×

Detecting anomalous network application behavior

  • US 8,185,953 B2
  • Filed: 03/08/2007
  • Issued: 05/22/2012
  • Est. Priority Date: 03/08/2007
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-accessible storage medium comprising program instructions for detecting anomalous network application behavior, wherein the program instructions are executable to:

  • monitor a first plurality of communications between at least one client and a first one or more servers, wherein the at least one client and the first one or more servers communicate using one or more application protocols, wherein said monitoring the first plurality of communications is performed without participating in the communication between the at least one client and the first one or more servers;

    determine a plurality of identifiers based on said monitoring the first plurality of communications, wherein at least a subset of the plurality of identifiers are comprised in content of the first plurality of communications, wherein said determining is performed without participating in the communication between the at least one client and the one or more servers, and wherein the plurality of identifiers comprise one or more of a contact, an IP address, a uniform resource identifier (URI), an extensible resource identifier (XRI), an email address, a service name, a device name, a telephone number, an SIP address, a domain name, an online screen name, an online handle, or a user name;

    monitor a second plurality of communications between the at least one client and a second one or more servers, wherein the at least one client and the second one or more servers communicate using one or more application protocols, wherein said monitoring the second plurality of communications is performed without participating in the communication between the at least one client and the second one or more servers;

    for one or more communications of the second plurality of communications, determine if the one or more communications are anomalous based at least in part on the at least a subset of the determined plurality of identifiers, wherein said determining is performed at the application-protocol level, wherein if the one or more communications do not correspond to one of the plurality of identifiers, the one or more communications of the at least one client are determined to be anomalous, wherein said determining comprises;

    analyzing the second plurality of communications to determine non-anomalous network application behavior between the at least one client and the one or more servers using the at least a subset of the determined plurality of identifiers; and

    determining the anomalous network application behavior by eliminating the determined non-anomalous network application behavior from the second plurality of communications; and

    store information regarding the determined anomalous network application behavior.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×