×

Detecting compromised computers by correlating reputation data with web access logs

  • US 7,882,542 B2
  • Filed: 06/30/2007
  • Issued: 02/01/2011
  • Est. Priority Date: 04/02/2007
  • Status: Active Grant
First Claim
Patent Images

1. An automated method for detecting a compromised client computer in an enterprise network, the method comprising the steps of:

  • arranging the enterprise network so that each of a plurality of endpoints in the enterprise network may communicate security assessments over a communication channel;

    receiving reputation data associated with a resource from a reputation service;

    analyzing, responsively to receiving, a log that is maintained by a traffic monitoring endpoint that is arranged to monitor traffic crossing a boundary of the enterprise network to retroactively identify any client computers that accessed the resource; and

    generating a security assessment that includes results from the analyzing, wherein the security assessment is arranged for providing an assignment of context by an endpoint to security-related information using a pre-defined taxonomy having a schematized vocabulary comprising object types and assessment categories.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×