Using indications of compromise for reputation based network security
First Claim
1. A method comprising:
- collecting a plurality of indications of compromise from an indication of compromise monitor on an endpoint, each one of the indications of compromise based upon one or more actions taken by one or more processes executing on the endpoint and observable by the indication of compromise monitor on the endpoint and each one of the indications of compromise including one or more descriptors and a description of one or more objects related to the one or more actions at least one of the one or more descriptors including a category of the one or more objects related to the one or more actions;
identifying a low-reputation behavior indicating a threat level associated with the plurality of indications of compromise based upon a quantity of other endpoints that have seen the plurality of indications of compromise and a context for the one or more actions on the endpoint, wherein the context for the one or more actions on the endpoint includes a reputation of executables on the endpoint;
creating a coloring rule for the low-reputation behavior according to the threat level based upon an occurrence of the plurality of indications of compromise;
receiving the coloring rule at a security facility on the endpoint; and
applying the coloring rule with the security facility to color low reputation objects.
4 Assignments
0 Petitions
Accused Products
Abstract
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.
21 Citations
10 Claims
-
1. A method comprising:
-
collecting a plurality of indications of compromise from an indication of compromise monitor on an endpoint, each one of the indications of compromise based upon one or more actions taken by one or more processes executing on the endpoint and observable by the indication of compromise monitor on the endpoint and each one of the indications of compromise including one or more descriptors and a description of one or more objects related to the one or more actions at least one of the one or more descriptors including a category of the one or more objects related to the one or more actions; identifying a low-reputation behavior indicating a threat level associated with the plurality of indications of compromise based upon a quantity of other endpoints that have seen the plurality of indications of compromise and a context for the one or more actions on the endpoint, wherein the context for the one or more actions on the endpoint includes a reputation of executables on the endpoint; creating a coloring rule for the low-reputation behavior according to the threat level based upon an occurrence of the plurality of indications of compromise; receiving the coloring rule at a security facility on the endpoint; and applying the coloring rule with the security facility to color low reputation objects. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
collecting a plurality of indications of compromise from an indication of compromise monitor on an endpoint, each one of the indications of compromise based upon one or more actions taken by one or more processes executing on the endpoint and observable by the indication of compromise monitor on the endpoint and each one of the indications of compromise including one or more descriptors and a description of one or more objects related to the one or more actions, at least one of the one or more descriptors including a category of the one or more objects related to the one or more actions; identifying a low-reputation behavior indicating a threat level associated with the plurality of indications of compromise based upon a quantity of other endpoints that have seen the plurality of indications of compromise and a context for the one or more actions on the endpoint, wherein the context for the one or more actions on the endpoint includes a reputation of executables on the endpoint; creating a coloring rule for the low-reputation behavior according to the threat level based upon an occurrence of the plurality of indications of compromise; and when the plurality of indications of compromise are detected on the endpoint, taking an action based upon the coloring rule. - View Dependent Claims (6)
-
-
7. A computer program product comprising a non-transitory computer readable medium having stored thereon computer executable code that, when executing on one or more computing devices, cause the one or more computing devices to perform the steps of:
-
collecting a plurality of indications of compromise from an indication of compromise monitor on an endpoint, each one of the indications of compromise based upon one or more actions taken by one or more processes executing on the endpoint and observable by the indication of compromise monitor on the endpoint and each one of the indications of compromise including one or more descriptors and objects related to the one or more actions at least one of the one or more descriptors including a category of the objects related to the one or more actions; identifying a low-reputation behavior indicating a threat level associated with the plurality of indications of compromise based upon a quantity of other endpoints that have seen the plurality of indications of compromise and a context for the one or more actions on the endpoint, wherein the context for the one or more actions on the endpoint includes a reputation of executables on the endpoint; creating a coloring rule for the low-reputation behavior according to the threat level based upon an occurrence of the plurality of indications of compromise; receiving the coloring rule at a security facility on the endpoint; and applying the coloring rule with the security facility to color low reputation objects. - View Dependent Claims (8, 9, 10)
-
Specification