Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment
First Claim
1. A system for virtual asset assisted extrusion detection in a cloud computing environment comprising:
- at least one processor; and
at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for virtual asset assisted extrusion detection in a cloud computing environment, the process for virtual asset assisted extrusion detection in a cloud computing environment including;
providing a cloud computing environment, the cloud computing environment including one or more virtual assets;
transforming at least one of the one or more of the virtual assets into an extrusion detection capable virtual asset by providing an analysis trigger monitoring system to the at least one of the one or more of the virtual assets;
defining two or more analysis trigger parameters, the defined two or more trigger parameters at least including an IP address indicating a designated suspect geographical region and frequency analysis indicating messages arrive at frequency less than a defined threshold frequency;
generating analysis trigger data representing the analysis trigger parameters;
providing at least part of the analysis trigger data to the analysis trigger monitoring systems of the extrusion detection capable virtual assets;
using the analysis trigger monitoring systems and the analysis trigger data to monitor at least a portion of message traffic sent from any of the extrusion detection capable virtual assets to detect any message including one or more of the two or more analysis trigger parameters;
classifying any detected message including one or more of the two or more analysis trigger parameters as a suspect message;
for each suspect message, generating suspect message copy data representing a copy of at least a portion of the suspect message; and
transferring the suspect message copy data to one or more analysis systems for further analysis.
1 Assignment
0 Petitions
Accused Products
Abstract
An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters are defined and analysis trigger data is generated. The analysis trigger monitoring systems are used to monitor at least a portion of the message traffic sent to, or sent from, the one or more virtual assets to detect any message including one or more of the one or more analysis trigger parameters. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis using a second communication channel.
166 Citations
36 Claims
-
1. A system for virtual asset assisted extrusion detection in a cloud computing environment comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for virtual asset assisted extrusion detection in a cloud computing environment, the process for virtual asset assisted extrusion detection in a cloud computing environment including; providing a cloud computing environment, the cloud computing environment including one or more virtual assets; transforming at least one of the one or more of the virtual assets into an extrusion detection capable virtual asset by providing an analysis trigger monitoring system to the at least one of the one or more of the virtual assets; defining two or more analysis trigger parameters, the defined two or more trigger parameters at least including an IP address indicating a designated suspect geographical region and frequency analysis indicating messages arrive at frequency less than a defined threshold frequency; generating analysis trigger data representing the analysis trigger parameters; providing at least part of the analysis trigger data to the analysis trigger monitoring systems of the extrusion detection capable virtual assets; using the analysis trigger monitoring systems and the analysis trigger data to monitor at least a portion of message traffic sent from any of the extrusion detection capable virtual assets to detect any message including one or more of the two or more analysis trigger parameters; classifying any detected message including one or more of the two or more analysis trigger parameters as a suspect message; for each suspect message, generating suspect message copy data representing a copy of at least a portion of the suspect message; and transferring the suspect message copy data to one or more analysis systems for further analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for virtual asset assisted intrusion detection in a cloud computing environment comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for virtual asset assisted intrusion detection in a cloud computing environment, the process for virtual asset assisted intrusion detection in a cloud computing environment including; providing a cloud computing environment, the cloud computing environment including one or more virtual assets; transforming at least one of the one or more of the virtual assets into an intrusion detection capable virtual asset by providing an analysis trigger monitoring system to the at least one of the one or more of the virtual assets; defining two or more analysis trigger parameters, the defined two or more trigger parameters at least including an IP address indicating a designated suspect geographical region and frequency analysis indicating messages arrive at frequency less than a defined threshold frequency; generating analysis trigger data representing the analysis trigger parameters; providing at least part of the analysis trigger data to the analysis trigger monitoring systems of the intrusion detection capable virtual assets; using the analysis trigger monitoring systems and the analysis trigger data to monitor at least a portion of message traffic sent to any of the intrusion detection capable virtual assets to detect any message including one or more of the two or more analysis trigger parameters; classifying any detected message including one or more of the two or more analysis trigger parameters as a suspect message; for each suspect message, generating suspect message copy data representing a copy of at least a portion of the suspect message; and transferring the suspect message copy data to one or more analysis systems for further analysis. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for virtual asset assisted extrusion detection in a cloud computing environment comprising:
-
a cloud computing environment, the cloud computing environment including one or more virtual assets; a network communications circuit, the network communications circuit receiving message traffic sent from any of the one or more virtual assets; a network communications channel through which all the message traffic sent from the one or more virtual assets is relayed through the network communications device; at least one extrusion detection capable virtual asset created by providing an analysis trigger monitoring hardware system stored in a memory to perform at least one of the one or more of the virtual assets to transform the at least one virtual asset into an extrusion detection capable virtual asset; at least one message analysis communications channel that is distinct from the network communications channel for transferring suspect message copy data to the one or more analysis systems for further analysis; at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for virtual asset assisted extrusion detection in a cloud computing environment, the process for virtual asset assisted extrusion detection in a cloud computing environment including; defining two or more analysis trigger parameters, the defined two or more trigger parameters at least including an IP address indicating a designated suspect geographical region and frequency analysis indicating messages arrive at frequency less than a defined threshold frequency; generating analysis trigger data representing the analysis trigger parameters; providing at least part of the analysis trigger data to the analysis trigger monitors of the extrusion detection capable virtual assets; using the analysis trigger monitor and the analysis trigger data to monitor at least a portion of the message traffic sent from any of the extrusion detection capable virtual assets to detect any message including one or more of the two or more analysis trigger parameters; classifying any detected message including one or more of the two or more analysis trigger parameters as a suspect message; for each suspect message, generating suspect message copy data representing a copy of at least a portion of the suspect message; and using the message analysis communications channel to transfer the suspect message copy data to one or more of the one or more analysis systems for further analysis. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system for virtual asset assisted intrusion detection in a cloud computing environment comprising:
-
a cloud computing environment, the cloud computing environment including one or more virtual assets; a network communications circuit, the network communications circuit receiving message traffic sent to any of the one or more virtual assets; a network communications channel through which all the message traffic sent to the one or more virtual assets is relayed through the network communications device; at least one intrusion detection capable virtual asset created by providing an analysis trigger monitoring hardware system stored in the memory to perform at least one of the one or more of the virtual assets to transform the at least one virtual asset into an intrusion detection capable virtual asset; at least one message analysis communications channel that is distinct from the network communications channel for transferring suspect message copy data to the one or more analysis systems for further analysis; at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for virtual asset assisted intrusion detection in a cloud computing environment, the process for virtual asset assisted intrusion detection in a cloud computing environment including; defining two or more analysis trigger parameters, the defined two or more trigger parameters at least including an IP address indicating a designated suspect geographical region and frequency analysis indicating messages arrive at frequency less than a defined threshold frequency; generating analysis trigger data representing the analysis trigger parameters; providing at least part of the analysis trigger data to the analysis trigger monitors of the intrusion detection capable virtual assets; using the analysis trigger monitor and the analysis trigger data to monitor at least a portion of the message traffic sent to any of the intrusion detection capable virtual assets to detect any message including one or more of the two or more analysis trigger parameters; classifying any detected message including one or more of the two or more analysis trigger parameters as a suspect message; for each suspect message, generating suspect message copy data representing a copy of at least a portion of the suspect message; and using the message analysis communications channel to transfer the suspect message copy data to one or more of the one or more analysis systems for further analysis. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
Specification