×

Herd based scan avoidance system in a network environment

  • US 10,171,611 B2
  • Filed: 03/02/2015
  • Issued: 01/01/2019
  • Est. Priority Date: 12/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. At least one non-transitory machine readable storage medium having instructions stored thereon, the instructions when executed by at least one processor cause the at least one processor to:

  • generate a signature for an object in a first compute node of a first plurality of compute nodes connected to a network;

    search a local cache in a memory element of the first compute node for the signature;

    scan the object with a scan module to obtain a scan result if the signature is not found in the local cache;

    update the local cache with the scan result including the signature of the object;

    select a first subset of the first plurality of compute nodes in the network based, at least in part, on a particular attribute of each compute node in the first subset, wherein the particular attribute is associated with a certain traffic pattern;

    dynamically select, by the first compute node, a second subset of a second plurality of compute nodes connected to the network based, at least in part, on the particular attribute being associated with each compute node in the second subset, wherein the second plurality of compute nodes is to comprise an additional compute node that establishes a connection to the network subsequent to the selection of the first subset, the second subset to include any compute nodes of the first subset that are included in the second plurality of compute nodes and the additional compute node based on determining that an attribute of the additional compute node corresponds to the particular attribute of the compute nodes in the second subset; and

    synchronize the updated local cache with one or more local caches of one or more compute nodes in the second subset, wherein synchronizing is to include;

    sending, from the first compute node, the scan result to the one or more compute nodes of the second subset; and

    receiving, at the first compute node, one or more scan results of one or more other objects from at least one other compute node in the second subset;

    wherein the scan result indicates a threat level of the object, and wherein after the scan result is obtained, the local cache is to be updated with the threat level of the object.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×