1
Ashar Aziz, Adrian Drzewiecki, Ramesh Radhakrishnan, Jayaraman Manni, Muhammad Amin: Heuristic based capture with replay to virtual machine. FireEye, Carr & Ferrell, May 1, 2012: US08171553 (151 worldwide citation)

A suspicious activity capture system can comprise a tap configured to copy network data from a communication network, and a controller. The controller is coupled to the tap and is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heuristic t ...


2
Ashar Aziz, Wei Lung Lai, Jayaraman Manni: Malware containment on connection. FireEye, Blakely Sokoloff Taylor & Zafman, October 22, 2013: US08566946 (144 worldwide citation)

Systems and methods for malware containment on connection are provided. Digital devices are quarantined for a predetermined period of time upon connection to the communication network. When a digital device is quarantined, all network data transmitted by the digital device is temporarily directed to ...


3
Ashar Aziz, Wei Lung Lai, Jayaraman Manni: Malware containment and security analysis on connection. FireEye, Blakely Sokoloff Taylor & Zafman, September 17, 2013: US08539582 (138 worldwide citation)

Systems and methods for malware containment and security analysis on connection are provided. Digital devices are quarantined for a predetermined period of time upon connection to the communication network. When a digital device is quarantined, all network data transmitted by the digital device is d ...


4
Ashar Aziz, Wei Lung Lai, Jayaraman Manni: Systems and methods for detecting encrypted bot command and control communication channels. FireEye, Carr & Ferrell, June 19, 2012: US08204984 (136 worldwide citation)

Methods and systems for detecting encrypted bot command and control communication channels are provided. In the exemplary method, the presence of a communication channel between a first network device and a second network device is monitored. Active and inactive periods of the network device are det ...


5
Ashar Aziz, Ramesh Radhakrishnan, Wei Lung Lai, Jayaraman Manni: Dynamic signature creation and enforcement. FireEye, Blakely Sokoloff Taylor & Zafman, February 12, 2013: US08375444 (132 worldwide citation)

A dynamic signature creation and enforcement system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap. The controller is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heu ...


6
Ashar Aziz, Adrian Drzewiecki, Ramesh Radhakrishnan, Jayaraman Manni, Muhammad Amin: Policy based capture with replay to virtual machine. FireEye, Carr & Ferrell, October 16, 2012: US08291499 (131 worldwide citation)

A suspicious activity capture system can comprise a tap configured to copy network data from a communication network, and a controller. The controller is coupled to the tap and is configured to receive the copy of the network data from the tap, analyze the copy of the network data to flag the networ ...


7
Ashar Aziz, Wei Lung Lai, Jayaraman Manni: Systems and methods for detecting communication channels of bots. FireEye, Blakely Sokoloff Taylor & Zafman, October 15, 2013: US08561177 (129 worldwide citation)

Exemplary systems and methods for detecting a communication channel of a bot. In exemplary embodiments, presence of a communication channel between a first network device and a second network device is detected. Data from the communication channel is scanned and used to determine if a suspected bot ...


8
Osman Abdoul Ismael, Samuel Yie, Jayaraman Manni, Muhammad Amin, Bahman Mahbod: Detecting malicious network content using virtual environment components. FireEye, Blakely Sokoloff Taylor & Zafman, July 29, 2014: US08793787 (105 worldwide citation)

Malicious network content is identified based on the behavior of one or more virtual environment components which process network content in a virtual environment. Network content can be monitored and analyzed using a set of heuristics. The heuristics identify suspicious network content communicated ...


9
Jayaraman Manni, Ashar Aziz, Fengmin Gong, Upendran Loganathan, Muhammad Amin: Network-based binary file extraction and analysis for malware detection. FireEye, Blakely Sokoloff Taylor & Zafman, September 9, 2014: US08832829 (104 worldwide citation)

A system and method are disclosed for network-based file analysis for malware detection. Network content is received from a network tap. A binary packet is identified in the network content. A binary file, including the binary packet, is extracted from the network content. It is determined whether t ...


10
Ashar Aziz, Wei Lung Lai, Jayaraman Manni: Systems and methods for malware attack prevention. FireEye, Blakely Sokoloff Taylor & Zafman, November 25, 2014: US08898788 (100 worldwide citation)

Systems and methods for malware attack prevention are provided. Network data is copied from a communication network. It is then determined if a possible malware attack is within the copied network data. The network data is intercepted based on the determination. The network data is then analyzed to ...