System and method for detection of aberrant network behavior by clients of a network access gateway
First Claim
1. A system for detecting aberrant network, comprising:
- a processor;
a first network interface coupled to the processor, wherein the first network interface is coupled to one or more clients;
a memory accessible by the processor;
wherein the system is configured to;
receive network communications at the first network interface, wherein each of the network communications is associated with a first client; and
determine if aberrant network behavior is occurring with respect to the first client, wherein determining if the network behavior is aberrant comprises;
analyzing the received network communications based upon one or more rules to determine if the network communications match any of the one or more rules, wherein the one or more rules are configured to identify particular network communications,if a network communication associated with the first client matches a first rule;
updating a first set of statistical information associated with the first client, wherein the first set of statistical information is accumulated over a time period and is associated with at least the first rule of the one or more rules, andapplying a set of conditions to the first set of statistical information, each of the set of conditions corresponding to aberrant network behavior and comprising a threshold to be applied to at least a portion of the statistical information.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method for detecting aberrant network behavior. One embodiment provides a system of detecting aberrant network behavior behind a network access gateway comprising a processor, a first network interface coupled to the processor, a second network interface coupled to the processor, a storage media accessible by the processor and a set of computer instructions executable by the processor. The computer instructions can be executable to observe network communications arriving at the first network interface from multiple clients and determine when the traffic of a particular client is indicative of malware infection or other hostile network activity. If the suspicious network communication is determined to be of a sufficient volume, type, or duration the computer instructions can be executable to log such activity to storage media, or to notify an administrative entity via either the first network interface or second network interface, or to make the computer instructions be executable to perform other configured actions related to the functioning of the network access gateway.
-
Citations
21 Claims
-
1. A system for detecting aberrant network, comprising:
-
a processor; a first network interface coupled to the processor, wherein the first network interface is coupled to one or more clients; a memory accessible by the processor; wherein the system is configured to; receive network communications at the first network interface, wherein each of the network communications is associated with a first client; and determine if aberrant network behavior is occurring with respect to the first client, wherein determining if the network behavior is aberrant comprises; analyzing the received network communications based upon one or more rules to determine if the network communications match any of the one or more rules, wherein the one or more rules are configured to identify particular network communications, if a network communication associated with the first client matches a first rule;
updating a first set of statistical information associated with the first client, wherein the first set of statistical information is accumulated over a time period and is associated with at least the first rule of the one or more rules, andapplying a set of conditions to the first set of statistical information, each of the set of conditions corresponding to aberrant network behavior and comprising a threshold to be applied to at least a portion of the statistical information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for detecting aberrant network in a first network interface coupled to a processor and one or more clients, comprising:
-
receiving network communications at the first network interface, wherein each of the network communications is associated with a first client; and determining if aberrant network behavior is occurring with respect to the first client wherein determining if the network behavior is aberrant comprises; analyzing the received network communications based upon one or more rules to determine if the network communication matches any of the one or more rules, wherein the one or more rules are configured to identify particular network communications, if a network communication associated with the first client matches a first rule;
updating a first set of statistical information associated with the first client, wherein the first set of statistical information is accumulated over a time period and is associated with at least the first rule of the one or more rules, andapplying a set of conditions to the first set of statistical information, each of the set of conditions corresponding to aberrant network behavior and comprising a threshold to be applied to at least a portion of the statistical information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A tangible non-transitory computer readable medium comprising instructions to:
-
receive network communications at the first network interface, wherein each of the network communications is associated with a first client; and determine if aberrant network behavior is occurring with respect to the first client, wherein determining if the network behavior is aberrant comprises; analyzing the received network communications based upon one or more rules to determine if the network communication matches any of the one or more rules, wherein the one or more rules are configured to identify particular network communications, if a network communication associated with the first client matches a first rule;
updating a first set of statistical information associated with the first client, wherein the first set of statistical information is accumulated over a time period and is associated with at least the first rule of the one or more rules, andapplying a set of conditions to the first set of statistical information, each of the set of conditions corresponding to aberrant network behavior and comprising a threshold to be applied to at least a portion of the statistical information. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification