Protecting network devices from suspicious communications
First Claim
Patent Images
1. A method comprising:
- generating, by a computing device and based on monitored communication associated with a first device at a first time, a profile of expected communication behavior for the first device, wherein the first device is associated with a first network;
determining, based on the profile and based on monitored communication associated with the first device at a second time, a degree of communication deviation associated with the first device;
comparing the degree of communication deviation with a plurality of different deviation ranges, wherein each of the deviation ranges is associated with one or more corresponding communication parameters; and
causing, based on the comparing, application of one or more communication parameters to communication of the first device.
0 Assignments
0 Petitions
Accused Products
Abstract
According to some aspects, disclosed methods and systems may comprise generating a profile that is based on monitoring a communication pattern associated with a device. Subsequent communications associated with the device may be monitored. Based on the profile and the subsequent communication, a security status may be associated with the device.
12 Citations
20 Claims
-
1. A method comprising:
-
generating, by a computing device and based on monitored communication associated with a first device at a first time, a profile of expected communication behavior for the first device, wherein the first device is associated with a first network; determining, based on the profile and based on monitored communication associated with the first device at a second time, a degree of communication deviation associated with the first device; comparing the degree of communication deviation with a plurality of different deviation ranges, wherein each of the deviation ranges is associated with one or more corresponding communication parameters; and causing, based on the comparing, application of one or more communication parameters to communication of the first device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
generating, based on monitored communication between a first device and a second device via a network, a profile of expected communication behavior for the first device; determining, based on the profile and based on monitored subsequent communication associated with the first device, a degree of communication deviation; comparing the degree of communication deviation with a plurality of different deviation ranges, wherein each of the deviation ranges is associated with one or more corresponding communication parameters; causing, based on the comparing, application of one or more communication parameters to communication of the first device; and controlling, based on the application, network access associated with the first device. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
generating, by a computing device; a first profile of expected communication behavior for a first device associated with a network; and a second profile of expected communication behavior for a second device; monitoring; communication associated with the first device; and communication associated with the second device; determining, based on the first profile and based on the monitored communication associated with the first device, a first degree of communication deviation associated with the first device, wherein the first degree is within a first range; determining, based on the second profile and based on the monitored communication associated with the second device, a second degree of communication deviation associated with the second device, wherein the second degree is within a second range different from the first range; and causing, based on the first degree and the second degree, application of one or more communication parameters to communication between the first device and the second device. - View Dependent Claims (17, 18, 19, 20)
-
Specification