×

Data leak protection in upper layer protocols

  • US 9,444,788 B2
  • Filed: 11/12/2015
  • Issued: 09/13/2016
  • Est. Priority Date: 09/10/2014
  • Status: Active Grant
First Claim
Patent Images

1. A data leak prevention (DLP) method comprising:

  • maintaining, by a network security appliance within a private network, a data structure identifying therein a plurality of candidate upper layer protocols, one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols and a corresponding suspect field contained within each of the one or more corresponding requests or commands of interest that is to be subjected to DLP scanning as a result of its potential for carrying sensitive information out of the network;

    receiving, by the network security appliance, a packet originated by a host device within the private network and directed to a destination device outside of the private network;

    identifying, by the network security appliance, an upper layer protocol associated with the received packet based on a destination port specified in a header of the received packet or information contained in a protocol field of the header;

    determining, by the network security appliance, whether the identified upper layer protocol is among the plurality of candidate upper layer protocols;

    when a result of the determining is affirmative and a request or command represented by the received packet is among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then performing a DLP scan on the received packet by;

    extracting a content from the corresponding suspect field contained within the received packet;

    applying a plurality of DLP rules to the extracted content, wherein each of the plurality of DLP rules are defined in terms of (i) one or more of a regular expression and a string that are configured to detect existence of one or more forms of sensitive information and (ii) information defining an action to take when one or more conditions associated with the DLP rule are satisfied; and

    when said applying results in a conclusion that the one or more forms of sensitive information are contained within the received packet, then performing, by the network security appliance, the defined action; and

    when the result is negative or the request or command represented by the received packet is not among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then allowing by, the network security appliance, the received packet to pass through the network security appliance without performing the DLP scan on the received packet.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×