×

Techniques for detecting compromises of enterprise end stations utilizing noisy tokens

  • US 10,469,523 B2
  • Filed: 11/07/2016
  • Issued: 11/05/2019
  • Est. Priority Date: 02/24/2016
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable storage medium having instructions which, when executed by one or more processors of a device, cause the device to implement a module for detecting malicious activity within an enterprise network by performing operations comprising:

  • monitoring network traffic originated by one or more enterprise end stations that is destined to one or more servers, wherein the network traffic comprises a first set of one or more request messages originated by the one or more enterprise end stations responsive to non-malicious activity occurring at the one or more enterprise end stations that triggered one or more noisy tokens placed upon those one or more enterprise end stations, wherein the one or more noisy tokens were placed at file system locations or operating system locations of the one or more enterprise end stations to cause the one or more enterprise end stations to generate the network traffic when one or more processes of the one or more enterprise end stations access the one or more noisy tokens;

    generating one or more normal activity patterns characterizing the network traffic based upon the first set of request messages, wherein each of the one or more normal activity patterns identifies one or more characteristics of the network traffic resulting from the non-malicious activity;

    monitoring, for a period of time, additional network traffic originated by the one or more enterprise end stations that is destined to the one or more servers, wherein the additional network traffic comprises a second set of one or more request messages; and

    causing an alert to be generated in response to an analysis of the additional network traffic with regard to the one or more normal activity patterns resulting in a detection of one or more anomalies within the additional network traffic relative to the one or more normal activity patterns.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×