Method and system for protection against information stealing software
First Claim
1. A computer-implemented method of controlling dissemination of sensitive information over an electronic network to a destination, the method comprising:
- analyzing traffic on the electronic network to detect an attempt to transmit a password to the destination, wherein the destination is an external site on the Internet;
determining a strength of the password based on one or more of a length of the password, a similarity of the password to a set of other passwords, and an entropy score of the password;
determining a sensitivity of information protected by the password based on the strength of the password, wherein the sensitivity is positively correlated with the strength of the password such that a stronger password results in a determination of higher sensitivity and a weaker password result in a determination of lower sensitivity;
in response to the attempt to transmit the password to the destination, classifying content at the destination to determine a category of the content by executing computer instructions on a processor, wherein the category denotes whether the destination node is malicious;
assessing a risk level incurred if the password leaves the electronic network and is passed to the destination based at least in part on the category and the sensitivity of information protected by the password; and
determining a required action based on the risk level, wherein the required action includes one or more of blocking, quarantining, or alerting, wherein relatively stronger passwords receive relatively stronger protection from being passed in clear-text over a non-secure connection.
16 Assignments
0 Petitions
Accused Products
Abstract
A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software. Furthermore, it is possible to store information about the bait in a database and then compare information about a user with the information in the database in order to determine if the electronic device that transmitted the bait contains unwanted software.
237 Citations
15 Claims
-
1. A computer-implemented method of controlling dissemination of sensitive information over an electronic network to a destination, the method comprising:
-
analyzing traffic on the electronic network to detect an attempt to transmit a password to the destination, wherein the destination is an external site on the Internet; determining a strength of the password based on one or more of a length of the password, a similarity of the password to a set of other passwords, and an entropy score of the password; determining a sensitivity of information protected by the password based on the strength of the password, wherein the sensitivity is positively correlated with the strength of the password such that a stronger password results in a determination of higher sensitivity and a weaker password result in a determination of lower sensitivity; in response to the attempt to transmit the password to the destination, classifying content at the destination to determine a category of the content by executing computer instructions on a processor, wherein the category denotes whether the destination node is malicious; assessing a risk level incurred if the password leaves the electronic network and is passed to the destination based at least in part on the category and the sensitivity of information protected by the password; and determining a required action based on the risk level, wherein the required action includes one or more of blocking, quarantining, or alerting, wherein relatively stronger passwords receive relatively stronger protection from being passed in clear-text over a non-secure connection. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for controlling dissemination of sensitive information over an electronic network to a destination, the system comprising:
-
a processor configured to execute computer instructions, wherein the computer instructions implement a traffic analyzer, the traffic analyzer in communication with the electronic network and configured to detect an attempt to transmit a password to the destination, wherein the destination is an external site on the Internet; the traffic analyzer configured to, in response to the attempt to transmit the password to the destination; determine a strength of the password based on one or more of a length of the password, a similarity of the password to a set of other passwords, and an entropy score of the password; determine a sensitivity of information protected by the password based on the strength of the password, wherein the sensitivity is positively correlated with the strength of the password such that a stronger password results in a determination of higher sensitivity and a weaker password result in a determination of lower sensitivity, classify content at the destination to determine a category of the content, assess a risk level incurred if the password leaves the electronic network and is passed to the destination based at least in part on the category and the sensitivity of the information protected by the password, and to determine a required action in response to the risk level, wherein the required action includes one or more of blocking, quarantining, or alerting, wherein relatively stronger passwords receive relatively stronger protection from being passed in clear-text over a non-secure connection. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
Specification