You are on page 1of 9

US 20060288417A1

(19) United States


(12) Patent Application Publication (10) Pub. No.: US 2006/0288417 A1
B00kbinder et al. (43) Pub. Date: Dec. 21, 2006
(54) METHOD AND APPARATUS FOR Publication Classification
MITIGATING THE EFFECTS OF
MALICOUS SOFTWARE IN A (51) Int. Cl.
COMMUNICATION NETWORK G06F 2/4 (2006.01)
(52) U.S. Cl. ................................................................ 726/24
(75) Inventors: James B. Bookbinder, Leander, TX
(US); Jon Paden, Austin, TX (US); (57) ABSTRACT
Antonio Green, Round Rock, TX (US); A controller (104) manages operations of a communication
Dawn Steele, Georgetown, TX (US); network (101). The controller has a communication element
Joe Garcia, Cedar Park, TX (US) (202) for monitoring data traffic in the communication
Correspondence Address: network and for controlling operations of the communica
AKERMAN SENTERFITT tion network, a memory (204) for storage, and a processor
P.O. BOX 3.188 (206) for controlling operations of the communication ele
WEST PALM BEACH, FL 33402-3188 (US) ment, and the memory. The processor is programmed to
9 monitor (302) the communication network for the effects of
(73) Assignee: SBC Knowledge Ventures LP, Reno malicious software, detect (304) a suspected malicious
NV event, record (306) the suspected malicious event, restrict
(308) Internet access to one or more customers suspected of
(21) Appl. No.: 11/157,774 having infected terminal equipment interrupting service of
the communication network, and notify (310) said one or
(22) Filed: Jun. 21, 2005 more customers of the restricted Internet access.

Monitor the Communication


network for effects of
malicious Software 302

Detected?
304

Record suspected
malicious event 306

Restrict Internet access to


One Or more Customers
suspected of having infected
terminal equipment 308

Notify customers of the


restricted access 310
Patent Application Publication Dec. 21, 2006 Sheet 1 of 3 US 2006/0288417 A1

Communication
104. Element 202
FIG. 2
Processor 206
Memory 204
Patent Application Publication Dec. 21, 2006 Sheet 2 of 3 US 2006/0288417 A1

Monitor the Communication


network for effects of
malicious Software 302

Detected?
304

Record suspected
malicious event 306

Restrict internet access to


One Or more CuStomers
Suspected of having infected
terminal equipment 308

Notify customers of the


restricted access 31 O

300
FIG. 3
Patent Application Publication Dec. 21, 2006 Sheet 3 of 3 US 2006/0288417 A1

Call Support Request? Internet ACCeSS


312
infected? infected?
318 314
Remove restricted
Yes access for specific
Customer 334 Supply web page with
notification and options to
remedy restriction 316
Notify customer of
restriction and options to
remedy restriction 320

Route Customer to
the agent 324.

Inform agent of suspected FIG. 4


malicious event and
association with customer 326

Remove Internet Yes


restriction on said Remove?
Customer 330 328

Record resolution 332


US 2006/0288417 A1 Dec. 21, 2006

METHOD AND APPARATUS FOR MITIGATING Suspected malicious event, restricting Internet access to one
THE EFFECTS OF MALICOUS SOFTWARE IN A or more customers Suspected of having infected terminal
COMMUNICATION NETWORK equipment interrupting service of the communication net
work, notifying said one or more customers of the restricted
FIELD OF THE INVENTION Internet access, and providing said one or more customers
0001. This invention relates generally to malicious soft with options to remove malicious software from their ter
ware, and more particularly to a method and apparatus for minal equipment.
mitigating the effects of malicious Software in a communi BRIEF DESCRIPTION OF THE DRAWINGS
cation network.
0008 FIG. 1 is block diagram of a communication
BACKGROUND OF THE INVENTION network according to an embodiment of the present inven
0002 Malicious software such as viruses and worms has tion;
been known to create bot networks, cause spamming, and 0009 FIG. 2 is block diagram of a controller managing
other destructive activities. A bot, also referred to as a the communication network according to an embodiment of
remote-access Trojan program, seeks out and places itself on the present invention; and
computers running silently in the background, thereby
allowing the attacker to operate the computer while the 0010 FIGS. 3-4 depict flowcharts of a method operating
owner is unaware. Such computers are generally referred to in the controller according to an embodiment of the present
invention.
as Zombies, which in the aggregate can be manipulated to
cause havoc to communication networks by way of exces DETAILED DESCRIPTION OF THE DRAWINGS
sive message congestion along with furthering the spread of
malicious Software to other computers. 0011 While the specification concludes with claims
0003. Many products have been developed to monitor defining the features of embodiments of the invention that
and remove malicious software. Although these products are regarded as novel, it is believed that the embodiments of
the invention will be better understood from a consideration
have proven useful, they have failed to provide a holistic of the following description in conjunction with the figures,
Solution for protecting large communication networks and in which like reference numerals are carried forward.
its customers.
0012 FIG. 1 is block diagram 100 of a communication
SUMMARY OF THE INVENTION network 101 according to an embodiment of the present
invention. The communication network 101 includes a num
0004 Embodiments in accordance with the invention ber of conventional network elements 102 for providing
provide a method and apparatus for mitigating the effects of communication services to customers of the service provider
malicious Software in a communication network.
of said network. The communication network 101 supports
0005. In a first embodiment of the present invention, a Internet services utilizing known (and future) technologies
computer-readable storage medium manages a communica such as as IP (Internet Protocol), MPLS (multi-protocol
tion network. The storage medium has computer instructions label switching), FR/ATM (Frame Relay/Asynchronous
for monitoring the communication network for the effects of Transfer Mode), just to mention a few. The network ele
malicious Software, detecting a suspected malicious event, ments 102 of the communication network 101 are managed
recording the Suspected malicious event, restricting Internet by a controller 104.
access to one or more customers Suspected of having 0013 The controller 104 comprises a communication
infected terminal equipment interrupting service of the com element 202, a memory 204, and a processor 206. The
munication network, and notifying said one or more cus communication element 202 utilizes convention communi
tomers of the restricted Internet access.
cation technology for monitoring data traffic in the commu
0006. In a second embodiment of the present invention, nication network 101. Said element 202 can also be used for
a controller manages operations of a communication net controlling operations of the network elements 102 of the
work. The controller has a communication element for communication network 101. The processor 206 can include
monitoring data traffic in the communication network and one or more conventional computers or servers for control
for controlling operations of the communication network, a ling operations of the communication network 101. The
memory for storage, and a processor for controlling opera memory 104 utilizes one or more conventional media
tions of the communication element, and the memory. The devices (such as a high capacity disk drive, Flash memory,
processor is programmed to monitor the communication Dynamic Random Access Memory, Random Access
network for the effects of malicious software, detect a Memory or other like memories) for storage purposes, and
Suspected malicious event, record the Suspected malicious can be used for managing a database of a service provider of
event, restrict Internet access to one or more customers said communication network 101.
Suspected of having infected terminal equipment interrupt
ing service of the communication network, and notify said 0014. The controller 104 can have several embodiments
one or more customers of the restricted Internet access. including an IVR (Interactive Voice Response) system, a
CRM (Customer Relationship Management) system, an
0007. In a third embodiment of the present invention, a ACD (Automatic Call Distributor) for routing customers to
controller manages a communication network according to selected agents, and combinations thereof that operate
a method. The method has the steps of monitoring the according to the invention. These embodiments can also
communication network for the effects of malicious soft operate as independent entities located in multiple geo
ware, detecting a suspected malicious event, recording the graphical sites cooperating amongst each other in accor
US 2006/0288417 A1 Dec. 21, 2006

dance with the present invention. Additionally, the controller virus protection software to remove the malicious software
106 can interact with customers of the communication can Subsequently Submit a request in step 312 by way of this
network 101 by way of the IVR system and/or via an web page (or the IVR) to remove the restriction in step 334.
Internet web site, and can interconnect said customers with In this step the controller 104 can remove the restriction on
Support personnel 106 serving as agents of the service a probationary basis by observing future behaviors of said
provider of the communication network 101. These agents terminal equipment before completely removing the alert
include customer Support, technical Support, or other spe information recorded in the CRM.
cialized personnel employed by the service provider to 0020. Alternatively, the customer can call a support cen
Support the methods of the present invention. ter of the service provider in step 312. In this embodiment,
0015. A function of the controller 104 is to mitigate the the IVR system of the controller 104 is used for interacting
effects of malicious software in a communication network with the customer. The IVR in step 318 checks whether the
101. FIGS. 3-4 depict flowcharts of a method 300 executing calling customer has infected terminal equipment as
Such purpose in the controller 104 according to an embodi recorded by the CRM. If it does not, then the IVR gracefully
ment of the present invention. Method 300 begins with step terminates the call with the customer and proceeds to step
302 in which the controller 104 monitors the communication 302. If, however, the caller is a suspected customer with
network 101 for the effects of malicious software such as infected equipment, then the IVR proceeds to step 320
viruses, worms or other classifications of software that are where it notifies the customer of the customer support and
intended to harm, misappropriate, or cause harmful effects. technical support centers available to assist her. In step 322
This step can be performed with conventional software the customer can choose to forego Such service, or proceed
algorithms that monitor the communication network 101 for to routing the customer to a selected agent at step 324.
one or more customers suspected of having infected terminal 0021 Depending on the expertise of the agent, the ser
equipment (e.g., PC, laptop, servers, etc.). vice may or may not be provided to the customer for free.
0016. The controller 104 continues to search for infected The agent in turn is informed by the controller 104 by way
customers until one or more are detected in step 304. Upon of the CRM of the situation relating to the calling customer
detecting an event in step 304, the controller proceeds to step in step 326. The agent can proceed to assist the customer in
306 where it records in the CRM portion of the controller remedying the infected terminal, or if further expertise is
104 the Suspected malicious event. This recording can required, route the caller to other technical Support person
provide all systems of the communication network 101 that nel. If the malicious software is successfully removed in step
have access the controller 104 constructive notice of the 328, then the agent proceeds to step 330 where it instructs
event and details relating thereto (e.g., city, customers the controller 104 to remove the restricted access. Addition
affected, Suspected virus type, time of detection, etc.) ally, the agent further instructs the controller 104 to record
0017. To avoid harm to the communication network 101 in the CRM the resolution in step 332.
and its unaffected customers, the controller 104 in step 308 0022. In the foregoing embodiments the term Internet
instructs the network elements 102 to restrict Internet access should be construed loosely. That is, the present invention
to those customers suspected of having infected terminal can be applied in any network independent of security
equipment. In step 310, these customers are notified of the boundaries (such as firewalls) installed by customers. The
restricted Internet access and are provided options to remedy term Internet can therefore mean Intranet and Extranet.
the restriction. The notification step can be provided by Thus, the present invention can be applied to any network
email, or by an over-the-air message to a cell phone of the element 102 manageable by the aforementioned controller
CuStOmer. 104.
0018 Method 300 continues in FIG. 4. In step 312, one 0023. It should be evident by now that the present inven
of several requests can come from these alerted customers. tion can be realized in hardware, software, or a combination
In one instance, one or more of the affected customers can of hardware and software. Moreover, the present invention
request access to the Internet after the restriction in step 308 can be realized in a centralized fashion, or in a distributed
has been established. The controller 104 processes this fashion where different elements are spread across several
request by determining in step 314 from the CRM if the interconnected processors. Any kind of computer device or
terminal equipment Submitting the request is a source of the other apparatus adapted for carrying out method 300
suspected malicious event. If not, the controller 104 allows described above is suitable for the present invention.
the access and proceeds to step 302. Otherwise, the control 0024. Additionally, the present invention can be embed
ler 104 Supplies in step 316 a web page with notification of ded in a computer program product, which comprises all the
the restricted access and one or more options to remedy the features enabling the implementation of method 300, and
Suspected malicious Software operating in the terminal which when loaded in a computer system is able to carry out
equipment of the customer. these methods as computer instructions. A computer pro
0019. The options can include, but are not limited to, gram in the present context means any expression, in any
providing a selection of downloadable software solutions language, code or notation, of a set of instructions intended
that the customer can acquire for free (or at a charge) to to cause a system having an information processing capa
remove the Suspected Software virus, providing contact bility to perform a particular function either directly or after
information for customer Service Support, and/or technical either or both of the following: a) conversion to another
Support, and accepting requests from the one or more language, code or notation; b) reproduction in a different
customers to remove the restricted access on the basis of material form. It should be also evident that the present
mitigation steps taken by said customers. Accordingly, a invention may be used for many applications. Thus,
customer who initiates self-help actions by downloading although the description is made for particular arrangements
US 2006/0288417 A1 Dec. 21, 2006

