×

Detecting malicious endpoints using network connectivity and flow information

  • US 8,813,236 B1
  • Filed: 01/07/2013
  • Issued: 08/19/2014
  • Est. Priority Date: 01/07/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting a malicious endpoint in a network, comprising:

  • obtaining, from the network, flows among a plurality of endpoints of the network, wherein the plurality of endpoints comprise servers and clients;

    assigning, to each of the plurality of endpoints, a pre-identified endpoint threat level specific to each of the plurality of endpoints;

    assigning, to each of the flows, a pre-identified flow threat level specific to each of the flows;

    calculating, by a computer processor, for a server and a client in the plurality of endpoints, and based on the pre-identified flow threat level assigned to a flow between the server and the client, a server-to-client (SC) score propagation parameter and a client-to-server (CS) propagation parameter,performing, by the computer processor, iterative score propagation based on a sequence of iterations, comprising;

    initializing, prior to the sequence of iterations, a client score of the client and a server score of the server according to the pre-identified endpoint threat levels assigned to the client and the server, respectively;

    updating, in a first iteration in the sequence of iterations, the client score of the client by a SC adjustment amount determined at least based on the server score of the server and the SC score propagation parameter;

    updating, in a second iteration adjacent to the first iteration in the sequence of iterations, the server score of the server by a CS adjustment amount determined at least based on the client score of the client and the CS score propagation parameter; and

    generating, in response to at least updating the client score and the server score in the first iteration and the second iteration, respectively, the final scores of the plurality of endpoints based on at least the client score and the server score; and

    detecting an endpoint of the plurality of endpoints as malicious in response to a corresponding one of the final scores exceeding a pre-determined threshold, wherein the endpoint is not identified as malicious based on the pre-identified endpoint threat level assigned to the endpoint.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×