18295336. INTEGRATION OF INLINE MALWARE DISCOVERY AND OFFLINE VAULT RANSOMWARE PREDICTION simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 02:47, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

INTEGRATION OF INLINE MALWARE DISCOVERY AND OFFLINE VAULT RANSOMWARE PREDICTION

Organization Name

Dell Products L.P.

Inventor(s)

Ofir Ezrielev of Be’er Sheba (IL)

Yehiel Zohar of Sderot (IL)

Yevgeni Gehtman of Modi'in IL (US)

Tomer Shachar of Beer-Sheva (IL)

Maxim Balin of Gan-Yavne (IL)

INTEGRATION OF INLINE MALWARE DISCOVERY AND OFFLINE VAULT RANSOMWARE PREDICTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18295336 titled 'INTEGRATION OF INLINE MALWARE DISCOVERY AND OFFLINE VAULT RANSOMWARE PREDICTION

The abstract of this patent application describes a method for detecting malware in a production system by using two processes - a first malware detection process and a second malware detection process.

  • The first malware detection process checks for evidence of a malware process in the production system.
  • It identifies aspects that may be affected by the malware process.
  • Generates cues to identify these aspects.
  • Transmits the cues to the second malware detection process.
  • The second malware detection process uses the cues to determine if the malware process has affected the aspect.
  • The first process may be inline, while the second process may be offline.

Potential Applications: - Cybersecurity systems - Malware detection software - Network security tools

Problems Solved: - Efficient detection of malware in production systems - Quick identification of affected aspects - Streamlined malware detection processes

Benefits: - Enhanced cybersecurity measures - Early detection of malware threats - Improved system protection

Commercial Applications: Title: "Advanced Malware Detection System for Enhanced Cybersecurity" This technology can be used in various industries such as finance, healthcare, and government agencies to protect sensitive data and prevent cyber attacks.

Questions about the technology: 1. How does this method improve upon existing malware detection processes? - This method combines inline and offline processes for more effective malware detection. 2. What are the potential limitations of this malware detection system? - The system may require regular updates to stay ahead of evolving malware threats.


Original Abstract Submitted

One example method includes, by a first malware detection process, checking an aspect of a production system for evidence of a malware process, identifying the aspects as possibly affected by the malware process, generating cues that identify the aspect, and transmitting the cues to a second malware detection process. The second malware detection process checks the cues to identify the aspect, and determines that the malware process has affected the aspect. The first malware detection process may be an inline process, and the second malware detection process may be an offline process.