and methods, the intent and concept of the invention is What is claimed is:
Suitable and applicable to other arrangements and applica 1. A computer-readable storage medium for managing a
tions not described herein. For example, method 300 can be communication network, the storage medium comprising
reduced to steps 302,304,306,308 and 310 within the scope computer instructions for:
of the claimed invention. It would be clear therefore to those monitoring the communication network for the effects of
skilled in the art that modifications to the disclosed embodi malicious Software;
ments described herein could be effected without departing
from the spirit and scope of the invention. detecting a suspected malicious event;
recording the Suspected malicious event
0025. In accordance with various embodiments of the
present invention, the methods described herein are intended restricting Internet access to one or more customers
for operation as Software programs running on a computer Suspected of having infected terminal equipment inter
processor. Dedicated hardware implementations including, rupting service of the communication network; and
but not limited to, application specific integrated circuits, notifying said one or more customers of the restricted
programmable logic arrays and other hardware devices can Internet access.
likewise be constructed to implement the methods described 2. The storage medium of claim 1, comprising computer
herein. Furthermore, alternative software implementations instructions for providing said one or more customers with
including, but not limited to, distributed processing or options to remove malicious software from their terminal
component/object distributed processing, parallel process equipment.
ing, or virtual machine processing can also be constructed to 3. The storage medium of claim 1, comprising computer
implement the methods described herein. instructions for:

0026. It should also be noted that the software imple receiving a request from terminal equipment of one of
mentations of the present invention as described herein are said customers to access the Internet;
optionally stored on a tangible storage medium, Such as: a determining if said terminal equipment is a source of the
magnetic medium such as a disk or tape; a magneto-optical Suspected malicious event; and
or optical medium such as a disk; or a solid state medium if so, Supplying said terminal equipment an Internet web
Such as a memory card or other package that houses one or page with limited access to the communication network
more read-only (non-volatile) memories, random access providing notification of the restricted access and one
memories, other re-writable (volatile) memories or Signals or more options to remedy the Suspected malicious
containing instructions. A digital file attachment to e-mail or Software operating in said terminal equipment.
other self-contained information archive or set of archives 4. The storage medium of claim 3, wherein said options
sent through signals is considered a distribution medium are at least one among a group of options comprising
equivalent to a tangible storage medium. Accordingly, the instructions for selecting one or more software solutions to
invention is considered to include a tangible storage medium remove the suspected malicious software from the infected
or distribution medium, as listed herein and including art terminal equipment of said customer, offering customer
recognized equivalents and Successor media, in which the service Support, offering technical Support, and an option to
Software implementations herein are stored. accept requests from the one or more customers to remove
the restricted access on the basis of mitigation steps taken by
0027) Although the present specification describes com said customers.
ponents and functions implemented in the embodiments 5. The storage medium of claim 1, comprising computer
with reference to particular standards and protocols, the instructions for:
invention is not limited to Such standards and protocols. receiving an indication from one of said customers that
Each of the standards for Internet and other packet switched the Suspected malicious Software has been removed;
network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) and
represent examples of the state of the art. Such standards are
periodically superseded by faster or more efficient equiva removing the restricted access to the Internet for said
lents having essentially the same functions. Accordingly, CuStOmer.
replacement standards and protocols having the same func 6. The storage medium of claim 1, comprising computer
instructions for:
tions are considered equivalents.
receiving a call from one of said customers;
0028. Accordingly, the described embodiments ought to
be construed to be merely illustrative of some of the more determining if the terminal equipment of the calling
prominent features and applications of the invention. It customer is a source of the Suspected malicious event;
should also be understood that the claims are intended to and
cover the structures described herein as performing the notifying said customer of the restricted access and pro
recited function and not only structural equivalents. There vide one or more options to remedy the Suspected
fore, equivalent structures that read on the description malicious Software operating in the terminal equipment
should also be construed to be inclusive of the scope of the of said customer.
invention as defined in the following claims. Thus, reference 7. The storage medium of claim 6, wherein said options
should be made to the following claims, rather than to the are at least one among a group of options comprising
foregoing specification, as indicating the scope of the inven instructions for selecting one or more software solutions to
tion. remove the suspected malicious software from the infected
US 2006/0288417 A1 Dec. 21, 2006

terminal equipment of said customer, offering customer requests from the one or more customers to remove the
service Support, offering technical Support, and an option to restricted access on the basis of mitigation steps taken by
accept requests from the one or more customers to remove said customers.
the restricted access on the basis of mitigation steps taken by 13. The controller of claim 9, wherein the processor is
said customers. programmed to:
8. The storage medium of claim 6, comprising computer receive an indication from one of said customers that the
instructions for:
Suspected malicious Software has been removed; and
receiving a request from said customer for Support from remove the restricted access to the Internet for said
an agent of the communication network; CuStOmer.
routing said customer to the agent; 14. The controller of claim 9, wherein the processor is
programmed to:
informing the agent of the Suspected malicious event and
its association with said customer, receive a call from one of said customers;
removing upon a request of the agent the restricted determine if the terminal equipment of the calling cus
Internet access to said customer, and tomer is a source of the Suspected malicious event; and
recording that the Suspected malicious event has been notify said customer of the restricted access and provide
resolved for said customer. one or more options to remedy the Suspected malicious
9. A controller for managing operations of a communi Software operating in the terminal equipment of said
cation network, the controller comprising: CuStOmer.

