×

Behavior-based traffic profiling based on access control information

  • US 8,955,119 B2
  • Filed: 09/05/2013
  • Issued: 02/10/2015
  • Est. Priority Date: 04/03/2009
  • Status: Active Grant
First Claim
Patent Images

1. A device comprising:

  • one or more processors to;

    obtain, from a security device, traffic flow information associated with a user accessing a resource via a network,the traffic flow information being generated based on monitoring network traffic associated with the user accessing the resource, andthe traffic flow information including information indicating a user role associated with the user and information identifying a source address and a destination address associated with the user accessing the resource;

    determine, based on the information identifying the source address and the destination address, a user device and a destination device associated with the user accessing the resource;

    determine whether a traffic behavior pattern, associated with the user role, exists;

    when the traffic behavior pattern exists, the one or more processors are to;

    update the traffic behavior pattern based on the traffic flow information, the user device, and the destination device to form an updated traffic behavior pattern;

    when the traffic behavior pattern does not exist, the one or more processors are to;

    determine, based on the traffic flow information, a quantity of sessions associated with the user accessing the resource is greater than a threshold quantity of sessions;

    generate, based on the quantity of sessions being greater than the threshold quantity of sessions, the traffic behavior pattern based on the traffic flow information and information associated with the user device and the destination device; and

    provide one of the updated traffic behavior pattern or the generated traffic behavior pattern to the security device,the one of the updated traffic behavior pattern or the created traffic behavior pattern permitting the security device to control access, by the user, to the resource.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×