System and method for selectively collecting computer forensic data using DNS messages

A computer system and computer security technology, applied in the direction of digital transmission system, transmission system, data exchange network, etc., can solve the problem that criminal devices are not easy to identify

Pending Publication Date: 2022-03-04
BITDEFENDER IPR MANAGEMENT
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, criminal devices are not easily...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for selectively collecting computer forensic data using DNS messages
  • System and method for selectively collecting computer forensic data using DNS messages
  • System and method for selectively collecting computer forensic data using DNS messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]In the following description, it should be understood that all stated connections between structures may be direct operative connections or indirect operative connections through intermediate structures. A set of elements contains one or more elements. Any statement of elements is understood to refer to at least one element. Multiple elements contain at least two elements. The steps of any described method do not necessarily have to be performed in the particular order illustrated, unless otherwise required. A first element (eg, data) derived from a second element encompasses a first element that is the same as the second element, as well as a first element produced by processing the second element and optionally other data. Determining or deciding based on parameters encompasses determining or deciding based on parameters and optionally other data. Unless otherwise specified, an indicator of some quantities / data may be the quantity / data itself, or be a different indi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The described systems and methods allow for selective collection of computer security data from client devices, such as personal computers, smartphones, and Internet of Things (IoT) devices. A security application executing on each client device includes a domain name service (DNS) agent that marks outgoing DNS messages with a client ID. The DNS server selects a client for data collection by returning a DNS response including a service activation flag. Some embodiments thus enable per DNS message selectivity for data collection. In some embodiments, subsequent network access requests made by the selected client are rerouted to a secure server for analysis.

Description

Background technique [0001] The present invention relates to systems and methods for combating malware, and in particular to selectively collecting network traffic samples for forensic analysis. [0002] Malicious software (also known as malware) affects a large number of computer systems throughout the world. In its many forms (such as computer viruses, Trojan horses, spyware, and ransomware), malware poses a serious risk to millions of computer users, making them vulnerable to loss of data and sensitive information, identity theft, and loss of production efficiency etc. [0003] A wide variety of devices, informally referred to as the Internet of Things (IoT), are increasingly connected to communication networks and the Internet. Such devices include smartphones, smart watches, televisions and other multimedia devices, game consoles, home appliances, and various household sensors such as thermostats, among others. As more such devices come online, they become exposed to s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L51/18H04L51/212H04L51/214H04L51/48H04L9/40H04L67/303H04L69/16H04L69/22H04W12/69H04L61/4511H04L61/59H04W12/02
CPCH04L51/18H04L63/0245H04L63/1425H04L63/18H04L63/20H04L67/303H04L69/16H04L69/22H04W12/69H04L63/0272H04L63/0281H04L63/102H04W12/02H04L51/214H04L51/212H04L51/48H04L61/4511H04L61/59H04L63/1441H04L63/1491H04L12/4633H04L61/5007G16Y40/10
Inventor 丹尼尔-亚利山杜·米尔塞斯库
Owner BITDEFENDER IPR MANAGEMENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products