WO2024173746A1 - Network compromise activity monitoring system - Google Patents
Network compromise activity monitoring system Download PDFInfo
- Publication number
- WO2024173746A1 WO2024173746A1 PCT/US2024/016081 US2024016081W WO2024173746A1 WO 2024173746 A1 WO2024173746 A1 WO 2024173746A1 US 2024016081 W US2024016081 W US 2024016081W WO 2024173746 A1 WO2024173746 A1 WO 2024173746A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- metadata
- compromise
- network
- egress
- traffic
- Prior art date
Links
- 230000000694 effects Effects 0.000 title claims abstract description 183
- 238000012544 monitoring process Methods 0.000 title claims description 29
- 238000000034 method Methods 0.000 claims description 45
- 238000013519 translation Methods 0.000 claims description 10
- 230000000903 blocking effect Effects 0.000 claims description 7
- 230000008520 organization Effects 0.000 claims description 4
- 230000003190 augmentative effect Effects 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 21
- 230000008569 process Effects 0.000 description 21
- 238000010586 diagram Methods 0.000 description 16
- 238000004458 analytical method Methods 0.000 description 12
- 238000001514 detection method Methods 0.000 description 9
- 238000007726 management method Methods 0.000 description 8
- 230000000670 limiting effect Effects 0.000 description 7
- 230000009471 action Effects 0.000 description 6
- 230000007123 defense Effects 0.000 description 6
- 241000700605 Viruses Species 0.000 description 4
- 230000006378 damage Effects 0.000 description 4
- 238000004886 process control Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000010354 integration Effects 0.000 description 3
- 230000000873 masking effect Effects 0.000 description 3
- 230000035945 sensitivity Effects 0.000 description 3
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 239000013598 vector Substances 0.000 description 2
- 238000012800 visualization Methods 0.000 description 2
- SGTNSNPWRIOYBX-UHFFFAOYSA-N 2-(3,4-dimethoxyphenyl)-5-{[2-(3,4-dimethoxyphenyl)ethyl](methyl)amino}-2-(propan-2-yl)pentanenitrile Chemical compound C1=C(OC)C(OC)=CC=C1CCN(C)CCCC(C#N)(C(C)C)C1=CC=C(OC)C(OC)=C1 SGTNSNPWRIOYBX-UHFFFAOYSA-N 0.000 description 1
- 241001223864 Sphyraena barracuda Species 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000002547 anomalous effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001747 exhibiting effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Definitions
- This invention is related to computer networks and more particularly to computer network security systems.
- hackers access devices such as computers, smartphones, tablets, and network devices without authorization, often to cause damage, corrupt systems, steal data, hold data hostage, or otherwise limit access to these devices by authorized users.
- the tool, tactics, techniques, and procedures of hackers are rapidly growing in sophistication, enabling activities from initial compromise, command and control, persistence, and data exfiltration to go unnoticed by cybersecurity and IT teams and the traditional tools they utilize.
- Hackers are skilled in creating attack vectors that trick employees and individual users into opening malicious attachments or links and freely giving up sensitive personal or company data or user credentials. Attack vectors include sharing malware and viruses, malicious email attachments and web links, phishing, pop-up windows, text messages, and instant messages.
- Malware is any software that is intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with a user’s computer security and privacy.
- Types of malware include computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wipers and keyloggers.
- a firewall is a security system that monitors and controls incoming (ingress) and outgoing (egress) network traffic based on predetermined security rules. Some firewalls also can perform analysis on network traffic to identify malicious files or unauthorized user activity. However, these methods tend to require well-trained security teams to review and process alerts to separate real attacks from false positives.
- a firewall establishes a security barrier betw een a trusted (“private”) device or network of devices and an untrusted (“public”) netw ork, such as the Internet.
- private trusted
- public untrusted
- a firewall cannot prevent all attempted hacks, due to hackers increasingly using encrypted channels of communication that cannot be analyzed without more advanced traffic inspection capabilities.
- Syslog is a standard protocol used for forwarding system log messages from one device to another. It is primarily used for collecting log data from various network devices, such as routers, switches, and servers. Syslog messages contain information about events that occur on the device, including security alerts, system errors, and other messages. The data is stored in text files and can be analyzed using various tools.
- NetFlow is a network protocol developed by Cisco that is used for traffic analysis and network monitoring. It collects and records information about network traffic flows, including the source and destination addresses, the type of traffic, and the amount of data transferred. NetFlow is used to identify network usage patterns, monitor network performance, and detect security threats.
- Syslog and NetFlow are used to collect and analyze data about network activity, and both are widely used in network monitoring and management. They provide valuable insights into network performance, security, and usage patterns.
- Syslog focuses on collecting log data
- NetFlow is focused on network traffic analysis.
- Syslog and NetFlow are important tools for network monitoring and management, but they serve different purposes.
- Syslog is used to collect log data from network devices
- NetFlow is used to analyze network traffic flow.
- sFlow is a network monitoring protocol that is similar to NetFlow but provides more detailed information about network activity. It collects and analyzes data about network flows, including packet header information and application-level data, and can be used to identify network performance issues and security threats.
- SNMP Simple Network Management Protocol
- SNMP Simple Network Management Protocol
- ELK Stack is a set of open-source tools that are used for log management and analysis. It includes Elasticsearch, Logstash, and Kibana, which can be used together to collect, store, and analyze log data from various sources. ELK Stack provides a powerful platform for log analysis and visualization.
- Graylog is another open-source log management platform that is similar to ELK Stack. It can be used to collect, store, and analyze log data from various sources, including Syslog, and provides a powerful search and visualization interface.
- Wireshark is a widely used network protocol analyzer that can be used to capture and analyze network traffic. It provides detailed information about network packets and can be used to identify network performance issues, security threats, and other issues.
- initial access refers to when a hacker (a/k/a intruder, threat actor, etc.) bypasses network defense measures and enters a computer network or computer system. Initial access can also be achieved with the introduction of malware into a computer via a thumb drive or flash drive.
- IDS Intrusion Detection Tools and firewalls
- IPS Intrusion Prevention tools and firewalls
- Malware defenses e g., anti-malware, anti-virus
- EDR Endpoint Detections and Response
- MDR Managed Detection and Response
- a network compromise activity monitoring system includes a network connector (e.g, a network connector device), a compromise activity analyzer (e.g., a comprise activity analyzer device), and a compromise defender.
