Michael Weber, Michael Haddox-Schatz, David Geyer, Matthew N. Schmid, Methods for identifying malicious software ,(2004)