×

Visibility of Non-Benign Network Traffic

  • US 20180131705A1
  • Filed: 02/09/2017
  • Published: 05/10/2018
  • Est. Priority Date: 11/10/2016
  • Status: Abandoned Application
First Claim
Patent Images

1. A method of protecting computing devices from non-benign activity, comprising:

  • receiving, in a processor of a network device, a first network traffic flow of a monitoring computing device and a malicious activity tag identifying a non-benign behavior of the first network traffic flow;

    determining, in the processor of the network device, one or more characteristics of the first network traffic flow associated with the non-benign behavior;

    receiving, in the processor of the network device, a second network traffic flow from a non-monitoring computing device; and

    determining, by the processor of the network device, whether the second network traffic flow represents non-benign activity by comparing the one or more characteristics of the first network traffic flow associated with the non-benign activity to the second network traffic flow.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×