Data leak protection in upper layer protocols
First Claim
1. A data leak prevention (DLP) method comprising:
- receiving, by a network security device associated with a private network, a packet originated by a host device within the private network and directed to a destination device outside of the private network;
identifying, by the network security device, an upper layer protocol associated with the received packet;
determining, by the network security device, whether the identified upper layer protocol is one of a plurality of candidate upper layer protocols having a potential to carry sensitive information out of the private network with reference to a database containing therein information regarding the plurality of candidate upper layer protocols, one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols and a corresponding suspect field within each of the one or more corresponding requests or commands of interest that is to be subjected to DLP scanning;
when a result of the determining is affirmative and a request or command represented by the received packet is among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then performing, by the network security device, a DLP scan on content contained within the corresponding suspect field of the received packet by;
applying a plurality of DLP rules to the content, wherein each of the plurality of DLP rules include (i) a regular expression or a string defining a search pattern indicative of existence of one of a plurality of forms of sensitive information and (ii) information defining an action to take when the search pattern matches the content; and
when a match is found between the content and the search pattern of a DLP rule of the plurality of DLP rules, then performing, by the network security device, the defined action of the DLP rule; and
when the result is negative or the request or command represented by the received packet is not among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then skipping performance, by the network security device, the DLP scan for the received packet;
wherein the one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols are configurable by a network administrator of the private network.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security device. An upper layer protocol associated with the packet is identified. It is determined whether the identified upper layer protocol is one of multiple candidate upper layer protocols having a potential to carry sensitive information with reference to a database identifying the candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning. Responsive to an affirmative determination and when a command represented by the packet is one of the corresponding commands of interest for the identified upper layer protocol, then a DLP scan is performed on content contained within the corresponding suspect field of the packet. Otherwise, performance of the DLP scan for the received packet is skipped.
30 Citations
19 Claims
-
1. A data leak prevention (DLP) method comprising:
-
receiving, by a network security device associated with a private network, a packet originated by a host device within the private network and directed to a destination device outside of the private network; identifying, by the network security device, an upper layer protocol associated with the received packet; determining, by the network security device, whether the identified upper layer protocol is one of a plurality of candidate upper layer protocols having a potential to carry sensitive information out of the private network with reference to a database containing therein information regarding the plurality of candidate upper layer protocols, one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols and a corresponding suspect field within each of the one or more corresponding requests or commands of interest that is to be subjected to DLP scanning; when a result of the determining is affirmative and a request or command represented by the received packet is among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then performing, by the network security device, a DLP scan on content contained within the corresponding suspect field of the received packet by; applying a plurality of DLP rules to the content, wherein each of the plurality of DLP rules include (i) a regular expression or a string defining a search pattern indicative of existence of one of a plurality of forms of sensitive information and (ii) information defining an action to take when the search pattern matches the content; and when a match is found between the content and the search pattern of a DLP rule of the plurality of DLP rules, then performing, by the network security device, the defined action of the DLP rule; and when the result is negative or the request or command represented by the received packet is not among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then skipping performance, by the network security device, the DLP scan for the received packet; wherein the one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols are configurable by a network administrator of the private network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory program storage device of a network security device, embodying a program of instructions executable by one or more computer processors of the network security device to perform a method of data leak prevention (DLP), the method comprising:
-
receiving a packet originated by a host device within a private network protected by the network security device and directed to a destination device outside of the private network; identifying an upper layer protocol associated with the received packet; determining whether the identified upper layer protocol is one of a plurality of candidate upper layer protocols having a potential to carry sensitive information out of the private network with reference to a database containing therein information regarding the plurality of candidate upper layer protocols, one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols and a corresponding suspect field within each of the one or more corresponding requests or commands of interest that is to be subjected to DLP scanning; when a result of the determining is affirmative and a request or command represented by the received packet is among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then performing a DLP scan on content contained within the corresponding suspect field of the received packet by; applying a plurality of DLP rules to the content, wherein each of the plurality of DLP rules include (i) a regular expression or a string defining a search pattern indicative of existence of one of a plurality of forms of sensitive information and (ii) information defining an action to take when the search pattern matches the content; and when a match is found between the content and the search pattern of a DLP rule of the plurality of DLP rules, then performing the defined action of the DLP rule; and when the result is negative or the request or command represented by the received packet is not among those of the one or more corresponding requests or commands of interest for the identified upper layer protocol, then skipping performance of the DLP scan for the received packet; wherein the one or more corresponding requests or commands of interest for each of the plurality of candidate upper layer protocols are configurable by a network administrator of the private network. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification