Detection of network security breaches based on analysis of network record logs
First Claim
Patent Images
1. A system comprising:
- a device, including a memory, to;
obtain information relating to one or more network events;
determine, using the information relating to the one or more network events, an evaluation strategy associated with detecting one or more attempted security breaches;
identify, using the evaluation strategy, a plurality of different tests;
generate using the evaluation strategy;
a first value for a first test of the plurality of different tests, anda second value for a second test of the plurality of different tests;
update, using the first value, a first table that is associated with the first test;
update, using the second value, a second table that is associated with the second test,the second table being different than the first table;
perform the first test, based on an evaluation of the updated first table, to determine whether a first security breach has been attempted,when performing the first test, the device is to compare one or more first values, associated with an entry in the updated first table, to first criteria to determine whether the first security breach has been attempted,the entry in the updated first table being associated with the first value,the one or more first values including information identifying one or more first ports associated with the device,each first value, of the one or more first values, being a unique port number and being tagged to expire after a first duration of time,the first criteria relating to a first quantity of ports, andthe first security breach being attempted when a quantity, of the one or more first ports identified by the one or more first values, exceeds the first quantity of ports; and
perform the second test, based on an evaluation of the updated second table, to determine whether a second security breach has been attempted,when performing the second test, the device is to compare one or more second values, associated with an entry in the updated second table, to second criteria to determine whether the second security breach has been attempted,the entry in the updated second table being associated with the second value,the one or more second values including information identifying one or more second ports associated with the device,each second value, of the one or more second values, being a unique port number and being tagged to expire after a second duration of time,the second criteria relating to a second quantity of ports, andthe second security breach being attempted when a quantity, of the one or more second ports identified by the one or more second values, exceeds the second quantity of ports.
2 Assignments
0 Petitions
Accused Products
Abstract
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches.
-
Citations
20 Claims
-
1. A system comprising:
a device, including a memory, to; obtain information relating to one or more network events; determine, using the information relating to the one or more network events, an evaluation strategy associated with detecting one or more attempted security breaches; identify, using the evaluation strategy, a plurality of different tests; generate using the evaluation strategy; a first value for a first test of the plurality of different tests, and a second value for a second test of the plurality of different tests; update, using the first value, a first table that is associated with the first test; update, using the second value, a second table that is associated with the second test, the second table being different than the first table; perform the first test, based on an evaluation of the updated first table, to determine whether a first security breach has been attempted, when performing the first test, the device is to compare one or more first values, associated with an entry in the updated first table, to first criteria to determine whether the first security breach has been attempted, the entry in the updated first table being associated with the first value, the one or more first values including information identifying one or more first ports associated with the device, each first value, of the one or more first values, being a unique port number and being tagged to expire after a first duration of time, the first criteria relating to a first quantity of ports, and the first security breach being attempted when a quantity, of the one or more first ports identified by the one or more first values, exceeds the first quantity of ports; and perform the second test, based on an evaluation of the updated second table, to determine whether a second security breach has been attempted, when performing the second test, the device is to compare one or more second values, associated with an entry in the updated second table, to second criteria to determine whether the second security breach has been attempted, the entry in the updated second table being associated with the second value, the one or more second values including information identifying one or more second ports associated with the device, each second value, of the one or more second values, being a unique port number and being tagged to expire after a second duration of time, the second criteria relating to a second quantity of ports, and the second security breach being attempted when a quantity, of the one or more second ports identified by the one or more second values, exceeds the second quantity of ports. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A non-transitory computer-readable medium storing instructions, the instructions comprising:
-
one or more instructions which, when executed by a device, cause the device to obtain information relating to one or more network events; one or more instructions which, when executed by the device, cause the device to determine, using the information relating to the one or more network events, an evaluation strategy associated with detecting one or more attempted security breaches; one or more instructions which, when executed by the device, cause the device to identify, using the evaluation strategy, a plurality of different tests; one or more instructions which, when executed by the device, cause the device to generate using the evaluation strategy; a first value for a first test of the plurality of different tests, and a second value for a second test of the plurality of different tests; one or more instructions which, when executed by the device, cause the device to update, using the first value, a first table that is associated with the first test; one or more instructions which, when executed by the device, cause the device to update, using the second value, a second table that is associated with the second test, the second table being different than the first table; one or more instructions which, when executed by the device, cause the device to perform the first test, based on an evaluation of the updated first table, to determine whether a first security breach has been attempted, the one or more instructions to perform the first test including one or more instructions to compare one or more first values, associated with an entry in the updated first table, to a first quantity of values to determine whether the first security breach has been attempted, the entry in the updated first table being associated with the first value, the one or more first values including information identifying one or more first ports associated with the device, each first value, of the one or more first values, being a unique port number and being tagged to expire after a first duration of time, and the first security breach being attempted when the one or more first values exceed the first quantity of values; and one or more instructions which, when executed by the device, cause the device to perform the second test, based on an evaluation of the updated second table, to determine whether a second security breach has been attempted, the one or more instructions to perform the second test including one or more instructions to compare one or more second values, associated with an entry in the updated second table, to a second quantity of values to determine whether the second security breach has been attempted, the entry in the updated second table being associated with the second value, the one or more second values including information identifying one or more second ports associated with the device, each second value, of the one or more second values, being a unique port number and being tagged to expire after a second duration of time, and the second security breach being attempted when the one or more second values exceeds the second quantity of values. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-implemented method comprising:
-
obtaining, by a computer device, information relating to one or more network events; determining, by the device and using the information relating to the one or more network events, an evaluation strategy associated with detecting one or more attempted security breaches; identifying, by the device and using the evaluation strategy, a plurality of different tests; generating by the device and using the evaluation strategy; a first value for a first test of the plurality of different tests, and a second value for a second test of the plurality of different tests; updating, by the device and using the first value, a first table that is associated with the first test; updating, by the device and using the second value, a second table that is associated with the second test, the second table being different than the first table; performing, by the device and based on an evaluation of the updated first table, the first test to determine whether a first security breach has been attempted, performing the first test including comparing one or more first values, associated with an entry in the updated first table, to a first quantity of values to determine whether the first security breach has been attempted, the entry in the updated first table being associated with the first value, the one or more first values including information identifying one or more first ports associated with the device; each first value, of the one or more first values, being a unique port number and being tagged to expire after a first duration of time, and the first security breach being attempted when the one or more first values exceed the first quantity of values; and performing, by the device and based on an evaluation of the updated second table, the second test to determine whether a second security breach has been attempted, performing the second test including comparing one or more second values, associated with an entry in the updated second table, to a second quantity of values to determine whether the second security breach has been attempted, the entry in the updated second table being associated with the second value, the one or more second values including information identifying one or more second ports associated with the device, each second value, of the one or more second values, being a unique port number and being tagged to expire after a first duration of time and the second security breach being attempted when the one or more second values exceed the second quantity of values. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification