×

DETECTING AND MANAGING ABNORMAL DATA BEHAVIOR

  • US 20150242415A1
  • Filed: 02/26/2014
  • Published: 08/27/2015
  • Est. Priority Date: 02/26/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by one or more processors, the method comprising:

  • determining a normal data movement profile for a particular computing device representing observed data transfer behavior over a network by the particular computing device during a particular time period, the observed data transfer behavior including messages sent and received by the particular computing device over the network monitored by a computing device different than the particular computing device, the normal data movement profile including one or more normal data movement attributes associated with the particular computing device, wherein the normal data movement attributes include values representing observed amounts of data sent and received by the computing device over the network during the particular time period;

    identifying a data movement rule associated with the particular computing device, the data movement rule including a deviation amount representing a difference between an attribute of a detected data movement by the particular computing device and a corresponding normal movement attribute including a normal data movement profile for the particular computing device that represents a violation of the data movement rule, and one or more actions to take when the particular computing device deviates from the normal data movement profile by more than the deviation amount;

    detecting a data movement associated with the particular computing device;

    determining that the detected data movement exceeds the deviation amount included in the data movement rule relative to the normal data movement profile for the particular computing device; and

    performing the one or more actions associated with the data movement rule upon determining that the data movement violates the data movement rule, wherein the one or more actions include at least one of quarantining the particular computing device, generating an alert indicating that the particular computing device has violated the data movement rule, severing one or more outbound network connections associated with the particular computing device, or disabling the particular computing device for an amount of time.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×