Dell products l.p. (20240111867). CYBER RECOVERY FORENSICS KIT - EXPERIMENTATION AUTOMATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

CYBER RECOVERY FORENSICS KIT - EXPERIMENTATION AUTOMATION

Organization Name

dell products l.p.

Inventor(s)

Ofir Ezrielev of Be'er Sheba (IL)

Jehuda Shemer of Kfar Saba (IL)

Amihai Savir of Newton MA (US)

CYBER RECOVERY FORENSICS KIT - EXPERIMENTATION AUTOMATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240111867 titled 'CYBER RECOVERY FORENSICS KIT - EXPERIMENTATION AUTOMATION

Simplified Explanation

The patent application describes a method for automated research experimentation on malware, where infected backups are generated and deployed to multiple working environments for analysis.

  • Infected backups are created when malware is detected.
  • The infected backups are deployed to multiple working environments as recovered production systems.
  • Different scenarios are performed on the recovered production systems to learn the operational characteristics of the malware.
  • The insights gained from the experimentation can be used to protect against the malware and other similar threats.

Potential Applications

This technology could be applied in cybersecurity research, threat intelligence, and malware analysis tools.

Problems Solved

This technology helps researchers and cybersecurity professionals better understand malware behavior and develop more effective defense mechanisms against them.

Benefits

The automated experimentation process saves time and resources compared to manual analysis, leading to quicker threat detection and response.

Potential Commercial Applications

This technology could be utilized by cybersecurity companies, government agencies, and organizations looking to enhance their malware detection and prevention capabilities.

Possible Prior Art

One possible prior art could be automated malware analysis tools that simulate malware behavior in controlled environments for research purposes.

Unanswered Questions

1. How does the system ensure the safety of the working environments when deploying infected backups? 2. What types of malware have been tested using this automated experimentation method, and what were the results?


Original Abstract Submitted

automated research experimentation on malware is disclosed. when malware is detected, an infected backup is generated. the infected backup is deployed to multiple working environments as recovered production systems, starting from the same state. different scenarios are performed on the recovered production systems to learn the operational characteristics of the malware operating in the recovered production systems. the insights may be used to protect against the malware and/or other malware.