- the network connector has a public network port, at least one private network port, and an associated network connector traffic log concerning data packet traffic of the network connector, whereby data packets flowing into the at least one private network port and out of the public network port are egress traffic and wherein data packets flowing into the public network port and out of the at least one private network port are ingress traffic.
- the compromise activity analyzer has access to suspect destination metadata, egress traffic metadata, and network device metadata, and is operative to determine a compromise activity level of one or more devices coupled to the at least one private network port, based at least in part, upon the suspect destination metadata, the egress traffic metadata, and the network device metadata.
- the compromise defender is responsive to the determined compromise activity level of the one or more devices and is operative to at least one of block, alert and notify in accordance with at least one rule.
- a network device compromise activity analyzer includes: a processor; and memory coupled to the processor having code segments (e.g. , instructions) executable on the processor for (a) retrieving firewall traffic metadata including at least egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of egress traffic of a firew all; (b) matching origination IP addresses of the egress traffic metadata with network device metadata to identify at least one originating device of the egress data packets; (c) matching destination IP addresses of the egress traffic metadata with suspect destination metadata to identify suspect destinations of the egress data packets; (d) determining a compromise activity level with respect to the at least one originating device based upon the egress traffic metadata, the netw ork device metadata, and the suspect destination metadata; and (e) acting upon determined compromise activity levels in accordance with at least one rule.
- IP Internet Protocol
- a computer-implemented method for monitoring compromise activity of a network device includes: providing firewall traffic metadata to a compromise activity analyzer including a digital processor and memory, wherein the firewall traffic metadata includes at least egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of egress traffic of the firewall; matching origination IP addresses of the egress traffic metadata with network device metadata to identify at least one originating device of the egress data packets; matching destination IP addresses of the egress traffic metadata with suspect destination metadata; determining a compromise activity level to the at least one originating device based upon egress traffic metadata, the network device metadata and the suspect destination metadata; and acting upon determined compromise activity levels in accordance with at least one rule.
- IP Internet Protocol
- a non-transitory computer readable media including code segments executable on a digital processor for monitoring compromise activity of a network device having: code segments providing firewall traffic metadata including at least egress traffic metadata with origination Internet Protocol (IP) addresses and destination IP addresses of egress traffic of a firewall; code segments matching origination IP addresses of the egress traffic metadata with network device metadata to identify at least one originating device of the egress data packets; code segments determining a compromise activity level to the at least one originating device based upon egress traffic metadata and the network device metadata; and code segments acting upon determined compromise activity levels in accordance with at least one rule.
- IP Internet Protocol
- a network device compromise activity analyzer includes: a processor and memory coupled to the processor including code segments executable on the processor and configured to direct the processor to: (a) retrieve egress traffic metadata associated with egress traffic; (b) identify at least one originating device of egress data packets, using the egress traffic metadata and network device metadata; (c) identify suspect destinations of the egress data packets, using the egress traffic metadata and suspect destination metadata; (d) determine a compromise activity level with respect to the at least one originating device based upon the egress traffic metadata, the network device metadata, and the suspect destinations; and (e) act upon determined compromise activity levels in accordance with at least one rule.
- the code segments may be configured to direct the processor to: (a) retrieve firew all traffic metadata including at least the egress traffic metadata, the egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of the egress traffic of a firewall; (b) match origination IP addresses of the egress traffic metadata with the netw ork device metadata to identify the at least one originating device of the egress data packets; and (c) match destination IP addresses of the egress traffic metadata with the suspect destination metadata to identify the suspect destinations of the egress data packets.
- the code segments may be configured to direct the processor to determine the compromise activity level further based upon private network port metadata such as metadata concerning one or more private ports of a firewall.
- the code segments may be configured to direct the processor to act upon the determined compromise activity levels by performing at least one of: blocking, alerting, and notify ing.
- the network device metadata may be stored as a Compromise Translation Table and include for each of a plurality of devices an IP address and a device type.
- the system may include a user interface to prompt a user to input device metadata.
- the network device metadata may further include for each of a plurality of devices one or more of a MAC address, a technical name, an organization name, and a department name.
- Code segments may be configured to direct the processor to match origination IP addresses of the egress traffic metadata with network device metadata, to identify at least one originating device of the egress data packets, by creating a list of one or more origination IP addresses of the egress traffic metadata and using the list of one or more origination IP addresses to search the Compromise Translation Table.
- the suspect destination metadata may be stored in a content-searchable format.
- the code segments may be configured to direct the processor to match destination IP addresses of the egress traffic metadata with suspect destination metadata, to identify suspect destinations of the egress data packets, by creating a list of one or more destination IP addresses of the egress traffic metadata and using the list of one or more destination IP addresses to query the suspect destination metadata for the suspect threat metadata.
- the code segments are configured to direct the processor to analyze the egress traffic metadata for data rate of egress traffic to a destination IP address.
- the code segments may be configured to direct the processor to analyze the egress traffic metadata for contact or call back activity to a device IP address by a destination IP address.
- the code segments may be configured to direct the processor to analyze the egress traffic metadata for contact or call back activity to a plurality of device IP address by a destination IP address.
- a network compromise activity monitoring system includes: a network connector having a public network port, at least one private network port and an associated network connector traffic log concerning data packet traffic of the network connector, whereby data packets flowing into the at least one private network port and out of the public network port are egress traffic and wherein data packets flowing into the public network port and out of the at least one private network port are ingress traffic in which a compromise activity analyzer as described above is operative to determine a compromise activity level of one or more devices coupled to at least one private network port based at least in part, upon the suspect destination metadata, the egress traffic metadata, and the network device metadata; and a compromise defender responsive to the determined compromise activity level of the one or more devices and operative to at least one of block, alert and notify in accordance with the at least one rule.
- the compromise activity analyzer may have access to ingress traffic metadata so that the ingress traffic metadata is used, at least in part, to determine the compromise activity level of the one or more devices.
- the egress traffic metadata and the ingress traffic metadata may be derived from the network connector traffic log.
- the compromise activity analyzer may have access to private network port metadata concerning the at least one private network port so that the private network port metadata is used, at least in part, to determine the compromise activity level of the at least one of the plurality of devices.
- the compromise defender can be a part of the compromise activity analyzer.
- the compromise activity analyzer can be a part of the network connector.
- the network connector can be a firewall or a router.
