Cross-user correlation for detecting server-side multi-target intrusion
First Claim
Patent Images
1. A method to detect server-side multi-target intrusions through cross-user correlation, the method comprising:
- detecting a low-probability administrative event associated with a user of a datacenter, wherein the administrative event is one or more of a change to a user status, a change to a file associated with user status, a replacement of a key executable file associated with the user, a change to a data file associated with the user, a transfer, an update of status, an unusual port use, and/or an unusual hardware use;
monitoring confluences of the administrative event within virtual machines of the datacenter across multiple users;
in response to a determination that the administrative event is detected across the multiple users at a level higher than a predefined probability threshold, classifying the administrative event as an attack;
preventing another attack within the datacenter prior to an identification of a vulnerability of the datacenter, through which the attack occurred, by combining a side channel technique with automated actions, the automated actions designed to alter a security environment within the datacenter and linked to a possible mass attack alert to provide a solution for the attack; and
providing one or more signatures generated for the administrative event based on one or more anomalous characteristics of the administrative event to one or more other datacenters within a same cloud such that the one or more other datacenters are enabled to prevent the attack universally within the cloud prior to the identification of the vulnerability of the datacenter.
6 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for time-correlating administrative events within virtual machines of a datacenter across many users and/or deployments. In some examples, the correlation of administrative events enables the detection of confluences of repeated unusual events that may indicate a mass hacking attack, thereby allowing attacks lacking network signatures to be detected. Detection of the attack may also allow the repair of affected systems and the prevention of further hacking before the vulnerability has been analyzed or repaired.
-
Citations
19 Claims
-
1. A method to detect server-side multi-target intrusions through cross-user correlation, the method comprising:
-
detecting a low-probability administrative event associated with a user of a datacenter, wherein the administrative event is one or more of a change to a user status, a change to a file associated with user status, a replacement of a key executable file associated with the user, a change to a data file associated with the user, a transfer, an update of status, an unusual port use, and/or an unusual hardware use; monitoring confluences of the administrative event within virtual machines of the datacenter across multiple users; in response to a determination that the administrative event is detected across the multiple users at a level higher than a predefined probability threshold, classifying the administrative event as an attack; preventing another attack within the datacenter prior to an identification of a vulnerability of the datacenter, through which the attack occurred, by combining a side channel technique with automated actions, the automated actions designed to alter a security environment within the datacenter and linked to a possible mass attack alert to provide a solution for the attack; and providing one or more signatures generated for the administrative event based on one or more anomalous characteristics of the administrative event to one or more other datacenters within a same cloud such that the one or more other datacenters are enabled to prevent the attack universally within the cloud prior to the identification of the vulnerability of the datacenter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A cloud-based datacenter configured to detect server-side multi-target intrusions through cross-user correlation, the datacenter comprising:
-
a plurality of virtual machines operable to be executed on one or more physical machines; a virtual machine monitor configured to; provide access to the plurality of virtual machines; and detect a low probability administrative event associated with a user based on a list of watched events, wherein the administrative event is one or more of a change to a user status, a change to a file associated with user status, a replacement of a key executable file associated with the user, a change to a data file associated with the user, a transfer, an update of status, an unusual port use, and/or an unusual hardware use; and a datacenter controller configured to; monitor confluences of the administrative event within virtual machines of the datacenter through multiple virtual machine monitors across multiple users; in response to a determination that the administrative event is detected across the multiple users at a level higher than a predefined probability threshold, classify the administrative event as an attack; prevent another attack within the datacenter prior to an identification of a vulnerability of the datacenter, through which the attack occurred, by combining a side channel technique with automated actions, the automated actions designed to alter a security environment within the datacenter and linked to a possible mass attack alert to provide a solution for the attack; and provide one or more signatures generated for the administrative event based on one or more anomalous characteristics of the administrative event to one or more other datacenters within a same cloud such that the one or more other datacenters are enabled to prevent the attack universally within the cloud prior to the identification of the vulnerability of the datacenter. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium having instructions stored thereon to detect server-side multi-target intrusions through cross-user correlation, the instructions comprising:
-
detecting a low probability administrative event associated with a user of a datacenter, wherein the administrative event is one or more of a change to a user status, a change to a file associated with user status, a replacement of a key executable file associated with the user, a change to a data file associated with the user, a transfer, an update of status, an unusual port use, and/or an unusual hardware use; monitoring confluences of the administrative event within virtual machines of the datacenter across multiple users; in response to a determination that the administrative event is detected across the multiple users at a level higher than a predefined probability threshold, classifying the administrative event as an attack; preventing another attack within the datacenter prior to an identification of a vulnerability of the datacenter, through which the attack occurred, by combining a side channel technique with automated actions, the automated actions designed to alter a security environment within the datacenter and linked to a possible mass attack alert to provide a solution for the attack; and providing one or more signatures generated for the administrative event based on one or more anomalous characteristics of the administrative event to one or more other datacenters within a same cloud such that the one or more other datacenters are enabled to prevent the attack universally within the cloud prior to the identification of the vulnerability of the datacenter. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification