Predictive malware threat mitigation

A malicious software, user technology, applied in electrical components, instruments, computing, etc., can solve problems such as occupying application CPU cycles, performance bottlenecks, etc.

Active Publication Date: 2012-07-04
MICROSOFT TECH LICENSING LLC
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

More specifically, many end users complain that any anti-malware application is intrusive, creates performance bottlenecks, hogs application CPU cycles, and sometimes locks certain files from use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Predictive malware threat mitigation
  • Predictive malware threat mitigation
  • Predictive malware threat mitigation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Aspects of the techniques described herein are generally directed toward providing varying levels of protection from malware based on user profile and / or historical behavior. As will be appreciated, such varying protection levels allow for dynamic strength adjustments of anti-malware products protecting against malware based on user preferences, which improves overall protection against threats, even if not fully compliant from a security standpoint.

[0020] As will also be appreciated, the techniques described herein profile user habits and machine vulnerabilities based on a variety of data, which may include telemetry, business intelligence, data collected from system anomalies, and data collected from human-induced anomalies. Each user can then be classified according to the profile based on mathematical models and patterns, from which (at runtime) vulnerability scores and protection mechanisms can be calculated. Also described is the ability to impose threshold lev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to predictive malware threat mitigation. The subject disclosure is directed towards protecting against malware, by classifying a user's risk level, which corresponds to a likelihood of malware being activated. To make the classification, data is collected that represents a probability of encountering malware, a probability of a user activating that malware, and the impact to the machine is activated. The classification maps to a protection level, which may be dynamically adjustable, e.g., based upon current risk conditions. The protection level determines a way to mitigate possible damage, such as by running a program as a virtualized program, running a virtualized operating system, or sandboxing a process.

Description

technical field [0001] The present invention relates to protection against malware. Background technique [0002] Via the Internet, individuals and organizations with malicious intent develop software that damages computer systems and / or is used to steal personal information from users (including individual users or entities such as corporations). Such malicious software often exploits code vulnerabilities and / or tricks the user into taking certain actions to cause the code holes to be installed on the user's computer system. [0003] One way to protect against malware is through anti-malware software. Contemporary anti-malware software uses a variety of mechanisms to catch and quarantine malware. In most cases, use signatures, behavior monitoring, and filter drivers to protect users from software that would otherwise damage their computers. [0004] Current anti-malware technology leads to a cycle in which malware authors try to outsmart anti-malware developers and vice ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
CPCG06F21/56G06F21/577H04L63/1408H04L63/1416H04L63/1433
Inventor B·C·格里芬V·N·拉帕塔克C·J·郭I·菲林
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products