×

Recursive multi-layer examination for computer network security remediation

  • US 9,680,852 B1
  • Filed: 04/04/2016
  • Issued: 06/13/2017
  • Est. Priority Date: 01/29/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for recursive multi-layer examination for computer network security remediation comprising:

  • receiving a first identifier associated with a first node;

    retrieving first metadata using the first identifier;

    identifying a second node in communication with the first node using the first metadata, and identifying one or more first communication between the first and second nodes using the first metadata;

    ascertaining a first characteristic of each of the one or more first communication, the first characteristic being at least one of a protocol and an application used in the one or more first communication;

    examining the each of the one or more first communication for malicious behavior using the first characteristic;

    receiving a first risk score for the each of the one or more first communication responsive to the examining;

    determining the first risk score associated with one of the one or more first communication exceeds a first predetermined threshold and indicating the first and second nodes are malicious;

    retrieving second metadata using a second identifier associated with the second node;

    identifying a third node in communication with the second node using the second metadata, and identifying one or more second communication between the second and third nodes using the second metadata;

    ascertaining a second characteristic of each of the one or more second communication, the second characteristic being at least one of a protocol and an application used in the one or more second communication;

    examining the each of the one or more second communication for malicious behavior using the second characteristic;

    receiving a second risk score for the each of the one or more second communication responsive to the examining;

    determining the second risk score associated with one of the one or more second communication exceeds the first predetermined threshold and indicating the third node is malicious;

    assigning a node risk score to an additional second node in which additional first risk scores, for additional first communications originating from or directed to the additional second node, do not exceed the first predetermined threshold, the node risk score being an average of the additional first risk scores;

    determining the node risk score exceeds a second predetermined threshold and indicating the additional second node is malicious;

    providing the indicated malicious nodes and communications originating from or directed to the indicated malicious nodes, such that progress of a security breach or intrusion through the indicated malicious nodes and the communications is indicated; and

    remediating the security breach.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×