×

Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment

  • US 9,325,726 B2
  • Filed: 02/03/2014
  • Issued: 04/26/2016
  • Est. Priority Date: 02/03/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for virtual asset assisted extrusion detection in a cloud computing environment comprising:

  • at least one processor; and

    at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for virtual asset assisted extrusion detection in a cloud computing environment, the process for virtual asset assisted extrusion detection in a cloud computing environment including;

    providing a cloud computing environment, the cloud computing environment including one or more virtual assets;

    transforming at least one of the one or more of the virtual assets into an extrusion detection capable virtual asset by providing an analysis trigger monitoring system to the at least one of the one or more of the virtual assets;

    defining two or more analysis trigger parameters, the defined two or more trigger parameters at least including an IP address indicating a designated suspect geographical region and frequency analysis indicating messages arrive at frequency less than a defined threshold frequency;

    generating analysis trigger data representing the analysis trigger parameters;

    providing at least part of the analysis trigger data to the analysis trigger monitoring systems of the extrusion detection capable virtual assets;

    using the analysis trigger monitoring systems and the analysis trigger data to monitor at least a portion of message traffic sent from any of the extrusion detection capable virtual assets to detect any message including one or more of the two or more analysis trigger parameters;

    classifying any detected message including one or more of the two or more analysis trigger parameters as a suspect message;

    for each suspect message, generating suspect message copy data representing a copy of at least a portion of the suspect message; and

    transferring the suspect message copy data to one or more analysis systems for further analysis.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×