Network isolation by policy compliance evaluation
First Claim
1. A method comprising:
- maintaining, in an internal network, a plurality of internal nodes, each node of the plurality of internal nodes comprising a corresponding node configuration;
receiving, at the internal network, network traffic from an outside network;
analyzing, by a node of the internal network, the node configuration of a first node of the internal network and the received network traffic;
calculating, in real-time and based on the analysis of the node configuration, a network vulnerability score, the network vulnerability score measuring the vulnerability of the network to malicious action;
determining if the network vulnerability score is below a vulnerability threshold;
responsive to determining that the network vulnerability score is below the vulnerability threshold, isolating the internal network from the outside network by instructing a DNS server of the internal network to prevent resolution of DNS requests from the outside network; and
after isolating the internal network;
reconfiguring the first node of the internal network;
simulating the received network traffic on the isolated network including the reconfigured first node;
calculating a simulated network vulnerability score based on the simulated received network traffic and measuring the expected vulnerability of the network to malicious action if the network were not isolated from the outside network; and
in response to the simulated network vulnerability score exceeding the vulnerability threshold, reversing the isolation of the internal network from the outside network.
1 Assignment
0 Petitions
Accused Products
Abstract
An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.
70 Citations
11 Claims
-
1. A method comprising:
-
maintaining, in an internal network, a plurality of internal nodes, each node of the plurality of internal nodes comprising a corresponding node configuration; receiving, at the internal network, network traffic from an outside network; analyzing, by a node of the internal network, the node configuration of a first node of the internal network and the received network traffic; calculating, in real-time and based on the analysis of the node configuration, a network vulnerability score, the network vulnerability score measuring the vulnerability of the network to malicious action; determining if the network vulnerability score is below a vulnerability threshold; responsive to determining that the network vulnerability score is below the vulnerability threshold, isolating the internal network from the outside network by instructing a DNS server of the internal network to prevent resolution of DNS requests from the outside network; and after isolating the internal network; reconfiguring the first node of the internal network; simulating the received network traffic on the isolated network including the reconfigured first node; calculating a simulated network vulnerability score based on the simulated received network traffic and measuring the expected vulnerability of the network to malicious action if the network were not isolated from the outside network; and in response to the simulated network vulnerability score exceeding the vulnerability threshold, reversing the isolation of the internal network from the outside network. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer readable storage medium comprising instructions which when executed by a processor cause the processor to perform the steps of:
-
receiving, at an internal network comprising a plurality of internal nodes, each node of the plurality of internal nodes comprising a corresponding node configuration, network traffic from an outside network; analyzing, by a node of the internal network, the node configuration of a first node of the internal network and the received network traffic; calculating, in real time and based on the analysis of the node configuration, a network vulnerability score, the network vulnerability score measuring the vulnerability of the network to malicious action; determining if the network vulnerability score is below a vulnerability threshold; responsive to determining that the network vulnerability score is below the vulnerability threshold, isolating the internal network from the outside network by instructing a DNS server of the internal network to prevent resolution of DNS requests from the outside network; and after isolating the internal network; reconfiguring the first node of the internal network; simulating the received network traffic on the isolated network including the reconfigured first node; calculating a simulated network vulnerability score based on the simulated received network traffic and measuring the expected vulnerability of the network to malicious action if the network were not isolated from the outside network; and in response to the simulated network vulnerability score exceeding the vulnerability threshold, reversing the isolation of the internal network from the outside network. - View Dependent Claims (6, 7, 8)
-
-
9. A system comprising:
-
a plurality of internal nodes, each node of the plurality of internal nodes comprising a corresponding node configuration, the plurality of internal nodes connected in an internal network configured to receive network traffic from an outside network; an operator node of the internal network, the operator node configured to; analyze the node configuration of a first node of the internal network and the received network traffic; calculate, in real time and based on the analysis of the node configuration, a network vulnerability score, the network vulnerability score measuring the vulnerability of the network to malicious action; determine if the network vulnerability score is below a vulnerability threshold; responsive to determining that the network vulnerability score is below the vulnerability threshold, isolate the internal network from the outside network by instructing a DNS server of the internal network to prevent resolution of DNS requests from the outside network; and after isolating the internal network; reconfiguring the first node of the internal network; simulating the received network traffic on the isolated network including the reconfigured first node; calculating a simulated network vulnerability score based on the simulated received network traffic and measuring the expected vulnerability of the network to malicious action if the network were not isolated from the outside network; and in response to the simulated network vulnerability score exceeding the vulnerability threshold, reversing the isolation of the internal network from the outside network. - View Dependent Claims (10, 11)
-
Specification