×

Systems and methods for IP-based intrusion detection

  • US 10,091,221 B1
  • Filed: 06/06/2017
  • Issued: 10/02/2018
  • Est. Priority Date: 03/13/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for device security comprising:

  • analyzing, using one or more processors of a server computer, a login history comprising login request data for the server computer to identify a plurality of usernames, wherein each username of the plurality of usernames is associated with a corresponding login request from a first internet protocol (IP) address within a threshold time period of a first request time, wherein the login history comprises at least a first login request associated with a username, a password, the first IP address, and a first login request time;

    determining, using the one or more processors, that a total number of login requests from the first IP address within the threshold time period is above a credential security threshold;

    determining, using the one or more processors, that a number of usernames associated with the total number of login requests is above a username threshold;

    determining, using the one or more processors, that a login success ratio is below a threshold login success ratio after determining that the total number of login requests from the first IP address is above the credential security threshold; and

    in response to determining the login success ratio is below the threshold login success ratio and determining that a number of unique usernames is above a unique username threshold, automatically performing a security action using the server computer;

    wherein the security action further comprises;

    identifying, using the one or more processors, a plurality of accounts, wherein each account of the plurality of accounts is associated with a successful login from the IP address during the threshold time period;

    identifying, for each account of the plurality of accounts using the one or more processors, an associated set of user actions taken during the threshold time period; and

    initiating, using the one or more processors, a custom security action for each account based on the associated set of user actions for each account;

    determining, using the one or more processors, a total number of locations associated with registration of the plurality of usernames; and

    initiating, using the one or more processors, a group security action for the plurality of usernames when the total number of locations is above a location threshold value.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×