Data leak protection in upper layer protocols
First Claim
1. A data leak prevention (DLP) method comprising:
- maintaining, by a network security appliance within a private network, a data structure identifying therein a plurality of candidate upper layer protocols, one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols and a corresponding suspect field contained within each of the one or more corresponding requests or commands of interest that is to be subjected to DLP scanning as a result of its potential for carrying sensitive information out of the network;
receiving, by the network security appliance, a packet originated by a host device within the private network and directed to a destination device outside of the private network;
identifying, by the network security appliance, an upper layer protocol associated with the received packet based on a destination port specified in a header of the received packet or information contained in a protocol field of the header;
determining, by the network security appliance, whether the identified upper layer protocol is among the plurality of candidate upper layer protocols;
when a result of the determining is affirmative and a request or command represented by the received packet is among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then performing a DLP scan on the received packet by;
extracting a content from the corresponding suspect field contained within the received packet;
applying a plurality of DLP rules to the extracted content, wherein each of the plurality of DLP rules are defined in terms of (i) one or more of a regular expression and a string that are configured to detect existence of one or more forms of sensitive information and (ii) information defining an action to take when one or more conditions associated with the DLP rule are satisfied; and
when said applying results in a conclusion that the one or more forms of sensitive information are contained within the received packet, then performing, by the network security appliance, the defined action; and
when the result is negative or the request or command represented by the received packet is not among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then allowing by, the network security appliance, the received packet to pass through the network security appliance without performing the DLP scan on the received packet.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. A data structure is maintained within a network security appliance identifying candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning as a result of its potential for carrying sensitive information. A packet is received by the network security appliance. A protocol associated with the packet is identified. It is determined whether the identified protocol is among those of the candidate protocols. Responsive to an affirmative determination and when a command represented by the packet is among those of the corresponding commands of interest for the candidate protocol, then a DLP scan is performed on the packet. Otherwise, the packet is allowed to pass through the network security appliance without being subject to a DLP scan.
21 Citations
20 Claims
-
1. A data leak prevention (DLP) method comprising:
-
maintaining, by a network security appliance within a private network, a data structure identifying therein a plurality of candidate upper layer protocols, one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols and a corresponding suspect field contained within each of the one or more corresponding requests or commands of interest that is to be subjected to DLP scanning as a result of its potential for carrying sensitive information out of the network; receiving, by the network security appliance, a packet originated by a host device within the private network and directed to a destination device outside of the private network; identifying, by the network security appliance, an upper layer protocol associated with the received packet based on a destination port specified in a header of the received packet or information contained in a protocol field of the header; determining, by the network security appliance, whether the identified upper layer protocol is among the plurality of candidate upper layer protocols; when a result of the determining is affirmative and a request or command represented by the received packet is among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then performing a DLP scan on the received packet by; extracting a content from the corresponding suspect field contained within the received packet; applying a plurality of DLP rules to the extracted content, wherein each of the plurality of DLP rules are defined in terms of (i) one or more of a regular expression and a string that are configured to detect existence of one or more forms of sensitive information and (ii) information defining an action to take when one or more conditions associated with the DLP rule are satisfied; and when said applying results in a conclusion that the one or more forms of sensitive information are contained within the received packet, then performing, by the network security appliance, the defined action; and when the result is negative or the request or command represented by the received packet is not among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then allowing by, the network security appliance, the received packet to pass through the network security appliance without performing the DLP scan on the received packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory program storage device readable by a network security appliance, tangibly embodying a program of instructions executable by one or more computer processors of the network security appliance to perform a method of data leak prevention (DLP), the method comprising:
-
maintaining a data structure identifying therein a plurality of candidate upper layer protocols, one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols and a corresponding suspect field contained within each of the one or more corresponding requests or commands of interest that is to be subjected to DLP scanning as a result of its potential for carrying sensitive information out of a private network protected by the network security appliance; receiving a packet originated by a host device within the private network and directed to a destination device outside of the private network; identifying an upper layer protocol associated with the received packet based on a destination port specified in a header of the received packet or information contained in a protocol field of the header; determining whether the identified upper layer protocol is among the plurality of candidate upper layer protocols; when a result of the determining is affirmative and a request or command represented by the received packet is among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then performing a DLP scan on the received packet by; extracting a content from the corresponding suspect field contained within the received packet; applying a plurality of DLP rules to the extracted content, wherein each of the plurality of DLP rules are defined in terms of (i) one or more of a regular expression and a string that are configured to detect existence of one or more forms of sensitive information and (ii) information defining an action to take when one or more conditions associated with the DLP rule are satisfied; and when said applying results in a conclusion that the one or more forms of sensitive information are contained within the received packet, then performing, by the network security appliance, the defined action; and when the result is negative or the request or command represented by the received packet is not among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then allowing the received packet to pass through the network security appliance without performing the DLP scan on the received packet. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification