Dell products l.p. (20240338450). RANSOMWARE DISCOVERY BY DETECTION OF TRANSMIT/OVERWRITE PROCESSES simplified abstract

From WikiPatents
Revision as of 00:35, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

RANSOMWARE DISCOVERY BY DETECTION OF TRANSMIT/OVERWRITE PROCESSES

Organization Name

dell products l.p.

Inventor(s)

Ofir Ezrielev of Be’er Sheba (IL)

Yehiel Zohar of Sderot (IL)

Yevgeni Gehtman of Modi'in (IL)

Tomer Shachar of Beer-Sheva (IL)

Maxim Balin of Gan-Yavne (IL)

RANSOMWARE DISCOVERY BY DETECTION OF TRANSMIT/OVERWRITE PROCESSES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240338450 titled 'RANSOMWARE DISCOVERY BY DETECTION OF TRANSMIT/OVERWRITE PROCESSES

The abstract of the patent application describes a method for detecting write operations requested by a process in relation to data, determining if the data is being transmitted to an unauthorized recipient, disabling further writes to the data, logging differentials associated with subsequent write operations, and alerting a security protocol of suspected ransomware activity.

  • Detect write operations requested by a process.
  • Determine if data is being transmitted to an unauthorized recipient.
  • Disable further writes to the data if unauthorized transmission is detected.
  • Log differentials associated with subsequent write operations.
  • Alert a security protocol of suspected ransomware activity.

Potential Applications: This technology could be used in cybersecurity systems to prevent ransomware attacks by detecting and stopping unauthorized data transmissions.

Problems Solved: This technology addresses the problem of ransomware attacks by identifying and blocking unauthorized data transfers to unknown or unauthorized recipients.

Benefits: The technology helps in preventing data loss and financial losses associated with ransomware attacks by proactively detecting and stopping unauthorized data transmissions.

Commercial Applications: This technology could be valuable for companies and organizations looking to enhance their cybersecurity measures and protect their data from ransomware attacks.

Prior Art: Researchers can explore prior art related to cybersecurity systems, data protection technologies, and ransomware prevention methods to understand the existing solutions in this field.

Frequently Updated Research: Stay updated on the latest advancements in cybersecurity, ransomware prevention, and data protection technologies to enhance the effectiveness of this innovation.

Questions about the Technology: 1. How does this technology differentiate between authorized and unauthorized data recipients? 2. What measures are in place to ensure the accurate detection of ransomware activity in real-time?


Original Abstract Submitted

one method includes detecting write operations requested by a process with respect to data, determining whether the data is being transmitted, by the same process, to a recipient that is unknown or unauthorized to receive the data, when it is determined that the data is being transmitted to the recipient that is unknown or unauthorized to receive the data, disabling writes to the data, for subsequent requested write operations, logging differentials associated with those subsequent requested write operations, and alerting a security protocol that the process is a suspected ransomware process.