×

Systems and methods for preventing internal network attacks

  • US 10,169,575 B1
  • Filed: 03/14/2012
  • Issued: 01/01/2019
  • Est. Priority Date: 03/14/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for preventing internal network attacks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying a subnet of a network, the subnet comprising at least an endpoint host system and an additional endpoint host system;

    detecting an intrusion on the endpoint host system, the intrusion on the endpoint host system having bypassed a security feature implemented on a gateway for obstructing attacks across the gateway on systems within the subnet from outside the subnet and thus having breached the network into the subnet and thus being capable of facilitating an internal network attack via the endpoint host system on another endpoint system within the subnet;

    implementing a security measure on the additional endpoint host system to prevent the internal network attack based at least in part on detecting the intrusion that breached the network into the subnet and at least in part on the endpoint host system and additional endpoint host system being within the subnet,wherein the security measure comprises a firewall restriction that is implemented on the additional endpoint host system and that regulates network traffic within the subnet between the endpoint host system and the additional endpoint host system, the firewall restriction is implemented by an agent on the additional endpoint host system, thereby employing resources of the additional endpoint host system to prevent the internal network attack beyond resources provided by the endpoint host system and the gateway, andwherein implementing the security measure comprises increasing an aggressiveness of a malware detection policy on the additional endpoint host system and performing a scan for malware on the additional endpoint host system based on the malware detection policy.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×