×

Behavioral detection of suspicious host activities in an enterprise

  • US 9,516,039 B1
  • Filed: 12/23/2013
  • Issued: 12/06/2016
  • Est. Priority Date: 11/12/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • processing log data derived from data sources associated with an enterprise network over a given period of time, wherein the enterprise network comprises multiple host devices, and wherein the data sources comprise at least a domain controller, a virtual private network server, a web proxy, and a dynamic host configuration protocol server;

    creating a whitelist that is customized to the enterprise network, wherein said whitelist comprises multiple external destinations determined to have been contacted by a given number of the multiple host devices over a temporal training period, wherein the given number of the host devices is in excess of a predetermined threshold number of host devices;

    filtering the identified external destinations of the whitelist from the processed log data;

    extracting one or more network traffic features from said filtered log data on a per host device basis, wherein said extracting comprises;

    determining a network traffic pattern associated with the multiple host devices based on said processing; and

    identifying said one or more network traffic features representative of a host device based on the determined network traffic pattern;

    clustering the multiple host devices into one or more groups based on said one or more network traffic features; and

    identifying an anomaly associated with one of the multiple host devices by comparing said host device to the one or more groups across the multiple host devices of the enterprise network;

    wherein said processing, said creating, said filtering, said extracting, said clustering, and said identifying are carried out by at least one computing device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×