THREAT DETECTION USING REPUTATION DATA
First Claim
1. A method comprising:
- maintaining reputation data in a memory on each of a plurality of devices, the reputation data including a reputation score and a time to live for each of a plurality of executables;
updating the reputation data on each of the plurality of devices using reputation scores from a remote threat management facility to add new entries for new executables accessed by the respective device and using the time to live to expire existing entries from the reputation data;
monitoring, with the remote threat management facility, each one of the plurality of devices to detect, based on the reputation data on each of the devices, a variance in access to one or more of the plurality of executables relative to access to the one or more of the plurality of executables on each other one of the plurality of devices;
triggering an indication of compromise based on the variance; and
for the device corresponding to detected variance in access to one or more of the plurality of executables, initiating a remedial action in response to the indication of compromise.
4 Assignments
0 Petitions
Accused Products
Abstract
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can be usefully employed with any attribute or other metric that can be instrumented on an endpoint and tracked over time including observable events such as changes to files, data, software configurations, operating systems, and so forth. Correlations may be based on historical data for a particular machine, or a group of machines such as similarly configured endpoints. Similar inferences of malicious activity can be based on the nature of a variation, including specific patterns of variation known to be associated with malware and any other unexpected patterns that deviate from normal behavior. Embodiments described herein use variations in, e.g., server software updates or URL cache hits on an endpoint, but the techniques are more generally applicable to any endpoint attribute that varies in a manner correlated with malicious activity.
13 Citations
20 Claims
-
1. A method comprising:
-
maintaining reputation data in a memory on each of a plurality of devices, the reputation data including a reputation score and a time to live for each of a plurality of executables; updating the reputation data on each of the plurality of devices using reputation scores from a remote threat management facility to add new entries for new executables accessed by the respective device and using the time to live to expire existing entries from the reputation data; monitoring, with the remote threat management facility, each one of the plurality of devices to detect, based on the reputation data on each of the devices, a variance in access to one or more of the plurality of executables relative to access to the one or more of the plurality of executables on each other one of the plurality of devices; triggering an indication of compromise based on the variance; and for the device corresponding to detected variance in access to one or more of the plurality of executables, initiating a remedial action in response to the indication of compromise. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising non-transitory computer executable code embodied in a non-transitory computer readable medium that, when executing on one or more computing devices, performs the steps of:
-
maintaining reputation data in a memory on each of a plurality of devices, the reputation data including a reputation score and a time to live for each of a plurality of executables; updating the reputation data on each of the plurality of devices using reputation scores from a remote threat management facility to add new entries for new executables accessed by the respective device and using the time to live to expire existing entries from the reputation data; monitoring, with the remote threat management facility, each one of the plurality of devices to detect, based on the reputation data on each of the devices, a variance in access to one or more of the plurality of executables relative to access to the one or more of the plurality of executables on each other one of the plurality of devices; triggering an indication of compromise based on the variance; and for the device corresponding to detected variance in access to one or more of the plurality of executables, initiating a remedial action in response to the indication of compromise. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A system comprising:
-
a remote threat management facility configured to manage threats to an enterprise; and a plurality of devices associated with the enterprise, each of the plurality of devices having a memory and a processor, the memory storing reputation data including a reputation score and a time to live for each of a plurality of executables, and the processor configured to update the reputation data on each of the plurality of devices using reputation scores from the remote threat management facility to modify the reputation data, wherein the remote threat management facility is further configured to monitor the reputation data of each one of the plurality of devices to detect a variance in access to one or more of the plurality of executables relative to access to the one or more of the plurality of executables on each other one of the plurality of devices. - View Dependent Claims (18, 19, 20)
-
Specification