- a computer-implemented method for monitoring compromise activity of a network device comprising a compromise activity analyzer including a processor and memory: and retrieving egress traffic metadata; identifying at least one originating device of egress data packets, using the egress traffic metadata and network device metadata; identifying suspect destinations of the egress data packets, using the egress traffic metadata and suspect destination metadata; determining a compromise activity level with respect to the at least one originating device based upon egress traffic metadata, the network device metadata, and the suspect destinations; and acting upon determined compromise activity 7 levels in accordance with at least one rule.
- the computer-implemented method may further comprise the compromise activity analyzer retrieving firewall traffic metadata including at least the egress traffic metadata, the egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of the egress traffic of a firewall; matching origination IP addresses of the egress traffic metadata with the network device metadata to identify the at least one originating device of the egress data packets; and matching destination IP addresses of the egress traffic metadata with the suspect destination metadata to identify the suspect destinations of the egress data packets.
- the computer-implemented method may further comprise the compromise activity analyzer analyzing the egress traffic metadata for data rates above a given threshold, frequency of egress traffic and/or patterns of egress traffic.
- the computer-implemented method may further comprise the compromise activity analyzer analyzing the network device metadata for an importance of the device and/or analyzing the suspect destination metadata for threat severity.
- a network compromise activity monitoring system includes: a network connector having a public network port, at least one private network port, and an associated network connector traffic log concerning data packet traffic of the network connector, whereby data packets flowing into the at least one private network port and out of the public network port are egress traffic and wherein data packets flowing into the public network port and out of the at least one private network port are ingress traffic.
- a compromise activity' analyzer has access to suspect destination metadata, said traffic log, and network device metadata.
- the compromise activity analyzer being operative to determine a compromise concern score of one or more devices coupled to the at least one private network port, based at least in part, upon the suspect destination metadata, the egress traffic metadata, and the network device metadata of a number of data packets passing through the network connector.
- the compromise concern score is given an initial value and is adjusted by a threat level determined for each of said number of data packets from said the suspect destination metadata, the egress traffic metadata, and the network device metadata.
- a compromise defender responsive to the determined compromise concern score of the one or more devices and operative to at least one of block, alert and notify' in accordance with at least one rule.
- a non-transitory computer readable media including code segments executable on a processor for monitoring compromise activity of a network device, the code segments configured to direct the processor to perform the methods described herein, can be provided.
- An advantage of example embodiments is that compromises of network devices such as servers and computers can be detected in a timely fashion by an examination of traffic transiting the network connector, one representation of which is a firewall.
- Figure 1 is a block diagram of a first example public/private network system with a network compromise activity analyzing system
- Figure 2 is a block diagram of an example computer platform of the network compromise activity analyzing system
- Figure 3 is a block diagram of a second example public/private network system including multiple network compromise activity analyzing systems
- Figure 4 is a block diagram of an example cloud-based network compromise activity analyzing system
- Figure 5 is a block diagram of an example Compromise Defender of Fig. 4;
- Figure 6 is a flow diagram of an example process implemented by a compromise activity analyzer
- Figure 7 is a flow diagram of an example process for providing firewall traffic metadata
- Figure 8 is an illustration of an example firewall traffic log file and firewall traffic metadata table
- Figure 9 is a flow diagram of an example process for matching origination IP addresses of egress traffic metadata with network device metadata
- Figure 10 is an illustration of an example network device metadata table
- Figure 11 is an example flow diagram of a process for matching destination IP addresses with suspect destination metadata
- Figure 12 is an illustration of example suspect destination list and suspect destination metadata table
- Figure 13 is an illustration of an example methodology for determining a compromise activity level
- Figure 14 is an illustration of a network port metadata table
- Figure 15 is a table with a Fibonacci sequence and associated count and volume adjustment values.
- Figure 16 is an example flow diagram of a process for acting upon determined compromise activity levels in accordance with at least one rule.
- an example network system 10 includes a private network 12, a public network 14, and a network compromise activity analyzing system 16.
- the private network 12 is a local area network (LAN) of, for example, a private business
- the public network 14 is a wide area network (WAN), such as the Internet.
- the public network 14 can provide a number of cloud services such as cloud firewalls, virtual private networks (VPNs), could computing, software as a service (SaaS), cloud data storage, etc.
- the CDM can be separate from the compromise activity analyzer 20, e.g., provided as Software as a Service (SaaS) on Internet 14.
- SaaS Software as a Service
- IP Internet Protocol
- LAN Private network
- a number of devices including a router 22, a hub switch 24, a printer 26, a number of servers 28A- 28N, a switch 30, a number of workstations 32A - 32N, a WiFi router 34 and three example WiFi enabled devices such as computer 36, tablet 38 and mobile phone 40.
- Each of the devices of example LAN 12 has an assigned Internet Protocol (IP) address, some of which may be static and some of which may be dynamic.
- IP Internet Protocol
- WiFi connected devices such as computer 36, tablet 38 and mobile phone 40 may be assigned a dynamic IP address as they connect to the WiFi router 34, while the servers 28A - 28N may be assigned static IP addresses.
- firewall 18 is a commercially available hardware firewall available from several manufacturers including Cisco Systems. WatchGuard, Fortinet, and Barracuda Networks.
- firewall 18 can be implemented as software running on a server, computer, or in the Cloud (e.g., in a cloud firewall on Internet 14).
- Firewall 18 includes several modules including a packet blocking (PB) module to block certain data packets, a firewall logic (FL) module to control the PB module, a firewall rules (FR) module used by the FL module, a masking (MA) module to mask the IP addresses of devices connected to the private LAN 12, and firewall traffic log (FT) module.
- a firewall can comprise any hardware or virtual networking device that has a public network port and at least one private network port.
- An important purpose for the firewall 18 is to prevent the transfer of malicious code or unauthorized data between the private LAN 12 and the public WAN 14. It accomplishes this in several ways.
- the MA module can mask the IP addresses of the devices of LAN 12 from the public network 14, typically using a process known as network address translation (NAT). This process results in devices on the LAN being assigned private IP addresses instead of publicly addressable IP addresses. This often presents a challenge to security analytics tools as the same private IP address may be utilized by millions of devices globally.
- the FL module inspects data packets for source and destination IP addresses, port numbers, type, etc. and uses a set of rules from the FR module to stop certain data packets with the packet blocking module PB from being transferred from the WAN to the LAN and potentially vice versa.
