×

Security threat detection

  • US 9,602,527 B2
  • Filed: 03/19/2015
  • Issued: 03/21/2017
  • Est. Priority Date: 03/19/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • maintaining, by a network security device, a network traffic log, wherein the network traffic log includes a plurality of entries each including features associated with one of a plurality of network activities observed within a private network, wherein the network activities include a plurality of interactions, including requests and responses relating to web resources, between hosts associated with the private network and external servers hosting the web resources, wherein the features include, for each of the network activities;

    (i) a hash of a received file or a hash of a requested Uniform Resource Identifier (URI);

    (ii) one or more of a source Internet Protocol (IP) address and a destination IP address and (iii) information regarding a user within the private network associated with the network activity;

    responsive to an event, retrospectively scanning, by the network security device, a subset of the plurality of entries of the network traffic log in an attempt to identify a threat that was missed by a previous real-time signature-based scan or a previous real-time reputation-based scan of the observed network activities, wherein the subset of the plurality of entries includes only those entries of the plurality of entries corresponding to those of the network activities observed within a particular timeframe; and

    when the threat is identified as a result of said retrospectively scanning, then performing, by the network security device, one or more of a remedial action and a preventive action with respect to the threat.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×