a communication element for monitoring data traffic in 15. The controller of claim 14, wherein said options are at
the communication network and for controlling opera least one among a group of options comprising instructions
tions of the communication network; for selecting one or more software solutions to remove the
suspected malicious software from the infected terminal
a memory for storage; and equipment of said customer, offering customer service Sup
port, offering technical Support, and an option to accept
a processor for controlling operations of the communica requests from the one or more customers to remove the
tion element, and the memory, wherein the processor is restricted access on the basis of mitigation steps taken by
programmed to: said customers.
monitor the communication network for the effects of 16. The controller of claim 14, wherein the processor is
malicious Software; programmed to:
detect a suspected malicious event; receive a request from said customer for Support from an
agent of the communication network;
record the Suspected malicious event;
route said customer to the agent;
restrict Internet access to one or more customers sus
pected of having infected terminal equipment interrupt inform the agent of the Suspected malicious event and its
ing service of the communication network; and association with said customer,
notify said one or more customers of the restricted Inter remove upon a request of the agent the restricted Internet
net acceSS. access to said customer, and
10. The controller of claim 9, wherein the processor is record that the Suspected malicious event has been
programmed to provide said one or more customers with resolved for said customer.
options to remove malicious software from their terminal 17. In a controller that manages a communication net
equipment. work, a method comprising the steps of:
11. The controller of claim 9, wherein the processor is monitoring the communication network for the effects of
programmed to:
malicious Software;
receive a request from terminal equipment of one of said detecting a suspected malicious event;
customers to access the Internet;
determine if said terminal equipment is a source of the recording the Suspected malicious event;
Suspected malicious event; and restricting Internet access to one or more customers
Suspected of having infected terminal equipment inter
if so, Supply said terminal equipment an Internet web page rupting service of the communication network;
with limited access to the communication network
providing notification of the restricted access and one notifying said one or more customers of the restricted
or more options to remedy the Suspected malicious Internet access; and
Software operating in said terminal equipment. providing said one or more customers with options to
12. The controller of claim 11, wherein said options are at remove malicious Software from their terminal equip
least one among a group of options comprising instructions ment.
for selecting one or more software solutions to remove the 18. The method of claim 17, comprising the steps of:
suspected malicious software from the infected terminal
equipment of said customer, offering customer service Sup receiving a request from terminal equipment of one of
port, offering technical Support, and an option to accept said customers to access the Internet;
US 2006/0288417 A1 Dec. 21, 2006

determining if said terminal equipment is a source of the 20. The method of claim 17, comprising the steps of:
Suspected malicious event; and
receiving a call from one of said customers;
if so, Supplying said terminal equipment an Internet web
page with limited access to the communication network determining if the terminal equipment of the calling
providing notification of the restricted access and one customer is a source of the Suspected malicious event;
or more options to remedy the Suspected malicious and
Software operating in said terminal equipment, wherein
said options are at least one among a group of options notifying said customer of the restricted access and pro
comprising instructions for selecting one or more soft vide one or more options to remedy the Suspected
ware solutions to remove the Suspected malicious Soft malicious Software operating in the terminal equipment
ware from the infected terminal equipment of said
customer, offering customer service Support, offering of said customer, wherein said options are at least one
technical Support, and an option to accept requests from among a group of options comprising instructions for
the one or more customers to remove the restricted Selecting one or more software solutions to remove the
access on the basis of mitigation steps taken by said suspected malicious software from the infected termi
CuStOmerS.
19. The method of claim 17, comprising the steps of: nal equipment of said customer, offering customer
service Support, offering technical Support, and an
receiving an indication from one of said customers that option to accept requests from the one or more cus
the Suspected malicious Software has been removed; tomers to remove the restricted access on the basis of
and mitigation steps taken by said customers.
removing the restricted access to the Internet for said
CuStOmer.

You might also like