RANSOMWARE INFECTION DETECTION IN FILESYSTEMS

    公开(公告)号:US20230409713A1

    公开(公告)日:2023-12-21

    申请号:US18458466

    申请日:2023-08-30

    Applicant: Rubrik, Inc.

    Abstract: Described herein is a system that detects ransomware infection in filesystems. The system detects ransomware infection by using backup data of machines. The system detects ransomware infection in two stages. In the first stage, the system analyzes a filesystem's behavior. The filesystem's behavior can be obtained by loading the backup data and crawling the filesystem to create a filesystem metadata including information about file operations during a time interval. The filesystem determines a pattern of the file operations and compares the pattern to a normal patter to analyze the filesystem's behavior. If the filesystem's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the filesystem. The system combines the analysis of both stages to determine whether the filesystem is infected by ransomware.

    Ransomware infection detection in filesystems

    公开(公告)号:US11783036B2

    公开(公告)日:2023-10-10

    申请号:US17370203

    申请日:2021-07-08

    Applicant: Rubrik, Inc.

    Abstract: Described herein is a system that detects ransomware infection in filesystems. The system detects ransomware infection by using backup data of machines. The system detects ransomware infection in two stages. In the first stage, the system analyzes a filesystem's behavior. The filesystem's behavior can be obtained by loading the backup data and crawling the filesystem to create a filesystem metadata including information about file operations during a time interval. The filesystem determines a pattern of the file operations and compares the pattern to a normal patter to analyze the filesystem's behavior. If the filesystem's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the filesystem. The system combines the analysis of both stages to determine whether the filesystem is infected by ransomware.

    Identifying a software vulnerability

    公开(公告)号:US11593491B2

    公开(公告)日:2023-02-28

    申请号:US16668964

    申请日:2019-10-30

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: Systems and methods to identify a software vulnerability are described. The system receives a message identifying a software vulnerability. The system identifies snapshot images taken of a production machine and stored in a database. The snapshot images include a snapshot image including a virtual machine. The snapshot images are identified being based on the message. The system identifies whether the snapshot images include the software vulnerability. The system registers the software vulnerability in association with a snapshot image in the database responsive to the identification of the snapshot image of the virtual machine including the software vulnerability.

    Real-time detection of misuse of system credentials

    公开(公告)号:US11550901B2

    公开(公告)日:2023-01-10

    申请号:US16263338

    申请日:2019-01-31

    Applicant: Rubrik, Inc.

    Abstract: A process for detecting a threat for a file system is described. Audit events in the file system may be accessed, which may include unique file operations and duplicative file operations. The audit events may be de-duplicated to remove the duplicative file operations. Time series data may be generated that includes the unique file operations but not the duplicative file operations, and the time series data may be analyzed to determine whether a subset of the unique file operations includes file-access instructions. An observed pattern of the file-access instructions may be compared to a normal pattern of file-access instructions to determine whether the observed file-access instructions are abnormal. If the observed file-access instructions are abnormal, an alert may be generated.

    AUTOMATED DEVELOPMENT OF RECOVERY PLANS

    公开(公告)号:US20210406135A1

    公开(公告)日:2021-12-30

    申请号:US17141570

    申请日:2021-01-05

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: An automated system monitors network traffic to determine dependencies between different machines. These dependencies can be used to automatically develop a recovery plan for the machines, for example restoring servers in a certain order. This approach can also automatically adjust the recovery plan for changes in system configuration, for example as different servers come online or are taken offline or change their roles.

    IDENTIFYING A SOFTWARE VULNERABILITY

    公开(公告)号:US20210133328A1

    公开(公告)日:2021-05-06

    申请号:US16668964

    申请日:2019-10-30

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: Systems and methods to identify a software vulnerability are described. The system receives a message identifying a software vulnerability. The system identifies snapshot images taken of a production machine and stored in a database. The snapshot images include a snapshot image including a virtual machine. The snapshot images are identified being based on the message. The system identifies whether the snapshot images include the software vulnerability. The system registers the software vulnerability in association with a snapshot image in the database responsive to the identification of the snapshot image of the virtual machine including the software vulnerability.

    INTELLIGENT SCHEDULING OF BACKUPS
    30.
    发明申请

    公开(公告)号:US20190266016A1

    公开(公告)日:2019-08-29

    申请号:US16287199

    申请日:2019-02-27

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: A system for reducing VM stunting during backup of a set of virtual machines is provided. In some examples, a system comprises processors and a memory storing instructions that, when executed by at least one processor among the processors, cause the system to perform certain operations. Example operations may include running an analytic process to learn resource utilization patterns of a hypervisor system monitoring the set of virtual machines, determining an opportunistic window of reduced resource utilization based on the resource utilization patterns, and scheduling backup for the set of virtual machines during the opportunistic window.

Patent Agency Ranking