- the example firewall 18 of Fig. 1 is illustrated with a public network port 42 coupled to the WAN 14 and a private network port 44 coupled to a router 22 of LAN 12.
- the public network port 42 and the private network port 44 are typically Input/Output (I/O) ports adhering to the IEEE 802.3 standard and are commonly referred to as Ethernet ports.
- Other firewalls have different configurations of I/O ports, e.g., many hardware firewalls have a number of private network ports to supplement or replace the need for router 22.
- not every’ data packet sent from WAN 14 to public network port 42 is allowed to pass through firewall 18 and enter the LAN 12.
- the FR module generally includes a rules table which governs which data packets are allowed to flow through the firewall and which packets are to be blocked.
- firewall 18 of Fig. 1 includes a FT module which at least temporarily stores log data concerning data packet traffic, referred to herein as ‘'firewall traffic” or “FT”, to facilitate ongoing exchanges between devices of LAN 12 and devices of WAN 14.
- Data packets leaving port 42 for WAN 14 are referred to herein as “egress data packets” or the like and are labelled “E” on Fig. 1 and data packets leaving port 44 for LAN 12 are referred to herein as “ingress data packets” or the like and are labelled “I” on Fig. 1.
- the egress data packets will have a masked version of the LAN 12 device IP address as the origination of the packet and the IP address of the device on WAN 14 to which it is travelling.
- ingress data packets will have the IP address of the device on the WAN 14 as its origin, and a masked version of the LAN 12 device IP address to which it is travelling.
- the compromise activity analyzer 20 is a digital logic system including, in the present example, a processor and memory with a firewall traffic metadata (FTM) module, a network device metadata (NDM) module, a compromise activity analysis (CAA) module, a compromise defender module (CDM) module, and a suspect destination metadata (SDM) module.
- the FTM module derives its data from the FT module of firewall 18, either by direct communication with the firewall 18, e.g., via an Ethernet connection, or by indirect communication, e.g., via the WAN 14, as indicated by broken lines.
- the NDM module can optionally store the network device metadata in content- addressable format such as content-addressable memory (CAM) so that metadata for a device can be retrieved by the IP address of the device.
- CAM content-addressable memory
- the CAA module uses metadata from the FTM module and the NDM module to assign a device compromise index (DCI) to various servers, computers, and other devices of the private network 12.
- the CDM module uses the DCI of the network devices to take appropriate actions to address the threats of system compromise. While the CDM module forms a part of the compromise activity' analyzer 20 in this embodiment, it can also be a separate module in communication with the compromise activity analyzer.
- the SDM module includes IP addresses of suspect destinations, along with metadata including threat levels, type of threat, etc.
- the SDM metadata can be supplemented from a variety of sources, including databases provided in public network 14.
- the compromise activity analyzer 20 uses metadata from several sources including egress traffic metadata, network device metadata, and suspect destination metadata.
- metadata is data that describes other data, such as describing the origin, structure and characteristics of data packets, devices, network endpoints, etc.
- the form that metadata takes can vary, although it is often in the form of a file, array, table, or list.
- the egress traffic metadata can be derived from the packet headers of egress traffic, e.g., IP address of source, IP address destination, packet importance, packet size, port numbers, etc.
- the network device data is conveniently created as a table, sometimes referred to herein as a Compromise Translation Table (CTT), and includes such fields as IP Address(es), MAC Address(es), Private Port#, Device Name, Function, Vulnerabilities, User, Groups, etc.
- CTT Compromise Translation Table
- the suspect destination metadata can also be arranged as a table, with IP Address(es) of known bad actors, the type of threat associated with the IP Address(es), the severity of the threat, etc.
- the various metadata structures can be conveniently stored in Content Addressable Memory’ (CAM), such as CAM 53 of Fig. 2. By storing, for example, the suspect destination metadata in CAM, each destination address of the egress traffic can quickly search the suspect destination metadata (which can include thousands of IP addresses) for a match. Other search and metadata data structures are well known to those of skill in the art.
- FIG. 2 another implementation of compromise activity analyzer 20, set forth by way of example and not limitation, includes a local bus 46 and a Central Processing Unit (CPU) 48 coupled to the local bus 46 by high-speed Static Random Access Memory (SRAM) cache memory 50.
- SRAM Static Random Access Memory
- Dynamic Random Access Memoiy (DRAM) primary or “main” memory 52 is coupled to cache memory 50 and to the bus 46.
- Content Addressable Memory (CAM) 53 or other content-searchable data storage may also be provided in certain embodiments.
- BIOS Basic Input / Output System
- Compromise activity analyzer 20 also includes non-volatile memory 58, such as “‘flash” memory’ or a hard drive, network interface 60, and other input/output (I/O) interfaces 62. It will be appreciated that this is only one suitable architecture for compromise activity analyzer.
- the compromise activity' analyzer 20 can be integrated into firewall 18, be implemented on a server, or provided by cloud computing on Internet 14.
- Fig. 3 illustrates an example network system 10’ including anumber of private networks 64A. 64B, and 66, and a public network (e.g, the Internet) 14.
- Private networks 64A and 64B are, in this example, company intranets or the like, and network 66 is a service provider network providing Software as a Solution (SaaS) services to customers.
- SaaS Software as a Solution
- service provider network 66 can provide network compromise activity' monitoring for companies (a/k/a customers) associated with, for example, company network 64B and for a private virtual network on public network 14.
- networks are coupled together by network connectors, or simply “connectors.”
- the defining characteristics of a network connector is that it has one or more private network ports, a public network port, and the ability' to provide data for a connector traffic log (CTL).
- CTL connector traffic log
- a network connector can provide Logging Protocol (Syslog) messages which are collected in a Syslog data structure.
- firewalls are examples of network connectors, where firewall (connector) traffic log messages are stored in a Syslog or other data structure to provide the basis for firewall (connector) traffic metadata.
- Another example of a connector is a network router having a public network port and one or more private network ports along and having router traffic metadata collection capabilities. Therefore, as used herein, a “network connector” or simply “connector” is defined as a network device having a public network port, one or more private network ports, and the ability to provide connector traffic messages or logs (CTL).
- CTL connector traffic messages or logs
- private network 64A includes a network connector 68A (including a CTL module) having one or more private network ports 69A coupled to devices of network 64A and a public network port 69B coupled to a compromise analyzer 70 and to the public network 14.
