Actively identifying and neutralizing network hot spots
First Claim
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for actively identifying identities that have privileged access escalation vulnerabilities, the operations comprising:
- identifying a first identity having a first level of privileged access;
identifying a second identity having a second level of privileged access that is different from the first level of privileged access;
based on an identification of the second identity gaining access to the first identity and further based on determining that the first identity and the second identity have different levels of privileged access, classifying the second identity as a potential source of privileged access escalation vulnerabilities; and
performing, based on the classification that the second identity is a potential source of privileged access escalation vulnerabilities, at least one of;
triggering an alert regarding the potential source of privileged access escalation vulnerabilities;
performing a network security remediation operation for at least one of the first identity and the second identity, wherein the network security remediation operation includes at least one of;
prompting at least one of the first identity and the second identity with an authentication challenge; and
terminating a network session between the first identity and the second identity; and
identifying a plurality of other identities with levels of privileged access different from the first level of privileged access and that share a characteristic in common with the second identity.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed embodiments include identifying a first identity having a first level of privileged network access, identifying a network resource that the first identity is communicating with, classifying the network resource as a network resource to be dynamically monitored, dynamically monitoring connections activity of the identified network resource to determine a second identity, wherein the second identity is determined based on it having a second level of privileged network access that is different from the first level of privileged network access and having attempted to establish a connection with the network resource, classifying, based on the determination of the second identity, the network resource as a potential source of privileged access escalation vulnerabilities, and performing, based on the classification that the network resource is a potential source of privileged access escalation vulnerabilities, at least one of: triggering an alert regarding the potential source of privileged access escalation vulnerabilities, performing a network security remediation operation for at least one of the first identity, the second identity, and the network resource, and identifying a plurality of other identities with levels of privileged network access different from the first level of privileged network access and that have attempted to establish connections with the network resource.
-
Citations
18 Claims
-
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for actively identifying identities that have privileged access escalation vulnerabilities, the operations comprising:
-
identifying a first identity having a first level of privileged access; identifying a second identity having a second level of privileged access that is different from the first level of privileged access; based on an identification of the second identity gaining access to the first identity and further based on determining that the first identity and the second identity have different levels of privileged access, classifying the second identity as a potential source of privileged access escalation vulnerabilities; and performing, based on the classification that the second identity is a potential source of privileged access escalation vulnerabilities, at least one of; triggering an alert regarding the potential source of privileged access escalation vulnerabilities; performing a network security remediation operation for at least one of the first identity and the second identity, wherein the network security remediation operation includes at least one of; prompting at least one of the first identity and the second identity with an authentication challenge; and terminating a network session between the first identity and the second identity; and identifying a plurality of other identities with levels of privileged access different from the first level of privileged access and that share a characteristic in common with the second identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for actively identifying identities that have privileged access escalation vulnerabilities, the method comprising:
-
identifying a first identity having a first level of privileged access; identifying a second identity having a second level of privileged access that is different from the first level of privileged access; based on an identification of the second identity gaining access to the first identity and further based on determining that the first identity and the second identity have different levels of privileged access, classifying the second identity as a potential source of privileged access escalation vulnerabilities; and performing, based on the classification that the second identity is a potential source of privileged access escalation vulnerabilities, at least one of; triggering an alert regarding the potential source of privileged access escalation vulnerabilities; performing a network security remediation operation for at least one of the first identity and the second identity, wherein the network security remediation operation includes at least one of; prompting at least one of the first identity and the second identity with an authentication challenge; and terminating a network session between the first identity and the second identity; and identifying a plurality of other identities with levels of privileged access different from the first level of privileged access and that share a characteristic in common with the second identity. - View Dependent Claims (15, 16, 17, 18)
-
Specification