Method and system for tracking machines on a network using fuzzy GUID technology
First Claim
1. A computer-implemented method for tracking machines on a network of computers, the method comprising:
- identifying a malicious host coupled to the network of computers;
determining a first IP (Internet Protocol) address and a first set of one or more attributes associated with the malicious host during a first time period, wherein the first set of one or more attributes comprises behavioral information, wherein the behavioral information includes one or more of;
hours of usage and one or more sites visited;
calculating a first attribute fuzzy GUID (Globally Unique Identifier) based on the first IP address and the first set of one or more attributes;
identifying an unknown host during a second time period when the malicious host is in a latent state, the unknown host being associated with a second IP address and a second set of one or more attributes during the second time period;
calculating a second attribute fuzzy GUID based on the second IP address and the second set of one or more attributes;
determining, based on the first attribute fuzzy GUID and the second attribute fuzzy GUID, if the malicious host has moved from the first IP address to the second IP address; and
responsive to determining that the malicious host has moved from the first IP address to the second IP address, blocking access to one or more segments of the network of computers to one or more hosts associated with one or more of the first IP address and the second IP address.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for querying a knowledge base of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a worldwide network of computers. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base, and outputting second information associated with the unknown host based upon the querying process.
-
Citations
20 Claims
-
1. A computer-implemented method for tracking machines on a network of computers, the method comprising:
-
identifying a malicious host coupled to the network of computers; determining a first IP (Internet Protocol) address and a first set of one or more attributes associated with the malicious host during a first time period, wherein the first set of one or more attributes comprises behavioral information, wherein the behavioral information includes one or more of;
hours of usage and one or more sites visited;calculating a first attribute fuzzy GUID (Globally Unique Identifier) based on the first IP address and the first set of one or more attributes; identifying an unknown host during a second time period when the malicious host is in a latent state, the unknown host being associated with a second IP address and a second set of one or more attributes during the second time period; calculating a second attribute fuzzy GUID based on the second IP address and the second set of one or more attributes; determining, based on the first attribute fuzzy GUID and the second attribute fuzzy GUID, if the malicious host has moved from the first IP address to the second IP address; and responsive to determining that the malicious host has moved from the first IP address to the second IP address, blocking access to one or more segments of the network of computers to one or more hosts associated with one or more of the first IP address and the second IP address. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a server comprising one or more processors, the server configured for communication with a network of computers; at least one memory in communication with the one or more processors, the at least one memory storing instructions that, when executed by the one or more processors, cause the system to; identify a malicious host coupled to the network of computers; determine a first IP (Internet Protocol) address and a first set of one or more attributes associated with the malicious host during a first time period, wherein the first set of one or more attributes comprises behavioral information, wherein the behavioral information includes one or more of;
hours of usage and one or more sites visited;calculate a first attribute fuzzy GUID (Globally Unique Identifier) based on the first IP address and the first set of one or more attributes; identify an unknown host during a second time period when the malicious host is in a latent state, the unknown host being associated with a second IP address and a second set of one or more attributes during the second time period; calculate a second attribute fuzzy GUID based on the second IP address and the second set of one or more attributes; determine, based on the first attribute fuzzy GUID and the second attribute fuzzy GUID, if the malicious host has moved from the first IP address to the second IP address; and responsive to determining that the malicious host has moved from the first IP address to the second IP address, block access to one or more segments of the network of computers to one or more hosts associated with one or more of the first IP address and the second IP address. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing instructions for use with a server in communication with a network of computers, wherein the instructions are configured to cause the server to perform a method comprising:
-
identifying a malicious host coupled to the network of computers; determining a first IP (Internet Protocol) address and a first set of one or more attributes associated with the malicious host during a first time period, wherein the first set of one or more attributes comprises behavioral information, wherein the behavioral information includes one or more of;
hours of usage and one or more sites visited;calculating a first attribute fuzzy GUID (Globally Unique Identifier) based on the first IP address and the first set of one or more attributes; identifying an unknown host during a second time period when the malicious host is in a latent state, the unknown host being associated with a second IP address and a second set of one or more attributes during the second time period; calculating a second attribute fuzzy GUID based on the second IP address and the second set of one or more attributes; determining, based on the first attribute fuzzy GUID and the second attribute fuzzy GUID, if the malicious host has moved from the first IP address to the second IP address; and responsive to determining that the malicious host has moved from the first IP address to the second IP address, blocking access to one or more segments of the network of computers to one or more hosts associated with one or more of the first IP address and the second IP address. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification