Bank of America Corporation
System and method for securing a network against malicious communications through peer-based cooperation
Last updated:
Abstract:
A computer system configured to execute an application includes a memory and a processor. The memory stores lists of trusted, malicious, and peer applications. Each application of the trusted list is associated with a maliciousness probability that is less than a lower threshold. Each application of the malicious list is associated with a maliciousness probability that is greater than an upper threshold. The peer list includes a peer application installed on a second computer system, which stores a second list of malicious applications. The processor determines that a second application not listed in the trusted or malicious lists is attempting to transmit a communication to the application. In response, the processor transmits a message to the peer application inquiring about the second application. The processor receives a response indicating that the second application is included in the second list of malicious applications and refuses the communication.
Utility
11 Jan 2021
12 Jul 2022