18295336. INTEGRATION OF INLINE MALWARE DISCOVERY AND OFFLINE VAULT RANSOMWARE PREDICTION simplified abstract (Dell Products L.P.)
Contents
INTEGRATION OF INLINE MALWARE DISCOVERY AND OFFLINE VAULT RANSOMWARE PREDICTION
Organization Name
Inventor(s)
Ofir Ezrielev of Be’er Sheba (IL)
Yevgeni Gehtman of Modi'in IL (US)
Tomer Shachar of Beer-Sheva (IL)
INTEGRATION OF INLINE MALWARE DISCOVERY AND OFFLINE VAULT RANSOMWARE PREDICTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18295336 titled 'INTEGRATION OF INLINE MALWARE DISCOVERY AND OFFLINE VAULT RANSOMWARE PREDICTION
The abstract of this patent application describes a method for detecting malware in a production system by using two processes - a first malware detection process and a second malware detection process.
- The first malware detection process checks for evidence of a malware process in the production system.
- It identifies aspects that may be affected by the malware process.
- Generates cues to identify these aspects.
- Transmits the cues to the second malware detection process.
- The second malware detection process uses the cues to determine if the malware process has affected the aspect.
- The first process may be inline, while the second process may be offline.
Potential Applications: - Cybersecurity systems - Malware detection software - Network security tools
Problems Solved: - Efficient detection of malware in production systems - Quick identification of affected aspects - Streamlined malware detection processes
Benefits: - Enhanced cybersecurity measures - Early detection of malware threats - Improved system protection
Commercial Applications: Title: "Advanced Malware Detection System for Enhanced Cybersecurity" This technology can be used in various industries such as finance, healthcare, and government agencies to protect sensitive data and prevent cyber attacks.
Questions about the technology: 1. How does this method improve upon existing malware detection processes? - This method combines inline and offline processes for more effective malware detection. 2. What are the potential limitations of this malware detection system? - The system may require regular updates to stay ahead of evolving malware threats.
Original Abstract Submitted
One example method includes, by a first malware detection process, checking an aspect of a production system for evidence of a malware process, identifying the aspects as possibly affected by the malware process, generating cues that identify the aspect, and transmitting the cues to a second malware detection process. The second malware detection process checks the cues to identify the aspect, and determines that the malware process has affected the aspect. The first malware detection process may be an inline process, and the second malware detection process may be an offline process.