×

Method and system for authentication event security policy generation

  • US 9,191,365 B2
  • Filed: 03/02/2012
  • Issued: 11/17/2015
  • Est. Priority Date: 03/24/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for generating and using security policies for a computer network, the method comprising:

  • detecting, via a network monitoring device, authentication events associated with at least one user accessing a user node and at least one corresponding endpoint network node, the authentication events involving host computers contacting authentication servers on the computer network by monitoring activity involving the authentication servers;

    extracting, via the network monitoring device, original authentication information associated with the at least one user from an authentication log from at least one of the authentication servers for each of the authentication events, the original authentication information including user names, each user node address, each corresponding endpoint network node address, authentication protocols and communication ports from the authentication events;

    generating, via the network monitoring device, security policies based on the original authentication information, including the user names, using a usage model that characterizes legitimate network communications between the at least one user and the at least one corresponding endpoint network node by reference to at least user names, user node addresses, endpoint network node addresses, authentication protocols and communication ports;

    detecting, via collectors of the network monitoring device, new authentication events on the computer network, the collectors of the network monitoring device access authentication servers via application programming interfaces;

    extracting, via the network monitoring device, subsequent authentication information, including the user names, user node addresses, endpoint network node addresses, authentication protocols and communication ports from the new authentication events;

    comparing, via the network monitoring device, the subsequent authentication information against the generated security policies, which were defined based on the original authentication information, for the computer network;

    categorizing the new authentication event from the comparison of the subsequent authentication information and the generated security policies;

    determining whether the categorized new authentication event violates the generated security policies;

    generating alerts in response to the categorized new authentication event violating the generated security policies by determining a violation of the new authentication event exceeds a predefined threat level, the alerts indicative of the new authentication events'"'"' threat level;

    logging the violation that exceeds the predefined threat level and initiating a security response comprising of further monitoring of the new authentication events, quarantine of the new authentication events, or blocking of the new authentication events; and

    maintaining, via the network monitoring device, a current authentication state based on the comparison of the subsequent authentication information against the generated security policies when the new authentication event is consistent with the generated security policies, the current authentication state associates the user accessing the user node with the corresponding endpoint network node.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×