×

Detection and management of unauthorized use of cloud computing services

  • US 9,203,847 B2
  • Filed: 06/26/2012
  • Issued: 12/01/2015
  • Est. Priority Date: 06/26/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • identifying, by a computer system, a plurality of web resources that have been accessed by computing devices from within an internal network;

    obtaining, by the computer system, a first access log from a network component;

    generating, by the computer system, a list of unique networks accessed from within the internal network based upon information contained within the first access log;

    generating, by the computer system, a list of unique domain name system addresses that have been queried from within the internal network;

    searching, by the computer system, an internet registry using the list of unique networks and the list of unique domain name system addresses;

    sorting and summarizing, by the computer system, networks identified through searching the internet registry to generate a company list;

    analyzing, by the computer system, the company list to identify potential cloud computing service companies;

    marking, by the computer system, records within the company list as being associated with the potential cloud computing service companies;

    establishing, by the computer system, a baseline utilizing the company list, the baseline comprising the records;

    obtaining, by the computer system, a second access log from the network component;

    obtaining, by the computer system, internet protocol information from the second access log, the internet protocol information comprising destination internet protocol addresses and source internet protocol addresses;

    summarizing and sorting, by the computer system, the destination internet protocol addresses to identify destination networks;

    comparing, by the computer system, the destination internet protocol addresses to the baseline to identify a cloud computing service resource that was accessed from the plurality of web resources;

    determining, by the computer system, whether the cloud computing service resource is approved based upon the comparing;

    if the cloud computing service resource is approved, permitting continued access by the computing devices to the cloud computing service resource; and

    if the cloud computing service resource is not approved,searching, by the computer system, the second access log for a source internet protocol address of the source internet protocol addresses that accessed the cloud computing service resource, andgenerating, by the computer system, an unauthorized list comprising the source internet protocol address; and

    blocking, at the computer system, access to the cloud computing service resource based upon the unauthorized list.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×