×

Network isolation by policy compliance evaluation

  • US 10,142,364 B2
  • Filed: 09/21/2016
  • Issued: 11/27/2018
  • Est. Priority Date: 09/21/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • maintaining, in an internal network, a plurality of internal nodes, each node of the plurality of internal nodes comprising a corresponding node configuration;

    receiving, at the internal network, network traffic from an outside network;

    analyzing, by a node of the internal network, the node configuration of a first node of the internal network and the received network traffic;

    calculating, in real-time and based on the analysis of the node configuration, a network vulnerability score, the network vulnerability score measuring the vulnerability of the network to malicious action;

    determining if the network vulnerability score is below a vulnerability threshold;

    responsive to determining that the network vulnerability score is below the vulnerability threshold, isolating the internal network from the outside network by instructing a DNS server of the internal network to prevent resolution of DNS requests from the outside network; and

    after isolating the internal network;

    reconfiguring the first node of the internal network;

    simulating the received network traffic on the isolated network including the reconfigured first node;

    calculating a simulated network vulnerability score based on the simulated received network traffic and measuring the expected vulnerability of the network to malicious action if the network were not isolated from the outside network; and

    in response to the simulated network vulnerability score exceeding the vulnerability threshold, reversing the isolation of the internal network from the outside network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×