×

Techniques for sharing network security event information

  • US 10,032,020 B2
  • Filed: 07/17/2017
  • Issued: 07/24/2018
  • Est. Priority Date: 02/01/2012
  • Status: Active Grant
First Claim
Patent Images

1. A tangible, non-transitory, machine-readable medium, comprising machine-readable instructions that when executed by at least one processor, cause the at least one processor to:

  • access one or more processor-interpretable rules comprising one or more conditions to be satisfied prior to performing one or more computer-implemented actions, the one or more computer-implemented actions comprising an adjustment of when to receive a possible threat notification, an adjustment of data provided in the possible threat notification, the possible threat notification indicative of a computer network threat, an adjustment to a computer-implemented threat remediation action, or any combination thereof;

    determine when the one or more conditions are satisfied;

    perform the computer-implemented actions associated with a first network device when the one or more conditions are satisfied;

    receive the possible threat notification from the first network device;

    determine whether additional possible threat notifications corresponding to the possible threat notification are received from an alternative network device;

    determine a set of common characteristics between the first network device and the alternative network device by accessing a first profile associated with the first network device and by filtering based upon the first profile, wherein when commonality between the first network device and the alternative network device has reached a first threshold, perform a first computer-implemented action of the one or more computer-implemented actions,and wherein when the commonality has reached a second threshold, perform a second computer-implemented action of the one or more computer-implemented actions different from the first computer-implemented action;

    when additional possible threat notifications corresponding to the possible threat notification have been received from the alternative network device, generate and provide electronic data to the first network device to cause performance of the computer-implemented threat remediation action at the first network device; and

    identify at least one third network device having the set of common characteristics and wherein the computer-implemented threat remediation action comprises providing a notification to the at least one third network device of possible threats indicated from network devices having the set of common characteristics.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×