×

System that provides early detection, alert, and response to electronic threats

  • US 8,171,554 B2
  • Filed: 02/04/2008
  • Issued: 05/01/2012
  • Est. Priority Date: 02/04/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer system that provides early warning detection and response to electronic threats in a large wide area network, said system comprising:

  • (a) a virtual Anonymity, Privacy, and Secrecy (APS) module comprised of several components distributed throughout said system, said APS module comprising components that are adapted to identify and remove data carrying personal information and to enable secure encrypted communications between modules in said system, thereby insuring that the anonymity, privacy and secrecy of all users of said large wide area network are preserved while enabling said system to perform its function;

    (b) one or more physical Known eThreat Handler (KEHM) modules that are deployed inside said large wide area network, said KEHM modules comprising components that are adapted to look for a match between signatures of known eThreats and the stream of Internet packets in real-time, thereby identifying and removing known eThreats from data stream;

    (c) one or more physical Data Stream Manager (DSM) modules that are deployed inside said large wide area network, said DSM modules comprising components that are adapted to;

    (i) receive the data stream that has been forwarded from said KEHM modules;

    (ii) forward said data stream to the target computer;

    (iii) extract files from said data stream by filtering out traffic that has no potential to assist with eThreat detection and traffic that has a potential to assist with detection of new eThreats;

    (d) a physical New eThreat Detection module not directly connected to the large wide area network data stream, said module comprising;

    (i) a plurality of detection plug-ins each of which is adapted to analyze and provide a subjective numeric grade for the danger posed by the suspected eThreat in a file or a file from other sources;

    (ii) a risk weighing component that is adapted to combine the numeric grades provided by said plurality of detection plug-ins to provide a final rank for each of said eThreat files in order to determine if a new eThreat has been detected; and

    (iii) components that are adapted to construct a unique signature for each new eThreat detected;

    (e) a physical Collaborative eThreat Recognition module not directly connected to said large wide area network data stream, said Collaborative eThreat Recognition module comprising components that are adapted to apply rule-based detection techniques to information received from various system agents and users to detect potential new eThreats;

    (f) a physical Storage Manager module not connected directly to said large wide area network data stream, said Storage Manager module comprising components that are adapted to;

    (i) store and manage files sent to said module by other modules of said system; and

    (ii) store information about said files managed by said module;

    (g) a physical Control Center module not connected directly to said large wide area network data stream, which comprises graphic user interfaces and other components that are adapted to provide all information gathered by other modules of said system that is relevant to the recognition of new eThreats to a human expert group that is responsible for running said system and to provide feedback from said human expert group to modules of said system;

    (h) communication links between said modules of said system; and

    (i) the Control Center modules comprising an Attack-Trace-Back module adapted to trace back the source of an eThreat by constructing a progagation tree from a log.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×