×

Method and system for detecting suspicious administrative activity

  • US 10,623,428 B2
  • Filed: 09/12/2017
  • Issued: 04/14/2020
  • Est. Priority Date: 09/12/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting network threats, comprising:

  • collecting network traffic corresponding to communications within a network over a first time period;

    analyzing metadata for the network traffic to identify an administrative realm comprising an administrator host that performs administrative activity and an administered host that is administered by the administrator host;

    collecting additional network traffic corresponding to additional communications within the network over a second time period after the first time period and corresponding to two or more protocols;

    determining whether respective communications of the additional communications correspond to anomalous activity on a protocol by protocol and a communication by communication basis, at least by processing each communication individually, processing at least comprising;

    selecting a first communication corresponding to the additional network traffic and a first protocol;

    determining whether the first communication is to be identified as anomalous using the administrative realm and a first heuristic based on a first type of the first protocol;

    generating a first alert to identify suspicious activity pertaining to the first communication using the first protocol when the respective communication is determined to be identified as anomalous using the administrative realm and the first heuristic;

    selecting a second communication corresponding to the additional network traffic and a second protocol;

    determining whether the second communication is to be identified as anomalous using the administrative realm and a second heuristic based on a second type of the second protocol; and

    generating a second alert to identify suspicious activity pertaining to the second communication using the second protocol when the respective communication is determined to be identified as anomalous using the administrative realm and the second heuristic.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×