IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0030745
(2013-09-18)
|
등록번호 |
US-9065849
(2015-06-23)
|
발명자
/ 주소 |
- Rivera, Shireen H.
- Ashley, Peter
|
출원인 / 주소 |
|
대리인 / 주소 |
ALG Intellectual Property, LLC
|
인용정보 |
피인용 횟수 :
9 인용 특허 :
0 |
초록
▼
A computer-implemented method for determining trustworthiness of software programs may include (1) determining, for at least one software program, a prevalence score that indicates a prevalence of the software program within a local network, (2) obtaining, for the software program, a reputation scor
A computer-implemented method for determining trustworthiness of software programs may include (1) determining, for at least one software program, a prevalence score that indicates a prevalence of the software program within a local network, (2) obtaining, for the software program, a reputation score that indicates a reputation of the software program, (3) determining a trustworthiness of the software program based on both the reputation score of the software program and the prevalence score of the software program, and (4) performing a security action based on the trustworthiness of the software program. Various other methods, systems, and computer-readable media are also disclosed.
대표청구항
▼
1. A computer-implemented method for determining trustworthiness of software programs, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising: determining, for at least one software program, a prevalence score that indicates a
1. A computer-implemented method for determining trustworthiness of software programs, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising: determining, for at least one software program, a prevalence score that indicates a prevalence of the software program within a local network;obtaining, for the software program, a reputation score that indicates a prevalence of the software program outside the local network;comparing the prevalence score with the reputation score to a determine trustworthiness of the software program based on both the reputation score of the software program and the prevalence score of the software program;performing a security action based on the trustworthiness of the software program. 2. The computer-implemented method of claim 1, wherein the prevalence score comprises at least one of: a percentage of devices within the local network on which the software program is present;a number of instances of the software program installed within the local network. 3. The computer-implemented method of claim 1, wherein comparing the prevalence score with the reputation score to determine the trustworthiness of the software program comprises: determining, based on the prevalence score and the reputation score, that the prevalence of the software program in the local network is greater than the prevalence of the software program outside the local network;determining, based the prevalence of the software program being greater inside the local network than outside the local network, that the software program is likely an internal program for the local network and does not comprise a malware threat. 4. The computer-implemented method of claim 1, wherein obtaining the reputation score comprises: calculating a total number of devices surveyed outside the local network on which the software program is installed;calculating a percentage of devices surveyed outside the local network on which the software program is installed. 5. The computer-implemented method of claim 1, further comprising: conducting a malware deep scan on one or more devices in the local network to determine whether the software program potentially comprises malware;determining that the prevalence score indicates that the software program has not been identified within the local network, wherein the prevalence score is based on an inventory of software programs used within the local network;determining that the software program was identified during the malware deep scan;determining, based on the software program not being identified in the inventory of software programs and being identified during the malware deep scan, that the software program may comprise a rootkit threat;wherein the trustworthiness determination is further based on the determination that the software program may comprise the rootkit threat. 6. The computer-implemented method of claim 1, wherein determining the prevalence score comprises taking an inventory of software programs installed on local devices within the local network by at least one of: querying the local devices;performing a remote scan of the local devices;querying an application inventory system for inventory data about software applications installed within the local network. 7. The computer-implemented method of claim 1, wherein comparing the prevalence score with the reputation score to determine the trustworthiness of the software program comprises: determining that the prevalence score is below a threshold and indicates low prevalence of the software program in the local network;determining that the reputation score indicates that the software program has not been identified outside the local network;determining, based on the low prevalence of the software program in the local network and absence of the software program outside the local network, that the software program may comprise an advanced persistent threat. 8. The computer-implemented method of claim 1, wherein comparing the prevalence score with the reputation score to determine the trustworthiness of the software program comprises: determining that the prevalence score is below a local-prevalence threshold and indicates low prevalence of the software program in the local network;determining that the reputation score indicates that the prevalence of the software program outside the local network is above a global-prevalence threshold and is therefore high;determining, based on the low prevalence of the software program in the local network and the high prevalence of the software program outside the local network, that the software program does not comprise a malware threat. 9. The computer-implemented method of claim 1, wherein comparing the prevalence score with the reputation score to determine the trustworthiness of the software program comprises: determining that the prevalence score is below a local-prevalence threshold and indicates low prevalence of the software program in the local network;determining that the reputation score indicates that the prevalence of the software program outside the local network is below a global-prevalence threshold and is therefore low;determining, based on the low prevalence of the software program in the local network and the low prevalence of the software program outside the local network, that the software program may comprise a malware threat. 