×

Coordinated and device-distributed detection of abnormal network device operation

  • US 9,384,075 B2
  • Filed: 04/02/2015
  • Issued: 07/05/2016
  • Est. Priority Date: 09/09/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting suspicious network device activity, the method comprising:

  • identifying, at an evaluating network device, a suspicious activity condition;

    defining an initial ad hoc network to include an initial subset of a set of network devices, wherein each network device in the set of network devices is part of a network;

    receiving, at the evaluating network device and from each network device in the initial subset, a communication that includes data characterizing a detection made by the network device, wherein the network is configured to facilitate reciprocal monitoring of network-device activity amongst network devices in the network;

    determining, at the evaluating network device and for each of one or more network devices in the initial subset, that the suspicious activity condition is satisfied based on the data included in the communication received from the network device; and

    identifying a characteristic of each network device in the one or more network devices, wherein the characteristics relates to a location, device type or connection of the network device;

    defining a new ad hoc network to include a new subset of the set of network device based on the characteristic of the each network device in the one or more network devices and based on the determination that the suspicious activity condition was satisfied for each network device in the one or more network devices, wherein the new ad hoc network includes a newly included network device that is part of the network, and wherein the initial ad hoc network did not include the newly included network device;

    receiving, at the evaluating network device and from each network device in the new subset, a communication that includes data characterizing a detection made by the network device;

    identifying a source device as being a source associated with suspicious activity based on the data included in the communication received from each network device in the new subset; and

    transmitting an alert communication that corresponds to an indication that the source device is associated with suspicious activity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×