| CPC H04L 63/1416 (2013.01) [G06F 21/44 (2013.01); G06F 21/52 (2013.01); G06F 21/554 (2013.01); H04L 9/3242 (2013.01); H04L 63/0876 (2013.01); H04L 63/1425 (2013.01); H04L 63/1466 (2013.01); G06F 21/55 (2013.01); H04L 63/0428 (2013.01)] | 20 Claims |

|
1. A method comprising:
extracting, at a service, one or more Transport Layer Security (TLS)-based features from encrypted traffic sent by an endpoint device in a network;
analyzing, by the service, the one or more extracted TLS-based features to infer an identity of an application on the endpoint device that sent the encrypted traffic;
receiving, at the service and from a monitoring agent on the endpoint device, application telemetry data regarding the application;
determining, by the service, that the application is malware based on the identity of the application inferred from the one or more extracted TLS-based features and on the application telemetry data received from the monitoring agent on the endpoint device by:
determining an identity of the application based on the application telemetry data received from the monitoring agent on the endpoint device, and
comparing the identity of the application determined based on the application telemetry data with the identity of the application inferred from the one or more extracted TLS-based features; and
initiating, by the service, performance of a mitigation action in the network, after determining that the application on the endpoint device is malware.
|