Patents Assigned to Damballa, Inc.
-
Patent number: 10084806Abstract: Systems and methods may simulate traffic to identify malicious activity. A dynamic analysis system comprising a processor in communication with a network may receive a copy of a malware program and load the copy of the malware program into a simulated endpoint. The system may monitor simulated endpoint network traffic to or from the simulated endpoint, assess the simulated endpoint network traffic to determine a source and/or destination for the simulated endpoint network traffic and/or content of the simulated endpoint network traffic, and capture and store metadata associated with the simulated endpoint network traffic. A comparison system may compare simulated network traffic metadata to observed network traffic metadata to determine whether the metadata are statistically similar. When the metadata are not statistically similar, the system may generate a low infection confidence score. When the metadata are statistically similar, the system may generate a high infection confidence score.Type: GrantFiled: August 30, 2013Date of Patent: September 25, 2018Assignee: DAMBALLA, INC.Inventors: Joseph Ward, Andrew Hobson
-
Patent number: 10050986Abstract: Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a similarity between the monitored traffic and the CPT exceeds a match threshold, the monitored traffic may be associated with the CPT.Type: GrantFiled: February 8, 2017Date of Patent: August 14, 2018Assignee: Damballa, Inc.Inventors: Terry Lee Nelms, Andrew Hobson, Joseph Ward
-
Patent number: 10027688Abstract: A method and system of detecting a malicious and/or botnet-related domain name, comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a network; searching for information about the domain name, the information related to: information about the domain name in a domain name white list and/or a domain name suspicious list; and information about the domain name using an Internet search engine, wherein the Internet search engine determines if there are no search results or search results with a link to at least one malware analysis site; and designating the domain name as malicious and/or botnet-related based on the information.Type: GrantFiled: August 10, 2009Date of Patent: July 17, 2018Assignee: Damballa, Inc.Inventors: Roberto Perdisci, Wenke Lee
-
Patent number: 9948671Abstract: A computerized system and method for performing behavioral clustering of malware samples, comprising: executing malware samples in a controlled computer environment for a predetermined time to obtain Hypertext Transfer Protocol. HTTP traffic; clustering the malware samples into at least one cluster based on network behavioral information from the HTTP traffic; and extracting, using the at least one processor, network signatures from the HTTP traffic information for each cluster, the network signatures being indicative of malware infection.Type: GrantFiled: June 27, 2014Date of Patent: April 17, 2018Assignee: Damballa, Inc.Inventors: Roberto Perdisci, Wenke Lee, Gunter Ollmann
-
Patent number: 9922190Abstract: System and method for detecting a domain generation algorithm (DGA), comprising: performing processing associated with clustering, utilizing a name-based features clustering module accessing information from an electronic database of NX domain information, the randomly generated domain names based on the similarity in the make-up of the randomly generated domain names; performing processing associated with clustering, utilizing a graph clustering module, the randomly generated domain names based on the groups of assets that queried the randomly generated domain names; performing processing associated with determining, utilizing a daily clustering correlation module and a temporal clustering correlation module, which clustered randomly generated domain names are highly correlated in daily use and in time; and performing processing associated with determining the DGA that generated the clustered randomly generated domain names.Type: GrantFiled: January 24, 2013Date of Patent: March 20, 2018Assignee: Damballa, Inc.Inventors: Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, II
-
Patent number: 9894088Abstract: Systems and methods may determine suspicious network traffic. A monitoring system comprising a processor in communication with a network may monitor network traffic to or from an asset associated with the network. The monitoring system may assess the network traffic to determine a source and/or destination for the network traffic anchor content of the network traffic. The monitoring system may determine whether the network traffic is suspicious network traffic based on the assessed source and/or destination and/or content. When the network traffic is determined to be suspicious network traffic, the monitoring system may capture metadata associated with the suspicious network traffic and store the metadata in a database in communication with the processor. When the network traffic is not determined to be suspicious network traffic, the monitoring system may disregard metadata associated with the network traffic.Type: GrantFiled: August 30, 2013Date of Patent: February 13, 2018Assignee: Damballa, Inc.Inventors: Joseph Ward, Andrew Hobson