- This configuration is like that shown in Fig. 1, where the compromise analyzer 70 (including a CTM module) can be physically located near or within the network connector 68A or can be located remotely, e.g, as a real or virtual device on the public network 14.
- private network 64B includes a network connector 68B (including a CTL module) having one or more private network ports 71A coupled to devices of private network 64B and a public network port 7 IB coupled to the public network 14 and to a compromise analyzer 76 (including a CTM module) of service provider network 66. Also coupled to compromise analyzer 78 is a public network port 77B of a virtual network connector 78 (including a CTL module), which has a private network port 77A. In this non-limiting example, private network port 77A is coupled to a mobile device 79 which can be monitored by compromise analyzer 76.
- the example network compromise activity monitoring systems described herein have the advantage of detecting compromise activity that may take place before an actual breach of a private network system.
- An important source of information is the egress traffic metadata, which generally reflects the "Layer 3" or network layer of Internet data packets.
- Layer 3 is responsible for all packet forw arding between intermediate routers. While very' useful information concerning compromise activity can be found in the egress traffic metadata alone, complementing this with network device metadata (e.g., the CTT table mentioned previously), and the suspect destination metadata substantially augments the detection process.
- Compromise activity detection and analysis can monitor for potential indicators of a breach including:
- abnormal communications can be detected over a period of time to detect changes from the "normal." For example, a device exhibiting a new pattern of communication or sudden high number of communications. Large data volume can be detected when volume of communication increases suddenly with an external host. For example, compromise activity may be detected when communication deviates from a historical norm, e.g., by two standard deviations. Port monitoring with suspect private network ports, such as port 3389 which is used for remote desktop control, can provide useful compromise activity information. Beaconing refers to periodic, routine communications between an internal host and an external host and is sometimes considered a marker for compromise activity . [00062] Fig.
- FIG. 4 is a block diagram of an example cloud-based network compromise activity analyzing system 16’, including connector 74B and compromise activity analyzer 76.
- egress traffic data 82 from the connector 74B is input into the compromise activity analyzer 76 and is processed to determine compromise activity' level of one or more devices on customer private networks.
- the compromise activity analyzer is coupled to a number of modules including a Compromise Translation Table (CTT) module 84 which includes network device metadata, External Data, and Indicators module 86 which includes suspect destination metadata, Internal Automated Analysis module 88 which includes heuristic and statistical analysis, and Machine Learning module 90 which includes expert system and/or neural network analysis. Also shown in Fig.
- CTT Compromise Translation Table
- CDM Compromise Defender Module
- the CDM 92 is also coupled to an Automated and Manual Integrations module 94. It is noted that the CDM 92 is separate from the compromise activity analyzer 76 in this embodiment.
- Network connector device, compromise defender device 92 and compromise activity' analyzer device 76 may be included in one device or may be included in different devices.
- the example compromise activity' analyzer 76 includes a Lookup Relationship to Target Systems module 96, an Analyze Traffic module 98, and an Extract Metadata module 100. These three modules analyze the egress traffic 82 from the connector 74B and develop egress traffic metadata used for further analysis.
- the example compromise activity analyzer 76 further includes a Determine Severity/Impact module 102, a Develop Compromise Risk Rating module 104, and a Determine if Action is Required module 106. These three modules analyze potential compromise activity based, at least in part, upon the device metadata received from CTT module 84, estimates the nsk of the compromise activity, and determines if any deterrent action is required based upon predetermined heuristics.
- Fig. 5 is a block diagram of an example Compromise Defender Module (CDM) 92 of Fig. 4. As noted previously, the Compromise Defender module 92 is coupled to connector 74B, Compromise Activity Analyzer 76 and Automated and Manual Integration module 94.
- CDM Compromise Defender Module
- the Compromise Defender module 92 includes a Compromise Defender Engine module 114, a Determine if Updates Required to CTT module 116, and an Interact with Other Automated and Manual Integrations module 118. These three modules cooperate to coordinate the response to detected compromise activity 7 and to update the device metadata (CTT) if required.
- the Compromise Defender Engine module 114 also selectively activates an Alerts and Notification Engine module 120, which selectively activates a Perform Notifications module 122, which selectively activates a Maintain and Update Alerts module 124. These three modules provide alerts and notifications to system administrators, device administrators, Information Technology (IT) departments, etc.
- the Compromise Defender Engine module 114 also selectively activates a Create/Update Reporting module 126.
- the Compromise Defender Engine module 1 14 further selectively activates a Blocking Engine module 130, which selectively activates an Isolate Endpoint module 132, which selectively activates a Report to Law Enforcement module 134. which selectively activates an Automated Forensics Data Analysis module 136.
- These modules respond to serious breaches of network devices (endpoints) such as servers by isolating the endpoints from attack. Depending upon the sensitivity of the breached endpoint (e.g, a server including classified information), the breach may be automatically reported to law enforcement.
- the Compromise Defender Engine module 114 also selectively activates a Mitigation Engine 138, which selectively activates a Monitor Active Compromise module 140, which selectively activates a Patch Endpoint module 142 and a Trigger Forensics Data Collection module 144, the latter of which selectively activates the Automated Forensics Data Analysis module 136.
- a network device (endpoint) that is subject to suspicious compromise activity 7 may be ' ⁇ patched.” e.g., reassigned a new IP address, to mitigate the issue.
- Fig. 6 is an example process 146 implemented by code segments running on, for example, the compromise activity analyzer 20 of Fig. 2.
- Process 146 begins at 148 and, in an operation 150, the compromise activity 7 analyzer 20 receives fireyvall traffic metadata including at least egress traffic metadata yvith origination Internet Protocol (IP) addresses and destination IP addresses of egress traffic of a firewall.
- IP Internet Protocol
- the fireyvall traffic metadata can be received from a firewall, can be derived from an examination of egress traffic of the firewall, or by any other suitable method.
- the compromise activity analyzer 20 matches origination IP addresses of the egress traffic metadata with network device metadata to identify at least one originating device of the egress data packets.
- the network device metadata can be derived by automated network mapping or can be in the form of a table or the like provided by a network administrator.
- the network device metadata includes information related to the at least one originating device.
- the network device metadata includes at least one of a private network port number, an IP address, a device type for each of the at least one originating device, one or more of a MAC addresses, a technical name, an organization name, and a department name.
- the compromise activity analyzer device 20 creates a list of one or more origination IP addresses of the egress traffic metadata. Compromise activity analyzer device 20 uses the list of one or more origination IP addresses to query the content- addressable memory of the network device metadata to identify the at least one originating device.
