×

Systems and methods for detecting and blocking malicious network activity

  • US 9,807,104 B1
  • Filed: 04/29/2016
  • Issued: 10/31/2017
  • Est. Priority Date: 04/29/2016
  • Status: Active Grant
First Claim
Patent Images

1. An authenticating device configured for network-authentication, comprising:

  • a processor;

    a memory in electronic communication with the processor;

    instructions stored in the memory, the instructions being executable to;

    intercept, at the authenticating device, an authentication request sent to an authentication application program interface (API), wherein the authenticating device comprises a domain controller configured with the authentication API and an agent module,wherein the agent module comprises;

    a hook that intercepts the authentication request;

    data collection rules that are used to determine what authentication request data to scrape from the intercepted authentication request; and

    filter rules that filter the authentication request data that is sent to a central server;

    send, from the authenticating device, the filtered authentication request data to the central server to identify malicious activity patterns of authentication activity spanning across a plurality of authenticating devices in a network environment; and

    determine, at the authenticating device, whether to block an invocation of the authentication API based on blocking rules received from the central server,wherein the agent module determines, for every authentication request intercepted in the authenticating device, whether to block a respective authentication request from invoking the authentication API without waiting for a response from the central server for the respective authentication request.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×