×

Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data

  • US 8,266,697 B2
  • Filed: 03/04/2006
  • Issued: 09/11/2012
  • Est. Priority Date: 03/04/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for generating a network activity graph comprising:

  • at a control server, receiving from a first sensor at a first remote device, a message containing remote device information including an identification of the remote device and activity occurring at the remote device, wherein said first sensor comprises an adapter configured to enable sensed activity occurring at the first remote device to be packaged in a specialized format for transmission to the control server, and wherein said first sensor encapsulates the sensed activity into a specific transmission message recognizable by receiving components at the control server and forwards the message to the control server;

    the control server fusing activity data retrieved from multiple ones of said message from respective multiple sensors, including the first sensor, located within the network, into an activity graph representative of the devices on the network and the activity and inter-activity occurring at and between the devices on the network;

    the control server translating data within an activity report generated from the received activity data into a graph representation and incorporating the translated data into a combined activity graph;

    the control server determining which elements within received activity reports are already represented by a node or edge within the activity graph in order to prevent duplication of a mapping within the activity graph of already represented elements;

    the control server creating a new node or edge for only those elements not already represented within the activity graph;

    the control server generating a request for secondary evidence and transmitting the request to the sensor of the remote device, wherein in response to receipt of a request for secondary evidence at the sensor of the remote device from the control server, said sensor is triggered to locate, package and transmit the requested additional evidence to the control server; and

    in response to receipt of the secondary evidence at the control server, the control server automatically translating the secondary evidence into eGMIDS usable format and fusing the secondary evidence into the activity graph;

    wherein said multiple sensors comprise an email sensor, which completes the functions of;

    tracking emails between users on a network; and

    monitoring an exchange of emails within a context, which context includes the sender'"'"'s and recipient'"'"'s other activities in addition to the exchange of emails on the network, said other activities being pre-determined to trigger said monitoring and which occur prior to or concurrent with the exchange of emails to trigger said monitoring, and wherein said monitoring includes monitoring a content of the email for key words that may be associated with a threat when placed in proper context, given the other activity of the sender and/or recipient of the email.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×