Threat detection using reputation data
First Claim
1. A method comprising:
- maintaining reputation data in a memory on each of a plurality of devices, the reputation data for one of the plurality of devices including a reputation score and a time to live for each of a plurality of executables executed by the one of the plurality of devices;
updating the reputation data on each of the plurality of devices, wherein updating the reputation data includes adding new entries for new executables executed by a respective one of the plurality of devices using reputation scores from a remote threat management facility and wherein updating the reputation data further includes deleting one or more existing entries from the reputation data using the time to live to expire the existing entries from the reputation data;
monitoring, with the remote threat management facility, each one of the plurality of devices to detect, based on the reputation data on each of the devices, a variance in access to one or more of the plurality of executables relative to access to the one or more of the plurality of executables on each other one of the plurality of devices;
triggering an indication of compromise based on the variance in access to one or more of the plurality of executables; and
for the device from the plurality of devices corresponding to the indication of compromise based on the variance in access to one or more of the plurality of executables, initiating a remedial action in response to the indication of compromise.
4 Assignments
0 Petitions
Accused Products
Abstract
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can be usefully employed with any attribute or other metric that can be instrumented on an endpoint and tracked over time including observable events such as changes to files, data, software configurations, operating systems, and so forth. Correlations may be based on historical data for a particular machine, or a group of machines such as similarly configured endpoints. Similar inferences of malicious activity can be based on the nature of a variation, including specific patterns of variation known to be associated with malware and any other unexpected patterns that deviate from normal behavior. Embodiments described herein use variations in, e.g., server software updates or URL cache hits on an endpoint, but the techniques are more generally applicable to any endpoint attribute that varies in a manner correlated with malicious activity.
45 Citations
18 Claims
-
1. A method comprising:
-
maintaining reputation data in a memory on each of a plurality of devices, the reputation data for one of the plurality of devices including a reputation score and a time to live for each of a plurality of executables executed by the one of the plurality of devices; updating the reputation data on each of the plurality of devices, wherein updating the reputation data includes adding new entries for new executables executed by a respective one of the plurality of devices using reputation scores from a remote threat management facility and wherein updating the reputation data further includes deleting one or more existing entries from the reputation data using the time to live to expire the existing entries from the reputation data; monitoring, with the remote threat management facility, each one of the plurality of devices to detect, based on the reputation data on each of the devices, a variance in access to one or more of the plurality of executables relative to access to the one or more of the plurality of executables on each other one of the plurality of devices; triggering an indication of compromise based on the variance in access to one or more of the plurality of executables; and for the device from the plurality of devices corresponding to the indication of compromise based on the variance in access to one or more of the plurality of executables, initiating a remedial action in response to the indication of compromise. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising non-transitory computer executable code embodied in a non-transitory computer readable medium that, when executing on one or more computing devices, performs the steps of:
-
maintaining reputation data in a memory on each of a plurality of devices, the reputation data including a reputation score and a time to live for each of a plurality of executables; updating the reputation data on each of the plurality of devices wherein updating the reputation data includes adding new entries for new executables executed by a respective one of the plurality of devices using reputation scores from a remote threat management facility and wherein updating the reputation data further includes deleting one or more existing entries from the reputation data using the time to live to expire the existing entries from the reputation data; monitoring, with the remote threat management facility, each one of the plurality of devices to detect, based on the reputation data on each of the devices, a variance in access to one or more of the plurality of executables relative to access to the one or more of the plurality of executables on each other one of the plurality of devices; triggering an indication of compromise based on the variance in access to one or more of the plurality of executables; and for the device from the plurality of devices corresponding to the indication of compromise based on the variance in access to one or more of the plurality of executables, initiating a remedial action in response to the indication of compromise. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A system comprising:
-
a remote threat management facility configured to manage threats to an enterprise; and a plurality of devices associated with the enterprise, each of the plurality of devices having a memory and a processor, the memory storing reputation data including a reputation score and a time to live for each of a plurality of executables, and the processor configured to update the reputation data on each of the plurality of devices, wherein updating the reputation data on each of the plurality of devices includes adding entries for new executables executed by a respective one of the plurality of devices using reputation scores from the remote threat management facility and wherein updating the reputation data on each of the plurality of devices further includes deleting one or more existing entries from the reputation data using the time to live to expire the existing entries from the reputation data, wherein the remote threat management facility is further configured to monitor the reputation data of each one of the plurality of devices to detect a variance in access to one or more of the plurality of executables relative to access to the one or more of the plurality of executables on each other one of the plurality of devices. - View Dependent Claims (18)
-
Specification