10. A system for determining trustworthiness of software programs, the system comprising: a prevalence module, stored in memory, that determines, for at least one software program, a prevalence score that indicates a prevalence of the software program within a local network;a reputation module, stored in memory, that obtains, for the software program, a reputation score that indicates a prevalence of the software program outside the local network;a trustworthiness module, stored in memory, that compares the prevalence score with the reputation score to determine a trustworthiness of the software program based on both the reputation score of the software program and the prevalence score of the software program;a security module, stored in memory, that performs a security action based on the trustworthiness of the software program;at least one hardware processor that executes the prevalence module, the reputation module, the trustworthiness module, and the security module. 11. The system of claim 10, wherein the prevalence score comprises at least one of: a percentage of devices within the local network on which the software program is present;a number of instances of the software program installed within the local network. 12. The system of claim 10, wherein the trustworthiness module compares the prevalence score with the reputation score to determine the trustworthiness of the software program by: determining, based on the prevalence score and the reputation score, that prevalence of the software program in the local network is greater than the prevalence of the software program outside the local network;determining, based the prevalence of the software program being greater inside the local network than outside the local network, that the software program is likely an internal program for the local network and does not comprise a malware threat. 13. The system of claim 10, wherein the reputation module obtains the reputation score by: calculating a total number of devices surveyed outside the local network on which the software program is installed;calculating a percentage of devices surveyed outside the local network on which the software program is installed. 14. The system of claim 10, wherein the trustworthiness module determines the trustworthiness of the software program by: determining that the prevalence score is below a local-prevalence threshold and indicates low prevalence of the software program in the local network;determining that the reputation score indicates that the prevalence of the software program outside the local network is below a global-prevalence threshold and is therefore low;determining, based on the low prevalence of the software program in the local network and the low prevalence of the software program outside the local network, that the software program does not comprise a malware threat. 15. The system of claim 13, wherein the prevalence module determines the prevalence score by taking an inventory of software programs installed on local devices within the local network by at least one of: querying the local devices;performing a remote scan of the local devices;querying an application inventory system for inventory data about software applications installed within the local network. 16. The system of claim 10, wherein trustworthiness module compares the prevalence score with the reputation score to determine the trustworthiness of the software program by: determining that the prevalence score is below a threshold and indicates low prevalence of the software program in the local network;determining that the reputation score indicates that the software program has not been identified outside the local network;determining, based on the low prevalence of the software program in the local network and absence of the software program outside the local network, that the software program may comprise an advanced persistent threat. 17. The system of claim 10, wherein the trustworthiness module compares the prevalence score with the reputation score to determine the trustworthiness of the software program by: determining that the prevalence score is below a local-prevalence threshold and indicates low prevalence of the software program in the local network;determining that the reputation score indicates that the prevalence of the software program outside the local network is above a global-prevalence threshold and is therefore high;determining, based on the low prevalence of the software program in the local network and the high prevalence of the software program outside the local network, that the software program does not comprise a malware threat. 18. The system of claim 10, wherein the trustworthiness module compares the prevalence score with the reputation score to determine the trustworthiness of the software program by: determining that the prevalence score is below a local-prevalence threshold and indicates low prevalence of the software program in the local network;determining that the reputation score indicates that the prevalence of the software program outside the local network is above a global-prevalence threshold and is therefore high;determining, based on the low prevalence of the software program in the local network and the high prevalence of the software program outside the local network, that the software program represents a potential compliance risk for the local network. 19. The system of claim 10, wherein the trustworthiness module further determines the trustworthiness of the software program by: determining that the prevalence score is below a local-prevalence threshold and indicates low prevalence of the software program in the local network;determining that the reputation score indicates that the software program violates a policy of the local network;determining, based on the low prevalence of the software program in the local network and the software program violating the policy of the local network, that the software program potentially poses a threat to the local network. 20. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to: determine, for at least one software program, a prevalence score that indicates a prevalence of the software program within a local network;obtain, for the software program, a reputation score that indicates a prevalence of the software program outside the local network;compare the prevalence score with the reputation score to determine a trustworthiness of the software program based on both the reputation score of the software program and the prevalence score of the software program;perform a security action based on the trustworthiness of the software program.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.