Integrated network intrusion detection
First Claim
1. A method comprising:
- receiving, by a compute device, a request for access to network services from an invoked application;
applying, by the compute device, a set of executable instructions of the invoked application to a hash function to generate a hash value;
identifying, by the compute device, the invoked application based on the hash value;
obtaining, by the compute device, a network policy specific to the identified application;
performing, by the compute device, a statistical analysis of previous communications from the identified application;
setting, by the compute device and as a function of the statistical analysis, a configurable threshold indicative of a severity of a violation of the network policy specific to the identified application;
determining, by the compute device, whether the request is a violation of the network policy;
determining, in response to a determination that the request is a violation of the network policy, the severity of the violation based on the associated configurable threshold in the network policy specific to the identified application; and
performing, by the compute device, one or more actions as a function of the determined severity including loading, from a central security server, application-specific intrusion signatures and searching packets associated with the application for the application-specific intrusion signatures.
1 Assignment
0 Petitions
Accused Products
Abstract
Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network communications may be singled out for greater scrutiny, by performing intrusion analysis on packets blocked by a firewall. An integrated intrusion detection system uses an end-node firewall that is dynamically controlled using invoked-application information and a network policy. The system may use various alert levels to trigger heightened monitoring states, alerts sent to a security operation center, and/or logging of network activity for later forensic analysis. The system may monitor network traffic to block traffic that violates the network policy, monitor blocked traffic to detect an intrusion prelude, and monitor traffic from a potential intruder when an intrusion prelude is detected. The system also may track behavior of applications using the network policy to identify abnormal application behavior, and monitor traffic from an abnormally behaving application to identify an intrusion.
112 Citations
10 Claims
-
1. A method comprising:
-
receiving, by a compute device, a request for access to network services from an invoked application; applying, by the compute device, a set of executable instructions of the invoked application to a hash function to generate a hash value; identifying, by the compute device, the invoked application based on the hash value; obtaining, by the compute device, a network policy specific to the identified application; performing, by the compute device, a statistical analysis of previous communications from the identified application; setting, by the compute device and as a function of the statistical analysis, a configurable threshold indicative of a severity of a violation of the network policy specific to the identified application; determining, by the compute device, whether the request is a violation of the network policy; determining, in response to a determination that the request is a violation of the network policy, the severity of the violation based on the associated configurable threshold in the network policy specific to the identified application; and performing, by the compute device, one or more actions as a function of the determined severity including loading, from a central security server, application-specific intrusion signatures and searching packets associated with the application for the application-specific intrusion signatures. - View Dependent Claims (2, 3)
-
-
4. One or more non-transitory computer-readable storage media comprising a plurality of instructions that, when executed by a compute device, cause the compute device to:
-
receive a request for access to network services from an invoked application; apply a set of executable instructions of the invoked application to a hash function to generate a hash value; identify the invoked application based on the hash value; obtain a network policy specific to the identified application; perform a statistical analysis of previous communications from the identified application; set, as a function of the statistical analysis, a configurable threshold indicative of a severity of a violation of the network policy specific to the identified application; determine whether the request is a violation of the network policy; determine, in response to a determination that the request is a violation of the network policy, the severity of the violation based on the associated configurable threshold in the network policy specific to the identified application; and perform one or more actions as a function of the determined severity including loading, from a central security server, application-specific intrusion signatures and searching packets associated with the application for the application-specific intrusion signatures. - View Dependent Claims (5)
-
-
6. A system comprising:
-
a processor; a communication interface coupled with the processor; and a non-transitory machine-readable medium operatively coupled with the processor and embodying machine instructions for causing the processor to; receive a request for access to network services from an invoked application; apply a set of executable instructions of the invoked application to a hash function to generate a hash value; identify the invoked application based on the hash value; obtain a network policy specific to the identified application; perform a statistical analysis of previous communications from the identified application; set, as a function of the statistical analysis, a configurable threshold indicative of a severity of a violation of the network policy specific to the identified application; determine whether the request is a violation of the network policy; determine, in response to a determination that the request is a violation of the network policy, the severity of the violation based on the associated configurable threshold in the network policy specific to the identified application; and perform one or more actions as a function of the determined severity including loading, from a central security server, application-specific intrusion signatures and searching packets associated with the application for the application-specific intrusion signatures. - View Dependent Claims (7, 8, 9, 10)
-
Specification