DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Malware analysis and recovery

Abstract

A system and method detects malware by processing notifications from an intrusion detection system and baseline snapshots from an image capture utility. The image capture utility constructs an image of the suspected malware intrusion and links the suspected malware intrusion to the baseline snapshots. The system and method propagates the image of the suspected malware intrusion across multiple networks before it distinguishes malicious code, device state, and files from benign code, device state, and files. Some systems and methods include a malware recovery system that executes machine learning instructions and heuristics to revert a client and/or a remote server to one or more baseline snapshots.

Inventors:
Issue Date:
Research Org.:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1805551
Patent Number(s):
10931685
Application Number:
15/837,942
Assignee:
UT-Battelle, LLC (Oak Ridge, TN)
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
G - PHYSICS G06 - COMPUTING G06N - COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
DOE Contract Number:  
AC05-00OR22725
Resource Type:
Patent
Resource Relation:
Patent File Date: 12/11/2017
Country of Publication:
United States
Language:
English

Citation Formats

Smith, Jared M. Malware analysis and recovery. United States: N. p., 2021. Web.
Smith, Jared M. Malware analysis and recovery. United States.
Smith, Jared M. Tue . "Malware analysis and recovery". United States. https://www.osti.gov/servlets/purl/1805551.
@article{osti_1805551,
title = {Malware analysis and recovery},
author = {Smith, Jared M.},
abstractNote = {A system and method detects malware by processing notifications from an intrusion detection system and baseline snapshots from an image capture utility. The image capture utility constructs an image of the suspected malware intrusion and links the suspected malware intrusion to the baseline snapshots. The system and method propagates the image of the suspected malware intrusion across multiple networks before it distinguishes malicious code, device state, and files from benign code, device state, and files. Some systems and methods include a malware recovery system that executes machine learning instructions and heuristics to revert a client and/or a remote server to one or more baseline snapshots.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Feb 23 00:00:00 EST 2021},
month = {Tue Feb 23 00:00:00 EST 2021}
}

Works referenced in this record:

Protection System Including Machine Learning Snapshot Evaluation
patent-application, June 2015


Bulk data distribution system
patent, July 2017


Methods and apparatus for virus detection using journal data
patent, April 2011


SDI-Scam
patent-application, April 2012


Intrusion detection method and signature table
patent-application, June 2003


Method and system for isolating suspicious email
patent-application, December 2005


Systems and Methods for Processing Data Flows
patent-application, August 2007


Automated Malware Detection and Remediation
patent-application, October 2011


Detecting and Marking Client Devices
patent-application, October 2014


Intrusion Detection and Radio Fingerprint Tracking
patent-application, August 2016


Snapshot and restore technique for computer system recovery
patent, August 2010


Method and System for Identifying Enterprise Network Hosts Infected with Slow and/ or Distributed Scanning Malware
patent-application, November 2009


Security Alert Prioritization
patent-application, March 2014


System and method for deprioritizing and presenting data
patent-application, May 2007


Intrusion prevention system (IPS) mode for a malware detection system
patent, December 2014


Automated threat analysis
patent-application, December 2007


Prioritizing intrusion detection logs
patent-application, October 2005


Malicious Code Infection Cause-and-Effect Analysis
patent-application, January 2015


Centralized Storage and Management of Malware Manifests
patent-application, April 2016


Systems and methods for orchestrating runtime operational integrity
patent, March 2015


Automated Behavior and Static Analysis Using an Instrumented Sandbox and Machine Learning Classification for Mobile Security
patent-application, April 2013


Network Intrusion Detection with Distributed Correlation
patent-application, July 2011


Malicious code infection cause-and-effect analysis
patent-application, June 2007


System ad Method for Managing Environment Configuration Using Snapshots
patent-application, February 2013


Computer virus and malware cleaner
patent-application, June 2007


Detecting advanced persistent threats
patent, December 2014


Automatic Health-Check Method and Device for On-Line System
patent-application, December 2014


Integrated network threat analysis
patent, April 2016


Method and System for Automatic Detection and Analysis of Malware
patent-application, June 2016


Remediation for Ransomware Attacks on Cloud Drive Folders
patent-application, February 2018


Security Policy Generation Based on Snapshots of Similar Virtual Machines
patent-application, November 2016


System for Automated Computer Support
patent-application, December 2014


Generation of alerts in an event management system based upon risk
patent, March 2016


Dynamic throughput ingestion of backup sources
patent, May 2019


Method and system for a self-heating device
patent, November 2009


System and Method Employing Structured Intelligence to Verify and Contain Threats at Endpoints
patent-application, November 2014


Periodic Mobile Forensics
patent-application, April 2015


Malicious Code Infection Cause-and -Effect Analysis
patent-application, April 2015


System and Method for Cyber Security Threat Detection
patent-application, September 2013