×

Detecting advanced persistent threats

  • US 8,904,531 B1
  • Filed: 06/30/2011
  • Issued: 12/02/2014
  • Est. Priority Date: 06/30/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of detecting an advanced persistent threat (APT) attack on an enterprise system, the method comprising:

  • receiving, in a computerized device, an indication that a document has been leaked outside the enterprise system;

    evaluating a log of security events of the enterprise system using a set of heuristics to produce a reduced set of events potentially relevant to the APT attack; and

    outputting the reduced set of events over a user interface for consideration by a security analysis team;

    wherein evaluating the log of security events includes;

    in a decision engine module, determining a set of heuristic criteria based on external data about the APT attack;

    in a correlation engine module, applying the set of heuristic criteria to identify security events from the log of security events that are consistent with the external data about the APT attack;

    determining whether a number of the identified security events exceeds a minimum threshold value;

    if the number of the identified security events does not exceed the minimum threshold value, then modifying, at the decision engine module, the set of heuristic criteria until the number of the identified security events produced by the correlation engine exceeds the minimum threshold value; and

    if the number of the identified security events exceeds the minimum threshold value, then using the identified security events as the reduced set of events;

    wherein;

    evaluating the log of security events further includes identifying a set of access events within the log of security events in which an endpoint machine has accessed the document;

    determining the set of heuristic criteria includes;

    determining a document-access time window consistent with the external data about the APT attack; and

    determining a set of security event types consistent with the external data about the APT attack; and

    applying the set of heuristics includes;

    for each access events of the set of access events, searching for security events from the log of security events that are associated with a corresponding endpoint machine and within the document-access time window in proximity to that access event; and

    searching the security events identified to be within the document-access time window for security events of a type that falls within the set of security event types to produce a set of suspicious events.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×