Recursive multi-layer examination for computer network security remediation
First Claim
1. A computer-implemented method for recursive multi-layer examination for computer network security remediation comprising:
- receiving a first identifier associated with a first node;
retrieving first metadata using the first identifier;
identifying a second node in communication with the first node using the first metadata, and identifying one or more first communication between the first and second nodes using the first metadata;
ascertaining a first characteristic of each of the one or more first communication, the first characteristic being at least one of a protocol and an application used in the one or more first communication;
examining the each of the one or more first communication for malicious behavior using the first characteristic;
receiving a first risk score for the each of the one or more first communication responsive to the examining;
determining the first risk score associated with one of the one or more first communication exceeds a first predetermined threshold and indicating the first and second nodes are malicious;
retrieving second metadata using a second identifier associated with the second node;
identifying a third node in communication with the second node using the second metadata, and identifying one or more second communication between the second and third nodes using the second metadata;
ascertaining a second characteristic of each of the one or more second communication, the second characteristic being at least one of a protocol and an application used in the one or more second communication;
examining the each of the one or more second communication for malicious behavior using the second characteristic;
receiving a second risk score for the each of the one or more second communication responsive to the examining;
determining the second risk score associated with one of the one or more second communication exceeds the first predetermined threshold and indicating the third node is malicious;
assigning a node risk score to an additional second node in which additional first risk scores, for additional first communications originating from or directed to the additional second node, do not exceed the first predetermined threshold, the node risk score being an average of the additional first risk scores;
determining the node risk score exceeds a second predetermined threshold and indicating the additional second node is malicious;
providing the indicated malicious nodes and communications originating from or directed to the indicated malicious nodes, such that progress of a security breach or intrusion through the indicated malicious nodes and the communications is indicated; and
remediating the security breach.
2 Assignments
0 Petitions
Accused Products
Abstract
Computer-implemented methods and apparatuses for recursive multi-layer examination for computer network security remediation is provided herein. Exemplary methods may include: receiving a first identifier associated with a first node; retrieving first metadata using the first identifier; identifying a second node in communication with the first node using the first metadata; ascertaining a first characteristic of each first communication between the first and second nodes using the first metadata; examining each first communication for malicious behavior using the first characteristic; receiving a first risk score for each first communication responsive to the examining; determining the first risk score associated with one of the second communications exceeds a first predetermined threshold and indicating the first and second nodes are malicious. Exemplary methods may further include: providing the identified malicious nodes and communications originating from or directed to the malicious nodes.
178 Citations
19 Claims
-
1. A computer-implemented method for recursive multi-layer examination for computer network security remediation comprising:
-
receiving a first identifier associated with a first node; retrieving first metadata using the first identifier; identifying a second node in communication with the first node using the first metadata, and identifying one or more first communication between the first and second nodes using the first metadata; ascertaining a first characteristic of each of the one or more first communication, the first characteristic being at least one of a protocol and an application used in the one or more first communication; examining the each of the one or more first communication for malicious behavior using the first characteristic; receiving a first risk score for the each of the one or more first communication responsive to the examining; determining the first risk score associated with one of the one or more first communication exceeds a first predetermined threshold and indicating the first and second nodes are malicious; retrieving second metadata using a second identifier associated with the second node; identifying a third node in communication with the second node using the second metadata, and identifying one or more second communication between the second and third nodes using the second metadata; ascertaining a second characteristic of each of the one or more second communication, the second characteristic being at least one of a protocol and an application used in the one or more second communication; examining the each of the one or more second communication for malicious behavior using the second characteristic; receiving a second risk score for the each of the one or more second communication responsive to the examining; determining the second risk score associated with one of the one or more second communication exceeds the first predetermined threshold and indicating the third node is malicious; assigning a node risk score to an additional second node in which additional first risk scores, for additional first communications originating from or directed to the additional second node, do not exceed the first predetermined threshold, the node risk score being an average of the additional first risk scores; determining the node risk score exceeds a second predetermined threshold and indicating the additional second node is malicious; providing the indicated malicious nodes and communications originating from or directed to the indicated malicious nodes, such that progress of a security breach or intrusion through the indicated malicious nodes and the communications is indicated; and remediating the security breach. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An analytic engine comprising:
-
a processor; and a memory coupled to the processor, the memory storing instructions executable by the processor to perform a method for recursive multi-layer examination for computer network security remediation comprising; receiving a first identifier associated with a first node; retrieving first metadata using the first identifier; identifying a second node in communication with the first node using the first metadata, and identifying one or more first communication between the first and second nodes using the first metadata; ascertaining a first characteristic of each of the one or more first communication, the first characteristic being at least one of a protocol and an application used in the one or more first communication; examining the each of the one or more first communication for malicious behavior using the first characteristic; receiving a first risk score for the each of the one or more first communication responsive to the examining; determining the first risk score associated with one of the one or more first communication exceeds a first predetermined threshold and indicating the first and second nodes are malicious; retrieving second metadata using a second identifier associated with the second node; identifying a third node in communication with the second node using the second metadata, and identifying one or more second communication between the second and third nodes using the second metadata; ascertaining a second characteristic of each of the one or more second communication, the second characteristic being at least one of a protocol and an application used in the one or more second communication; examining the each of the one or more second communication for malicious behavior using the second characteristic; receiving a second risk score for the each of the one or more second communication responsive to the examining; determining the second risk score associated with one of the one or more second communication exceeds the first predetermined threshold and indicating the third node is malicious; assigning a node risk score to an additional second node in which additional first risk scores, for additional first communications originating from or directed to the additional second node, do not exceed the first predetermined threshold, the node risk score being an average of the additional first risk scores; determining the node risk score exceeds a second predetermined threshold and indicating the additional second node is malicious; providing the indicated malicious nodes and communications originating from or directed to the indicated malicious nodes, such that progress of a security breach or intrusion through the indicated malicious nodes and the communications is indicated; and remediating the security breach. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented method for recursive multi-layer examination for computer network security remediation comprising:
-
receiving a first identifier associated with a first node; retrieving first metadata using the first identifier, the first metadata comprising at least one of a source (IP) address and/or hostname, source port, destination (IP) address and/or hostname, destination port, protocol, application, username and/or other credentials used to gain access to computing resources on a network, and number of bytes in a communication; identifying a second node in communication with the first node using the first metadata, and identifying one or more first communication between the first and second nodes using the first metadata; ascertaining a first characteristic of each of the one or more first communication, the first characteristic being at least one of a protocol and an application used in the one or more first communication; selecting a respective first scanlet of a plurality of scanlets using a respective first characteristic associated with a respective first communication; applying the respective first scanlet to the respective first communication; receiving a first risk score for the each of the one or more first communication responsive to the applying; determining the first risk score associated with one of the one or more first communication exceeds a first predetermined threshold and indicating the first and second nodes are malicious; retrieving second metadata using a second identifier associated with the second node, the second metadata comprising at least one of a source (IP) address and/or hostname, source port, destination (IP) address and/or hostname, destination port, protocol, application, username and/or other credentials used to gain access to computing resources on a network, and number of bytes in a communication; identifying a third node in communication with the second node using the second metadata, and identifying one or more second communication between the second and third nodes using the second metadata; ascertaining a second characteristic of each of the one or more second communication, the second characteristic being at least one of a protocol and an application used in the one or more second communication; selecting a respective second scanlet of the plurality of scanlets using a respective second characteristic associated with a respective second communication; applying the respective second scanlet to the respective second communication; receiving a second risk score for the each of the one or more second communication responsive to the applying; determining the second risk score associated with one of the one or more second communication exceeds the first predetermined threshold and indicating the third node is malicious; assigning a node risk score to an additional second node in which additional first risk scores, for additional first communications originating from or directed to the additional second node, do not exceed the first predetermined threshold, the node risk score being an average of the additional first risk scores; determining the node risk score exceeds a second predetermined threshold and indicating the additional second node is malicious; providing the indicated malicious nodes and communications originating from or directed to the indicated malicious nodes, such that a progress of a security breach or intrusion through the indicated malicious nodes and the communications is indicated; and remediating the security breach.
-
Specification