×

Monitoring darknet access to identify malicious activity

  • US 8,413,238 B1
  • Filed: 07/21/2008
  • Issued: 04/02/2013
  • Est. Priority Date: 07/21/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • identifying with a first server a list of darknet addresses utilizing a plurality of techniques and providing the list of darknet addresses to a second server, wherein the second server is unassociated with any internet protocol addresses on the list of darknet addresses;

    continually monitoring with the second server all communications originating from or destined to a protected network external to a network edge of the protected network, wherein the first server and the second server cooperatively forming a distributed security system external to the protected network, and wherein the list of darknet addresses comprises addresses external to the protected network;

    comparing with the second server destination or source addresses of the monitored communications originating from or destined to the protected network to the list of darknet addresses;

    if a match is found between the destination or source addresses and the list of darknet addresses, providing notification of potential malicious activity originating from or destined to the protected network and blocking the potential malicious activity with the second server such that the potential malicious activity does not enter the protected network or leave the second server;

    updating the list of darknet addresses at the first server or the second server using one or more of the plurality of techniques including proactively scanning addresses and passively monitoring addresses, and distributing updates between the first server and the second server;

    wherein updating a list of darknet addresses comprises;

    compiling a list of active addresses from autonomous systems communications originated by routers;

    identifying potential darknet addresses based upon gaps identified in the list of active addresses;

    attempting to connect to the identified potential darknet addresses; and

    if the attempt to connect to the identified potential darknet addresses is unsuccessful, adding the potential darknet addresses to the list of darknet addresses.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×