Detection of adversaries through collection and correlation of assessments
First Claim
1. A method of operating a reputation service, the method comprising the steps of:
- collecting an assessment of a detected adversary from a security product deployed at a network, the assessment from the security product containing at least a time-to-live value that defines a time interval over which the assessment is valid, wherein once the time interval of the time-to-live value expires, the assessment is no longer valid; and
correlating the collected assessment with other assessments to establish a confidence level that is associated with a reputation for the detected adversary,wherein the time-to-live value has an initial default value and the time-to-live value, in subsequent assessments from the security product, is increased, by the security product, using an algorithm, when the security product detects the adversary on a recurring basis.
2 Assignments
0 Petitions
Accused Products
Abstract
An automated arrangement for detecting adversaries is provided in which assessments of detected adversaries are reported to a reputation service from security devices, such as unified threat management systems in deployed customer networks. By using actual deployed networks, the number of available sensors can be very large to increase the scope of the adversary detection, while still observing real attacks and threats including those that are targeted to small sets of customers. The reputation service performs a number of correlations and validations on the received assessments to then return a reputation back to the security device in the enterprise network that can be used for blocking adversaries, but only when multiple, distinct sources report the same adversary in their assessments to thus ensure that the reputation is accurate and reliable.
81 Citations
19 Claims
-
1. A method of operating a reputation service, the method comprising the steps of:
-
collecting an assessment of a detected adversary from a security product deployed at a network, the assessment from the security product containing at least a time-to-live value that defines a time interval over which the assessment is valid, wherein once the time interval of the time-to-live value expires, the assessment is no longer valid; and correlating the collected assessment with other assessments to establish a confidence level that is associated with a reputation for the detected adversary, wherein the time-to-live value has an initial default value and the time-to-live value, in subsequent assessments from the security product, is increased, by the security product, using an algorithm, when the security product detects the adversary on a recurring basis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-readable storage medium, not consisting of a propagated signal, containing instructions which, when executed by one or more processors disposed in an electronic device, performs a method for reporting assessments to a reputation service, the method comprising the steps of:
-
generating an assessment at a security product upon detection of an adversary attacking an enterprise network; populating the assessment with data including a time-to-live value that defines a time interval over which the assessment is valid, and an ID value that uniquely identifies the adversary; and sending the assessment, including the data from said populating step, as telemetry to the reputation service, wherein the time-to-live value has an initial default value and the time-to-live value, in subsequent assessments from the security product, is increased, by the security product, using an algorithm, when the security product detects the adversary on a recurring basis. - View Dependent Claims (15, 16)
-
-
17. A computer-implemented database, comprising:
-
a computer; records arranged for storing reputation assessments relating to an adversary detected by a plurality of sensors distributed among customer networks, each reputation assessment generated by a security product deployed at a network and, as received by the database, including at least a time-to-live value that defines a time interval over which each of the reputation assessments is valid; and an interface to a reputation service by which multiple valid records are correlated to derive a fidelity for a reputation associated with the adversary, wherein the time-to-live value has an initial default value and the time-to-live value, in subsequent assessments from the security product, is increased, by the security product, using an algorithm, when the security product detects the adversary on a recurring basis. - View Dependent Claims (18, 19)
-
Specification