Privilege inference and monitoring based on network behavior
First Claim
1. A method for monitoring network traffic using one or more network computers, wherein execution of instructions by the one or more network computers perform the method comprising:
- instantiating a monitoring engine to perform actions, including;
monitoring network traffic associated with a plurality of entities in one or more networks; and
providing a device relation model based on the network traffic, the plurality of entities, and the one or more metrics based on the monitored network traffic; and
instantiating an inference engine to perform actions, including;
associating the plurality of entities with one or more privilege levels based on one or more device relation models and the one or more metrics; and
increasing the one or more privilege levels for a source entity based on one or more metric values that are associated with one or more target entities that are linked to the source entity; and
instantiating an anomaly engine to perform actions, including;
determining one or more interactions between one or more source entities and the one or more target entities;
providing one or more escalation events to one or more users based on the one or more interactions and the one or more privilege levels associated with the one or more source entities; and
employing related credential information employed with one or more different applications having related activity from the one or more other activities to identify one or more sources of privilege escalation.
6 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed to monitoring network traffic. A monitoring engine may monitor network traffic associated with entities in one or more networks. A device relation model may be provided based on the entities and the network traffic. An inference engine associate the entities with privilege levels based on the device relation model based on an amount of access or an amount of control that source entities exert over the target entities. An anomaly engine may determine one or more interactions between the source entities and the target entities based on the monitored network traffic. The anomaly engine may generate escalation events based on the interactions associated with the source entities and the target entities where the target entities have a higher privilege level than the source entities. The anomaly engine may provide the escalation events to one or more users.
252 Citations
20 Claims
-
1. A method for monitoring network traffic using one or more network computers, wherein execution of instructions by the one or more network computers perform the method comprising:
-
instantiating a monitoring engine to perform actions, including; monitoring network traffic associated with a plurality of entities in one or more networks; and providing a device relation model based on the network traffic, the plurality of entities, and the one or more metrics based on the monitored network traffic; and instantiating an inference engine to perform actions, including; associating the plurality of entities with one or more privilege levels based on one or more device relation models and the one or more metrics; and increasing the one or more privilege levels for a source entity based on one or more metric values that are associated with one or more target entities that are linked to the source entity; and instantiating an anomaly engine to perform actions, including; determining one or more interactions between one or more source entities and the one or more target entities; providing one or more escalation events to one or more users based on the one or more interactions and the one or more privilege levels associated with the one or more source entities; and employing related credential information employed with one or more different applications having related activity from the one or more other activities to identify one or more sources of privilege escalation. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for monitoring network traffic in a network:
one or more network computers, comprising; one or more memories that store instructions; and one or more processors that execute instructions that perform actions, including; instantiating a monitoring engine to perform actions, including; monitoring network traffic associated with a plurality of entities in one or more networks; and providing a device relation model based on the network traffic, the plurality of entities, and the one or more metrics based on the monitored network traffic; and instantiating an inference engine to perform actions, including; associating the plurality of entities with one or more privilege levels based on one or more device relation models and the one or more metrics; and increasing the one or more privilege levels for a source entity based on one or more metric values that are associated with one or more target entities that are linked to the source entity; and instantiating an anomaly engine to perform actions, including; determining one or more interactions between one or more source entities and the one or more target entities; providing one or more escalation events to one or more users based on the one or more interactions and the one or more privilege levels associated with the one or more source entities; and employing related credential information employed with one or more different applications having related activity from the one or more other activities to identify one or more sources of privilege escalation. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A processor readable non-transitory storage media that includes instructions for monitoring network traffic using one or more network monitoring computers, wherein execution of the instructions by the one or more network computers perform the method comprising:
-
instantiating a monitoring engine to perform actions, including; monitoring network traffic associated with a plurality of entities in one or more networks; and providing a device relation model based on the network traffic, the plurality of entities, and the one or more metrics based on the monitored network traffic; and instantiating an inference engine to perform actions, including; associating the plurality of entities with one or more privilege levels based on one or more device relation models and the one or more metrics; and increasing the one or more privilege levels for a source entity based on one or more metric values that are associated with one or more target entities that are linked to the source entity; and instantiating an anomaly engine to perform actions, including; determining one or more interactions between one or more source entities and the one or more target entities; providing one or more escalation events to one or more users based on the one or more interactions and the one or more privilege levels associated with the one or more source entities; and employing related credential information employed with one or more different applications having related activity from the one or more other activities to identify one or more sources of privilege escalation. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A network computer for monitoring communication over a network between two or more other computers, comprising:
-
one or more memories that store instructions; and one or more processors that execute instructions that perform actions, including; instantiating a monitoring engine to perform actions, including; providing one or more metrics for a plurality of entities in one or more networks based on monitored network traffic; and instantiating an inference engine to perform actions, including; associating the plurality of entities with one or more privilege levels based on one or more device relation models and the one or more metrics; and increasing the one or more privilege levels for a source entity based on one or more metric values that are associated with one or more target entities that are linked to the source entity; and instantiating an anomaly engine to perform actions, including; determining one or more interactions between one or more source entities and the one or more target entities; and providing one or more escalation events to one or more users based on the one or more interactions and the one or more privilege levels associated with the one or more source entities. - View Dependent Claims (20)
-
Specification