Invention Grant
- Patent Title: Techniques for identifying sources of unauthorized code
-
Application No.: US12855551Application Date: 2010-08-12
-
Publication No.: US08595843B1Publication Date: 2013-11-26
- Inventor: Karl A. McCabe , Jon A McClintock , David Erdmann
- Applicant: Karl A. McCabe , Jon A McClintock , David Erdmann
- Applicant Address: US NV Reno
- Assignee: Amazon Technologies, Inc.
- Current Assignee: Amazon Technologies, Inc.
- Current Assignee Address: US NV Reno
- Agency: Kilpatrick, Townsend & Stockton, LLP
- Main IPC: G06F15/16
- IPC: G06F15/16 ; H04L29/06 ; G06F12/14 ; G06F11/00 ; G06F12/16 ; G08B23/00

Abstract:
Techniques described and suggested herein include systems and methods for identifying potential sources of infections of devices by unauthorized code. In an embodiment, network traffic is logged. A plurality of computing devices that include unauthorized code is identified. The logged traffic is used to identify information sources accessed by the identified affected devices. The identified information sources may be refined. Refinement of the identified information sources may include excluding information sources that have been accessed by uninfected devices. A user interface that allows a user to further refine the identified information sources may be provided.
Information query