- compromise activity analyzer device 20 can identify at least one originating device of the egress data packets.
- the compromise activity analyzer 20 matches destination IP addresses of the egress traffic metadata with suspect destination metadata to identify suspect destinations of the egress data packets.
- Suspect destination metadata can be derived over time or can be acquired from third party organizations.
- the compromise activity analyzer device 20 creates a list of one or more destination IP addresses of the egress traffic metadata.
- the compromise activity analyzer device 20 uses the list of one or more destination IP addresses to query the content-addressable memory for the suspect destination metadata. Therefore, the compromise activity analyzer device 20 can identify' suspect destinations of the egress data packets.
- the compromise activity analyzer 20 determines a compromise activity level with respect to the at least one originating device based upon egress traffic metadata, the network device metadata, and the suspect destination metadata.
- the compromise activity level can be scaled, e.g., on a scale of 1-10, or can be labelled as low, medium, and high.
- the compromise activity analyzer 20 acts upon determined compromise activity 7 levels in accordance with at least one rule. For example, low compromise activity levels can be ignored, medium compromise activity levels can be reported to an administrator of a network device, and a high activity level can result in automated responses to an immediate threat. Examples of various actions include blocking, alerting, and notifying.
- Fig. 7 is a flow diagram of an example process 150' for receiving firewall traffic metadata including at least egress traffic metadata of Fig. 6.
- process 150' begins at 160 and, in an operation 1 2, it is determined if there is a current firewall traffic metadata file. If yes, the firewall traffic metadata file is retrieved in an operation 164 and, if not, a new firewall traffic metadata file is created in an operation 166. Next, an operation 168 determines if there is new firewall traffic log data. If so, the firewall traffic metadata file is updated in an operation 170. If not, or after operation 170, the process continues with an operation 172 which determines if the firewall traffic metadata includes egress traffic metadata. If not, process control returns to operation 168 to await new firewall traffic log data. If so, an operation 174 delivers firewall traffic metadata and process 150' ends at 176.
- Fig. 8 is an illustration of an example firewall traffic logfile 178 including a list 180 and an example firewall traffic metadata file 182 including a table 184.
- the firewall traffic log list 180 can be, in this non-limiting example, derived from System Logging Protocol (Syslog) messages produced by a firewall.
- Syslog messages include a timestamp, severity rating, device ID (including IP address), and information specific to the event.
- Syslog messages are typically sent via User Datagram Protocol (UDP) port 514.
- UDP User Datagram Protocol
- UDP is considered to be a connectionless protocol, where messages are not acknowledged or guaranteed to arrive.
- Syslog messages are often in a human-readable format, but do not need to be.
- each Syslog message has a priority level, which is a combination of a code for the process of the device creating the message and a severity level.
- the example firewall traffic metadata file extracts metadata from the large amount of Syslog data stored in the firewall traffic log 180.
- table 184 can have rows representing communications between a device on a public network (having a public IP address) and a device on a private network (having a private IP address). Columns of table 184 can include the source and destination IP addresses, port information for the private network device, port information for the public network device, timestamps, flags for egress traffic and ingress traffic, and other relevant factors, in this non-limiting example.
- egress traffic metadata and ingress traffic metadata can be subsets of the firewall traffic metadata file 182.
- the egress traffic metadata and ingress traffic metadata can include their own data structures.
- Fig. 9 is an example flow diagram 152' of the matching origination IP addresses of the egress traffic metadata with network device metadata operation 152 of Fig. 6.
- Example process 152' begins at 186 and, in an operation 188, origination IP addresses of egress traffic from the firewall are extracted from the firewall traffic metadata. Next, in an operation 190, the extracted origination IP addresses are matched against network device metadata to identify the originating devices. Process 152' then ends at 192.
- Fig. 10 is an example network device metadata file structure 194, hereafter referred to as a Compromise Translation Table (CTT) 194.
- CTT 194 is a table having rows for various private network devices and columns for various attributes of those private network devices. Examples of private network devices include servers, computers, routers, peripherals, etc.
- the attributes of the network devices provided by columns of the CTT include the IP address(es). Media Access Control (MAC) address(es), a human-readable name, function(s), vulnerabilities, users, groups, and other attributes of the network devices.
- the CTT 194 can be partially populated automatically, e.g., using a network mapper, but is preferably augmented manually by the system administrator for the private network via a suitable user interface.
- Fig. 11 is an example flow diagram 154' of the matching destination IP addresses of the egress traffic metadata with suspect destination metadata to identify suspect destinations of the egress data packets operation 154 of Fig. 6.
- Example process 154' begins at 196 and, in an operation 198, destination IP addresses of egress traffic are extracted from the firewall traffic metadata. Next, in an operation 200, the extracted destination IP addresses are matched with suspect destination metadata to identify suspect destinations of the egresses packet data. Process 154' then ends at 202.
- Fig. 12 is an illustration of an example suspect destination file 204 including a list 206 of suspect IP addresses, and of an example suspect destination metadata file 208 including a table 210.
- the list 206 of the suspect destination file may be static or dynamic and can be populated with commercially available lists, manually, heuristically, etc.
- the table 210 of the suspect destination metadata fde 208 can be populated, at least in part, from the suspect destination list 206 and augmented with additional metadata including IP ranges, threat type, severity, etc.
- Fig. 13 is an illustration of an example methodology 156' for determining a compromise activity level of operation 156 of Fig. 6.
- the methodology 156' includes a Host Sensitivity Multiplier table 212, a Destination Host Score Factor table 214, a Port Criticality Factor table 216, a Communications of Concern table 218, a Factor/ Value/ Result table 220, an example score parameters 222 and example adjusted compromise concern calculation 224.
- the example score parameters had a minimum score of 23.75 and a maximum score 123.75 , which is then normalized to a scale of 1 to 100.
- the adjusted compromise concern calculation 224 uses two scales against a Fibonacci sequence to determine an adjustment for count of communications and data volume.
- a compromise activity level can be derived from the CCV using one or more rules. For example, the CAL can be assigned the value LOW for 1 ⁇ CCV ⁇ 20, MEDIUM for 20 ⁇ CCV ⁇ 80, and HIGH for 80 ⁇ CCV ⁇ 100.
