Integrated security system having rule optimization
First Claim
Patent Images
1. A method, comprising:
- receiving one or more threats corresponding to a security device;
displaying the one or more threats and one or more rules generated in response to receiving the one or more threats;
receiving configuration information on the one or more generated rules;
generating an optimal suggested placement of the one or more generated rules in a list of existing rules for the security device;
modifying, based on an input on the displayed one or more generated rules, the optimal suggested placement of the one or more generated rules, wherein modifying the optimal suggested placement of the one or more generated rules includes determining if the modification will lead to one or more anomalies;
in response to the modifying the optimal suggested placement of the one or more generated rules, generating a rule anomalies analysis report of any anomalies resulting from the modification;
displaying the modified optimal suggested placement of the one or more generated rules;
displaying the rule anomalies analysis report; and
selectively deploying, based on an input of the displayed modified optimal suggested placement of the one or more generated rules, the modified optimal suggested placement of the one or more generated rules in the list of existing rules of the security device.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact with the graphical representation of rules rendered by the threat control module and, responsive to the interaction, the system may determine an optimal placement for the created rule in the list of rules for the identified security device based on either the existence of anomalies or threat IP data and/or advanced security parameters. In this way, the system allows administrators to configure rules with the most optimal sequence to detect threats.
61 Citations
12 Claims
-
1. A method, comprising:
-
receiving one or more threats corresponding to a security device; displaying the one or more threats and one or more rules generated in response to receiving the one or more threats; receiving configuration information on the one or more generated rules; generating an optimal suggested placement of the one or more generated rules in a list of existing rules for the security device; modifying, based on an input on the displayed one or more generated rules, the optimal suggested placement of the one or more generated rules, wherein modifying the optimal suggested placement of the one or more generated rules includes determining if the modification will lead to one or more anomalies; in response to the modifying the optimal suggested placement of the one or more generated rules, generating a rule anomalies analysis report of any anomalies resulting from the modification; displaying the modified optimal suggested placement of the one or more generated rules; displaying the rule anomalies analysis report; and selectively deploying, based on an input of the displayed modified optimal suggested placement of the one or more generated rules, the modified optimal suggested placement of the one or more generated rules in the list of existing rules of the security device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
one or more processors; one or more computer-readable memories; a rule analysis module that executes on one or more processors, wherein the rule analysis module; receives one or more threats corresponding to a security device, generates an optimal suggested placement of one or more generated rules in a list of existing rules for the security device, modifies, based on an input on the one or more generated rules which are displayed, the optimal suggested placement of the one or more generated rules, wherein, to modify the optimal suggested placement of the one or more generated rules includes determining if the modification will lead to one or more anomalies, and generates, in response to the modification, a rule anomalies analysis report of any anomalies resulting from the modification; and a threat control module that executes on one or more processors, wherein the threat control module; displays the one or more threats and the one or more generated rules which are generated in response to receiving the one or more threats, displays the optimal suggested placement of the one or more generated rules in the list of existing rules, displays the modified optimal suggested placement of the one or more generated rules, and displays the rule anomalies analysis report; and a policy deployment engine that executes on one or more processors, wherein the policy deployment engine selectively deploys the modified optimal suggested placement of the one or more generated rules in the list of existing rules of the security device based on an input of the displayed modified optimal suggested placement of the one or more generated rules. - View Dependent Claims (11, 12)
-
Specification