×

Data leak protection in upper layer protocols

  • US 9,756,017 B2
  • Filed: 08/08/2016
  • Issued: 09/05/2017
  • Est. Priority Date: 09/10/2014
  • Status: Active Grant
First Claim
Patent Images

1. A data leak prevention (DLP) method comprising:

  • receiving, by a network security device associated with a private network, a packet originated by a host device within the private network and directed to a destination device outside of the private network;

    identifying, by the network security device, an upper layer protocol associated with the received packet;

    determining, by the network security device, whether the identified upper layer protocol is one of a plurality of candidate upper layer protocols having a potential to carry sensitive information out of the private network with reference to a database containing therein information regarding the plurality of candidate upper layer protocols, one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols and a corresponding suspect field within each of the one or more corresponding requests or commands of interest that is to be subjected to DLP scanning;

    when a result of the determining is affirmative and a request or command represented by the received packet is among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then performing, by the network security device, a DLP scan on content contained within the corresponding suspect field of the received packet by;

    applying a plurality of DLP rules to the content, wherein each of the plurality of DLP rules include (i) a regular expression or a string defining a search pattern indicative of existence of one of a plurality of forms of sensitive information and (ii) information defining an action to take when the search pattern matches the content; and

    when a match is found between the content and the search pattern of a DLP rule of the plurality of DLP rules, then performing, by the network security device, the defined action of the DLP rule; and

    when the result is negative or the request or command represented by the received packet is not among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then skipping performance, by the network security device, the DLP scan for the received packet;

    wherein the one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols are configurable by a network administrator of the private network.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×