×

Smart intrusion prevention policy

  • US 10,397,247 B2
  • Filed: 08/16/2016
  • Issued: 08/27/2019
  • Est. Priority Date: 08/16/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for prioritizing intrusion events that enhances the efficiency of signature matching of malicious activity, the method comprising:

  • determining, by one or more computer processors, whether a new connection corresponding to a data packet is detected, wherein the data packet is transmitted using the new connection;

    responsive to determining that the new connection is detected, adding, by one or more computer processors, a connection context associated with the new connection to a current connection context in a dynamic event table,wherein;

    the connection context is based on one or more of;

    an operating system type associated with the connection, an operating system version associated with the connection, and a computer application responsible for sending the data packet associated with the connection, and the dynamic event table includes the current connection context, one or more previous connection contexts, and a listing of two or more events, wherein each event of the two or more events is a malicious activity and is associated with a respective data packet, and wherein each event in the listing of two or more events is retrieved from a repository;

    calculating, by one or more computer processors, a score for each event of two or more events in the dynamic event table based on the current connection context;

    generating, by one or more computer processors, an order for the two or more events according to the calculated score for each respective event, wherein the event with a highest score receives a highest order;

    performing, by one or more computer processors, a signature check of each event having a score greater than or equal to a threshold value among the two or more events according to the generated order; and

    responsive to determining that a signature was found for an event among the two or more events, preventing, by one or more computer processors, intrusion of the data packet associated with the event.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×