- Fig. 14 is an illustration of a network port metadata file 226 including a table 228 including metadata concerning the one or more private network ports of the firewall.
- the methodology of Fig. 13 includes a port criticality factor 216. Egress traffic to suspect destinations sourced from private network ports 3389, 1433, 1521, 1531, 1541, 3306, etc. all factor into the compromise activity level concerns.
- private network port 3389 is used for remote access by Window s RDP and others.
- network port metadata file 226, in this example has a port table 228 including such entries as port number, common port usage (e.g, remote access, database access, etc.), and criticality’.
- Fig. 15 is a table 230 with a Fibonacci sequence and associated count adjustment and volume adjustment columns.
- the count adjustment increases by 5 and the volume adjustment increases by 2 for each number in the Fibonacci sequence.
- the count adjustment becomes fixed at 100, and at Fibonacci number 12,586,269,025 the volume adjust becomes fixed at 100.
- Fig. 16 is an example flow diagram 158' of the acting upon determined compromise activity levels in accordance with at least one rule operation 158 of Fig. 6.
- Process 158' idles in an operation 232 until a compromise concern score (CCS) is received. If the CCS is LOW, an operation 234 reports one or more potential system compromises before returning to operation 232. Since the CCS is LOW, the reports can be regular, scheduled reports to, for example, a system administrator. If the CCS is MEDIUM, one or more alerts are sent by operation 236. These alerts are of higher urgency and can be sent out immediately to one or more system managers, such as a database server manager or a group manager.
- CCS compromise concern score
- Process control can then go to operation 234 for a more extensive report or can return directly to the idle operation 232. If the CCS is HIGH, an operation 238 can automatically block the compromised activity, e.g., blocking a malicious device on the public network at the firewall or isolating a device on the private network that is infected with malware. Process control can then go to operation 236 to send one or more alerts and to operation 234 to send one or more reports, or process control can return directly to the idling operation 232. It will be appreciated that the action(s) undertaken are subject to one or more rules, e.g.. always notify, sometimes alert, but only block under extreme threat conditions.
- the present invention has significant industrial applicability in the realms of cybersecurity and computer network management.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A network compromise activity monitonng system includes a network connector, a compromise activity analyzer, and a compromise defender. The network connector has a public network port, at least one private network port, and an associated network connector traffic log concerning data packet traffic of the network connector. The compromise activity analyzer has access to suspect destination metadata, egress traffic metadata, and network device metadata, and is operative to determine a compromise activity level of one or more devices coupled to the at least one private network port. The compromise defender is responsive to the determined compromise activity level of the one or more devices and is operative to at least one of block, alert and notify in accordance with at least one rule.
Description
NETWORK COMPROMISE ACTIVITY MONITORING SYSTEM
Technical Field
[0001] This invention is related to computer networks and more particularly to computer network security systems.
Background Art
[0002] Computers and networks of computers are coming under increasingly sophisticated attacks by entities (often referred to as "hackers") who gain unauthorized access to computers and/or network devices. More specifically, hackers access devices such as computers, smartphones, tablets, and network devices without authorization, often to cause damage, corrupt systems, steal data, hold data hostage, or otherwise limit access to these devices by authorized users. The tool, tactics, techniques, and procedures of hackers are rapidly growing in sophistication, enabling activities from initial compromise, command and control, persistence, and data exfiltration to go unnoticed by cybersecurity and IT teams and the traditional tools they utilize. Hackers are skilled in creating attack vectors that trick employees and individual users into opening malicious attachments or links and freely giving up sensitive personal or company data or user credentials. Attack vectors include sharing malware and viruses, malicious email attachments and web links, phishing, pop-up windows, text messages, and instant messages.
[0003] Malware is any software that is intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with a user’s computer security and privacy. Types of malware include computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wipers and keyloggers.
[0004] Traditional defense strategies against hacking and malware include the use of network firewalls, end point agents to detect malware and viruses, and the collection of log data for aggregation into security information and event management (SIEM) tools. Antivirus and antimalware software attempts to identify viruses or malware, typically by
a known hash tag or signature that is designed to detect behaviors related to hacking behaviors. However, these software rely on the maintenance and constant update of a database of detection capabilities as ever more sophisticated, malware is developed. The use of such software is increasingly limited by the ability of hackers to use the same tools to test their malicious code against to determine if their code or techniques will evade detection. In contrast, a firewall is a security system that monitors and controls incoming (ingress) and outgoing (egress) network traffic based on predetermined security rules. Some firewalls also can perform analysis on network traffic to identify malicious files or unauthorized user activity. However, these methods tend to require well-trained security teams to review and process alerts to separate real attacks from false positives. A firewall establishes a security barrier betw een a trusted (“private”) device or network of devices and an untrusted (“public”) netw ork, such as the Internet. However, a firewall cannot prevent all attempted hacks, due to hackers increasingly using encrypted channels of communication that cannot be analyzed without more advanced traffic inspection capabilities.
[0005] Various types of network monitoring tools are used to collect and analyze data about network activity. Among these are “Syslog” and “NetFlow.” While these tools serve similar purposes, there are some key differences betw een them. Syslog is a standard protocol used for forwarding system log messages from one device to another. It is primarily used for collecting log data from various network devices, such as routers, switches, and servers. Syslog messages contain information about events that occur on the device, including security alerts, system errors, and other messages. The data is stored in text files and can be analyzed using various tools.
[0006] NetFlow , on the other hand, is a network protocol developed by Cisco that is used for traffic analysis and network monitoring. It collects and records information about network traffic flows, including the source and destination addresses, the type of traffic, and the amount of data transferred. NetFlow is used to identify network usage patterns, monitor network performance, and detect security threats.
[0007] In terms of similarities, both Syslog and NetFlow are used to collect and analyze data about network activity, and both are widely used in network monitoring and management. They provide valuable insights into network performance, security, and usage patterns. However, the main difference between the two is that Syslog focuses on
collecting log data, while NetFlow is focused on network traffic analysis. Both Syslog and NetFlow are important tools for network monitoring and management, but they serve different purposes. Syslog is used to collect log data from network devices, while NetFlow is used to analyze network traffic flow.
[0008] There are several alternatives to Syslog and NetFlow for network monitoring and management, each with its own strengths and weaknesses. Options include:
• sFlow: sFlow is a network monitoring protocol that is similar to NetFlow but provides more detailed information about network activity. It collects and analyzes data about network flows, including packet header information and application-level data, and can be used to identify network performance issues and security threats.
