×

Network threat detection and management system based on user behavior information

  • US 10,412,106 B2
  • Filed: 03/02/2015
  • Issued: 09/10/2019
  • Est. Priority Date: 03/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A first device, comprising:

  • a memory storing instructions; and

    one or more processors to execute the instructions to;

    transmit one or more instructions, to a client device of a user, to deploy software on the client device;

    receive, based on the software being deployed, behavior information that identifies the user and that identifies a behavior associated with the user,the behavior including an aggregation of one or more requests, from the client device, to access one or more network resources of a network;

    determine whether a first model has been created,the first model, when created, including a first normal behavior pattern associated with the user,the first normal behavior pattern being an average of particular behaviors of the user during a particular period of time;

    determine whether a second model has been created,the second model, when created, including a second normal behavior pattern associated with a user group to which the user belongs;

    determine whether the behavior is normal by selectively comparing, based on whether at least one of the first model or the second model has been created, the behavior with the first normal behavior pattern or the second normal behavior pattern,the behavior information, that identifies the user and that identifies the behavior, being input into the first model to compare the behavior and the first normal behavior pattern when the first model has been created, andthe behavior information, that identifies the user and that identifies the behavior, being input into the second model to compare the behavior and the second normal behavior pattern when the second model has been created;

    provide a first instruction to allow the client device to proceed with the behavior or provide a second instruction to disallow the client device from proceeding with the behavior based on determining whether the behavior is normal;

    update, when the first model has been created and when the behavior is determined to be normal, the first model by using the behavior information, that identifies the user and that identifies the behavior, to modify the first normal behavior pattern;

    update, when the second model has been created and when the behavior is determined to be normal, the second model by using the behavior information, that identifies the user and that identifies the behavior, to modify the second normal behavior pattern;

    perform, when the behavior is determined to be abnormal, an action to determine which device is first to have been affected by a network threat associated with the behavior,the action including providing threat analytics,the threat analytics including map information, associated with a second device, that shows a path of affected devices associated with the network threat, 

    the second device being first to have been affected by the network threat according to the map information, andthe threat analytics being configured to improve detection of the network threat; and

    send a third instruction to disconnect the second device from the network based on the threat analytics.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×