×

APPARATUS AND METHOD FOR CONDUCTING ENDPOINT-NETWORK-MONITORING PACKET TAGGING

  • US 20180307833A1
  • Filed: 04/20/2018
  • Published: 10/25/2018
  • Est. Priority Date: 04/20/2017
  • Status: Active Grant
First Claim
Patent Images

1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:

  • instantiating, with one or more processors, a networking-stack, intrusion-detection kernel driver in kernel space of an operating system of a host computing device connected to a network, where the networking-stack, intrusion-detection kernel driver is configured to;

    obtain kernel-filter criteria indicative of which network traffic is to be deemed potentially malicious,determine that a network packet is resident in a networking stack of the operating system of the host computing device,access at least part of the network packet,apply the kernel-filter criteria to the at least part of the network packet and, based on applying the kernel-filter criteria, determining that the network packet is potentially malicious,associate the network packet with an identifier of an application executing in userspace of the operating system and to which or from which the network packet is sent, andreport the network packet in association with the identifier of the application to an intrusion-detection agent executing in userspace of the operating system of the host computing device, the intrusion-detection agent being different from the application to which or from which the network packet is sent; and

    instantiating, with one or more processors, the intrusion-detection agent in userspace of the operating system of the host computing device, wherein the intrusion-detection agent is configured to;

    obtain threat-classification criteria indicative of which reports of network packets identify potential attacks;

    access the report of the network packet from the networking-stack, intrusion-detection kernel driver;

    identify the application from the report of the network packet;

    access a forensic record associated with the application in memory by the operating system;

    apply the threat-classification criteria to the report of the network packet and the forensic record and, based on applying the threat-classification criteria, classify the network packet as malicious; and

    in response to classifying the network packet as malicious, recording an indication of the classification in memory.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×