×

Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud computing environment

  • US 9,686,301 B2
  • Filed: 03/11/2016
  • Issued: 06/20/2017
  • Est. Priority Date: 02/03/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for virtual asset assisted extrusion detection in a cloud computing environment comprising:

  • one or more processors; and

    at least one memory coupled to at least one of the one or more processors, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for virtual asset assisted extrusion detection in a cloud computing environment, the process for virtual asset assisted extrusion detection in a cloud computing environment including;

    providing a cloud computing environment, the cloud computing environment including one or more virtual assets;

    transforming at least one of the one or more of the virtual assets into an extrusion detection capable virtual asset by providing one or more analysis trigger monitoring systems to respective ones of the one or more of the virtual assets;

    defining one or more analysis trigger parameters, at least one of the analysis trigger parameters including a delay threshold representing a delay between successive messages sent by the virtual asset that is shorter in duration than a normal duration of delays between transmission of transmissions by a virtual asset, wherein the durations of delays that are shorter than the delay threshold are identified as potential security threats;

    generating analysis trigger data representing the analysis trigger parameters;

    providing at least part of the analysis trigger data to the one or more analysis trigger monitoring systems of the extrusion detection capable virtual asset;

    detecting, by using the one or more analysis trigger monitoring systems and the analysis trigger data, at least one message associated with one or more of the one or more analysis trigger parameters;

    classifying one or more portions of the detected at least one message as being suspect, the classified portions of the detected message correlating with at least one of the analysis trigger parameters;

    assigning a threat score to the suspect message at least partially based on a potential impact of the suspect message'"'"'s potential security threat on the extrusion detection capable virtual asset;

    enabling, by providing the threat score to the extrusion detection capable virtual asset, the extrusion detection capable virtual asset to secure against the suspect message;

    for each suspect message, generating suspect message copy data representing a copy of at least a portion of the suspect message; and

    transferring the suspect message, copy data to one or more analysis systems for further analysis.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×