US 12,265,621 B2
Ransomware activity detection and data protection
Mohammed Asher Vt, Bangalore (IN); Ramesh Doddaiah, Westborough, MA (US); Sandeep Chandrashekhara, Shrewsbury, MA (US); and Malak Alshawabkeh, Franklin, MA (US)
Assigned to Dell Products, L.P., Hopkinton, MA (US)
Filed by Dell Products, L.P., Hopkinton, MA (US)
Filed on Mar. 20, 2023, as Appl. No. 18/186,279.
Prior Publication US 2024/0320340 A1, Sep. 26, 2024
Int. Cl. G06F 21/56 (2013.01)
CPC G06F 21/568 (2013.01) [G06F 21/565 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of detecting ransomware activity, comprising: implementing an asynchronous remote data replication facility between a primary storage array and a remote storage array, in which data contained in a first set of storage volumes of a first remote data replication storage group at the primary storage array is copied in an asynchronous manner from the primary storage array to the remote storage array to replicate the data in a second set of storage volumes of a second remote data replication storage group at the remote storage array; receiving host read and write operations on the first set of storage volumes by the primary storage array during a capture cycle; generating a remote data replication update including all of the host write operations on the first set of storage volumes during the capture cycle; generating a host input/output (IO) metadata update describing all of the host write operations and all of the host read operations on the first set of storage volumes during the capture cycle; transmitting the remote data replication update and the host IO metadata update at the end of the capture cycle to the remote storage array; receiving the remote data replication update and the host IO metadata update during a receive cycle at the remote storage array; temporarily storing the remote data replication update without applying any of the host write operations contained in the remote data replication update to the second set of storage volumes; and while temporarily storing the remote data replication update, performing ransomware anomaly detection using the remote data replication update and the host IO metadata update to determine when any of the host write operations are likely associated with ransomware activity; in response to a determination that one or more of the host write operations is likely associated with ransomware activity, protecting the data contained in the second set of storage volumes; and in response to a determination that none of the host write operations are likely associated with ransomware activity, applying the host write operations contained in the remote data replication update to the second set of storage volumes.