×

Using indications of compromise for reputation based network security

  • US 9,992,228 B2
  • Filed: 09/14/2014
  • Issued: 06/05/2018
  • Est. Priority Date: 09/14/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • collecting a plurality of indications of compromise from an indication of compromise monitor on an endpoint, each one of the indications of compromise based upon one or more actions taken by one or more processes executing on the endpoint and observable by the indication of compromise monitor on the endpoint and each one of the indications of compromise including one or more descriptors and a description of one or more objects related to the one or more actions at least one of the one or more descriptors including a category of the one or more objects related to the one or more actions;

    identifying a low-reputation behavior indicating a threat level associated with the plurality of indications of compromise based upon a quantity of other endpoints that have seen the plurality of indications of compromise and a context for the one or more actions on the endpoint, wherein the context for the one or more actions on the endpoint includes a reputation of executables on the endpoint;

    creating a coloring rule for the low-reputation behavior according to the threat level based upon an occurrence of the plurality of indications of compromise;

    receiving the coloring rule at a security facility on the endpoint; and

    applying the coloring rule with the security facility to color low reputation objects.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×