-
Publication number: 20170201536Abstract: A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vectors based on training vectors. The asset is then classified as infected if the NX testing vector created from the real network NX domain names is classified as a malicious vector.Type: ApplicationFiled: December 19, 2016Publication date: July 13, 2017Applicant: DAMBALLA, INC.Inventors: Emmanouil ANTONAKAKIS, Robert PERDISCI, Wenke LEE, Gunter OLLMANN
-
Patent number: 9686291Abstract: A method and system for detecting a malicious domain name, comprising: collecting domain name statistical information from a non-recursive domain name system name server (RDNS NS); and utilizing the collected domain name statistical information to determine if a domain name is malicious or benign.Type: GrantFiled: December 4, 2013Date of Patent: June 20, 2017Assignee: Damballa, Inc.Inventors: Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, II
-
Patent number: 9680861Abstract: Systems and methods may use historical analysis to identify malicious activity. A discovery/recovery system may comprise a processor in communication with a network and in communication with a database. The discovery/recovery system may gather filtered historical network data associated with an asset associated with the network. The discovery/recovery system may analyze the filtered historical network data to determine whether a subset of the filtered historical network data is associated with a malware infection of the asset.Type: GrantFiled: August 30, 2013Date of Patent: June 13, 2017Assignee: Damballa, Inc.Inventors: Joseph Ward, Andrew Hobson
-
Patent number: 9571511Abstract: Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a similarity between the monitored traffic and the CPT exceeds a match threshold, the monitored traffic may be associated with the CPT.Type: GrantFiled: June 16, 2014Date of Patent: February 14, 2017Assignee: Damballa, Inc.Inventors: Terry Lee Nelms, Andrew Hobson, Joseph Ward
-
Patent number: 9525699Abstract: A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vectors based on training vectors. The asset is then classified as infected if the NX testing vector created from the real network NX domain names is classified as a malicious vector.Type: GrantFiled: September 30, 2013Date of Patent: December 20, 2016Assignee: Damballa, Inc.Inventors: Emmanouil Antonakakis, Robert Perdisci, Wenke Lee, Gunter Ollmann
-
Patent number: 9516058Abstract: A system and method for determining whether at least one domain is legitimate or malicious by obtaining passive DNS query information, using the passive DNS query information to measure statistical features of known malicious domain names and known legitimate domain names, and using the statistical features to determine at least one reputation for at least one new domain, where the reputation indicates whether the at least one new domain is likely to be for malicious or legitimate uses.Type: GrantFiled: August 9, 2011Date of Patent: December 6, 2016Assignee: Damballa, Inc.Inventors: Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee
-
Patent number: 9166994Abstract: Systems and methods may use automation discovery to identify malicious activity. An automation discovery system comprising a processor in communication with a network and in communication with a database may receive potentially automated network traffic data. The system may analyze the potentially automated network traffic data to determine whether the potentially automated network traffic data is likely to be automated. When the potentially automated network traffic data is not likely to be automated, the system may generate a low automation confidence score associated with the potentially automated network traffic data. When the potentially automated network traffic data is likely to be automated, the system may generate a high automation confidence score associated with the potentially automated network traffic data.Type: GrantFiled: August 30, 2013Date of Patent: October 20, 2015Assignee: Damballa, Inc.Inventors: Joseph Ward, Andrew Hobson
-
Patent number: 8826438Abstract: A computerized system and method for performing behavioral clustering of malware samples, comprising: executing malware samples in a controlled computer environment for a predetermined time to obtain HTTP traffic; clustering the malware samples into at least one cluster based on network behavioral information from the HTTP traffic; and extracting, using the at least one processor, network signatures from the HTTP traffic information for each cluster, the network signatures being indicative of malware infection.Type: GrantFiled: January 18, 2011Date of Patent: September 2, 2014Assignee: Damballa, Inc.Inventors: Roberto Perdisci, Wenke Lee, Gunter Ollmann
-
Publication number: 20140157414Abstract: A method and system for detecting a malicious domain name, comprising: collecting domain name statistical information from a non-recursive domain name system name server (RDNS NS); and utilizing the collected domain name statistical information to determine if a domain name is malicious or benign.Type: ApplicationFiled: December 4, 2013Publication date: June 5, 2014Applicant: DAMBALLA, INC.Inventors: Manos ANTONAKAKIS, Roberto PERDISCI, Wenke LEE, Nikolaos VASILOGLOU, II
-
Publication number: 20140101759Abstract: A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vectors based on training vectors. The asset is then classified as infected if the NX testing vector created from the real network NX domain names is classified as a malicious vector.Type: ApplicationFiled: September 30, 2013Publication date: April 10, 2014Applicant: DAMBALLA, INC.Inventors: Emmanouil ANTONAKAKIS, Robert PERDISCI, Wenke LEE, Gunter OLLMANN
-
Publication number: 20140090058Abstract: Systems and methods may simulate traffic to identify malicious activity. A dynamic analysis system comprising a processor in communication with a network may receive a copy of a malware program and load the copy of the malware program into a simulated endpoint. The system may monitor simulated endpoint network traffic to or from the simulated endpoint, assess the simulated endpoint network traffic to determine a source and/or destination for the simulated endpoint network traffic and/or content of the simulated endpoint network traffic, and capture and store metadata associated with, the simulated endpoint network traffic. A comparison system may compare simulated network traffic metadata to observed network traffic metadata to determine whether the metadata are statistically similar. When the metadata are not statistically similar, the system may generate a low infection confidence score. When the metadata are statistically similar, the system may generate a high infection confidence score.Type: ApplicationFiled: August 30, 2013Publication date: March 27, 2014Applicant: DAMBALLA, INC.Inventors: JOSEPH WARD, ANDREW HOBSON
-
Publication number: 20140075558Abstract: Systems and methods may use automation discovery to identify malicious activity. An automation discovery system comprising a processor in communication with a network and in communication with a database may receive potentially automated network traffic data. The system may analyze the potentially automated network traffic data to determine whether the potentially automated network traffic data is likely to be automated. When the potentially automated network traffic data is not likely to be automated, the system may generate a low automation confidence score associated with the potentially automated network traffic data. When the potentially automated network traffic data is likely to be automated, the system may generate a high automation confidence score associated with the potentially automated network traffic data.Type: ApplicationFiled: August 30, 2013Publication date: March 13, 2014Applicant: DAMBALLA, INC.Inventors: JOSEPH WARD, ANDREW HOBSON
-
Publication number: 20140068775Abstract: Systems and methods may use historical analysis to identify malicious activity. A discovery/recovery system may comprise a processor in communication with a network and in communication with a database. The discovery/recovery system may gather filtered historical network data associated with an asset associated with the network. The discovery/recovery system may analyze the filtered historical network data to determine whether a subset of the filtered historical network data is associated with a malware infection of the asset.Type: ApplicationFiled: August 30, 2013Publication date: March 6, 2014Applicant: DAMBALLA, INC.Inventors: JOSEPH WARD, ANDREW HOBSON
-
Publication number: 20140068763Abstract: Systems and methods may determine suspicious network traffic. A monitoring system comprising a processor in communication with a network may monitor network traffic to or from an asset associated with the network. The monitoring system may assess the network traffic to determine a source and/or destination for the network traffic anchor content of the network traffic. The monitoring system may determine whether the network traffic is suspicious network traffic based on the assessed source and/or destination and/or content. When the network traffic is determined to be suspicious network traffic, the monitoring system may capture metadata associated with the suspicious network traffic and store the metadata in a database in communication with the processor. When the network traffic is not determined to be suspicious network traffic, the monitoring system may disregard metadata associated with the network traffic.Type: ApplicationFiled: August 30, 2013Publication date: March 6, 2014Applicant: DAMBALLA, INC.Inventors: Joseph Ward, Andrew Hobson