×

Method and system for intrusion and extrusion detection

  • US 9,323,926 B2
  • Filed: 12/30/2013
  • Issued: 04/26/2016
  • Est. Priority Date: 12/30/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system for intrusion and extrusion detection comprising:

  • at least one processor; and

    at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for intrusion and extrusion detection, the process for intrusion and extrusion detection including;

    providing a network communications system, the network communications system controlling message traffic sent to, and/or sent from, a virtual asset;

    providing the network communications system an analysis trigger monitoring system;

    defining two or more analysis trigger parameters, the two or more analysis trigger parameters at least including an IP address indicating a designated suspect geographical region and frequency analysis indicating messages arrive at frequency greater than a defined threshold frequency;

    generating analysis trigger data representing the analysis trigger parameters;

    providing the analysis trigger data to the analysis trigger monitoring system;

    using the analysis trigger monitoring system and the analysis trigger data to monitor at least a portion of the message traffic sent to, and/or sent from, the virtual asset controlled by the network communications system to detect any message satisfying one or more of the two or more analysis trigger parameters, wherein all message traffic sent to, and/or sent from, the virtual asset is relayed by the network communications system using a first communications channel;

    classifying any detected message satisfying one or more of the two or more analysis trigger parameters as a suspect message;

    for each suspect message generating suspect message copy data representing a copy of at least a portion of the suspect message; and

    transferring the suspect message copy data to one or more analysis systems for further analysis, the suspect message copy data being transferred to the one or more analysis systems through an analysis communications channel that is distinct from the first communications channel.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×