• SNMP: Simple Network Management Protocol (SNMP) is a widely used protocol for monitoring and managing network devices. It is used to collect data about device performance and status, such as CPU utilization, memory usage, and network traffic. SNMP is often used in conjunction with Syslog and other monitoring tools.
• ELK Stack: ELK Stack is a set of open-source tools that are used for log management and analysis. It includes Elasticsearch, Logstash, and Kibana, which can be used together to collect, store, and analyze log data from various sources. ELK Stack provides a powerful platform for log analysis and visualization.
• Graylog: Graylog is another open-source log management platform that is similar to ELK Stack. It can be used to collect, store, and analyze log data from various sources, including Syslog, and provides a powerful search and visualization interface.
• Wireshark: Wireshark is a widely used network protocol analyzer that can be used to capture and analyze network traffic. It provides detailed information about network packets and can be used to identify network performance issues, security threats, and other issues.
[0009]These are just a few of the many alternatives to Sy slog and NetFlow that are available. The choice of tool to provide data structures for analysis will depend on the specific needs of the organization, the type of network being monitored, and the level of detail required for analysis.
[00010] The term “initial access” refers to when a hacker (a/k/a intruder, threat actor, etc.) bypasses network defense measures and enters a computer network or computer system. Initial access can also be achieved with the introduction of malware into a computer via a thumb drive or flash drive. Several tools have been developed that attempt to detect, prevent and/or block access based on network activity including Intrusion Detection Tools and firewalls (IDS), Intrusion Prevention tools and firewalls (IPS), Malware defenses (e g., anti-malware, anti-virus), Endpoint Detections and Response (EDR), Managed Detection and Response (MDR), etc. These protective measures, which tend to focus on the network or perimeter, may not be sufficient to detect, prevent or remediate initial access. Hackers that successfully achieve initial access to computer networks and/or computer systems are considered to be intruders or “threat actors.” Increasingly industry groups and experts are of the belief that the protective measures (network or perimeter, and other measures) of prior art tools are not sufficient to ensure the safety of a private network.
[00011] The Department of Defense (DOD) cleared a document for open publication on November 7, 2022, relating to their “Zero Trust Strategy” which assumes "threat actors" may already be in a network system, computer, or device. DoD Zero Trust Strategy, Department of Defense, October 21, 2022, Cleared for Open Publication November 7, 2022, Office of Prepublication and Security Review. This suggests the need for a whole new body of solutions to understand and deal with intruders.
[00012] The topic of data breaches has been researched by many organizations including IBM/Ponemon Institute for a number of years. In a report entitled “Cost of a Data Breach Report 2022”, IBM Corporation, July 2022, IBM/Ponemon Institute suggest that the average time to detect data breaches is 207 days. They note that when assessing the damage caused by a data breach, the duration of the data breach must also be considered. Unfortunately, efficient and effective solutions to providing early detection of a data breach or other network system compromise have remained elusive in the prior art.
Summary of Invention
[00013] A network compromise activity monitoring system includes a network connector (e.g, a network connector device), a compromise activity analyzer (e.g., a
comprise activity analyzer device), and a compromise defender. The network connector has a public network port, at least one private network port, and an associated network connector traffic log concerning data packet traffic of the network connector, whereby data packets flowing into the at least one private network port and out of the public network port are egress traffic and wherein data packets flowing into the public network port and out of the at least one private network port are ingress traffic. The compromise activity analyzer has access to suspect destination metadata, egress traffic metadata, and network device metadata, and is operative to determine a compromise activity level of one or more devices coupled to the at least one private network port, based at least in part, upon the suspect destination metadata, the egress traffic metadata, and the network device metadata. The compromise defender is responsive to the determined compromise activity level of the one or more devices and is operative to at least one of block, alert and notify in accordance with at least one rule.
[00014] A network device compromise activity analyzer includes: a processor; and memory coupled to the processor having code segments (e.g. , instructions) executable on the processor for (a) retrieving firewall traffic metadata including at least egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of egress traffic of a firew all; (b) matching origination IP addresses of the egress traffic metadata with network device metadata to identify at least one originating device of the egress data packets; (c) matching destination IP addresses of the egress traffic metadata with suspect destination metadata to identify suspect destinations of the egress data packets; (d) determining a compromise activity level with respect to the at least one originating device based upon the egress traffic metadata, the netw ork device metadata, and the suspect destination metadata; and (e) acting upon determined compromise activity levels in accordance with at least one rule.
[00015] A computer-implemented method for monitoring compromise activity of a network device includes: providing firewall traffic metadata to a compromise activity analyzer including a digital processor and memory, wherein the firewall traffic metadata includes at least egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of egress traffic of the firewall; matching origination IP addresses of the egress traffic metadata with network device metadata to identify at least one originating device of the egress data packets; matching destination
IP addresses of the egress traffic metadata with suspect destination metadata; determining a compromise activity level to the at least one originating device based upon egress traffic metadata, the network device metadata and the suspect destination metadata; and acting upon determined compromise activity levels in accordance with at least one rule.
[00016] A non-transitory computer readable media including code segments executable on a digital processor for monitoring compromise activity of a network device having: code segments providing firewall traffic metadata including at least egress traffic metadata with origination Internet Protocol (IP) addresses and destination IP addresses of egress traffic of a firewall; code segments matching origination IP addresses of the egress traffic metadata with network device metadata to identify at least one originating device of the egress data packets; code segments determining a compromise activity level to the at least one originating device based upon egress traffic metadata and the network device metadata; and code segments acting upon determined compromise activity levels in accordance with at least one rule.
[00017] In an embodiment, a network device compromise activity analyzer includes: a processor and memory coupled to the processor including code segments executable on the processor and configured to direct the processor to: (a) retrieve egress traffic metadata associated with egress traffic; (b) identify at least one originating device of egress data packets, using the egress traffic metadata and network device metadata; (c) identify suspect destinations of the egress data packets, using the egress traffic metadata and suspect destination metadata; (d) determine a compromise activity level with respect to the at least one originating device based upon the egress traffic metadata, the network device metadata, and the suspect destinations; and (e) act upon determined compromise activity levels in accordance with at least one rule. The code segments may be configured to direct the processor to: (a) retrieve firew all traffic metadata including at least the egress traffic metadata, the egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of the egress traffic of a firewall; (b) match origination IP addresses of the egress traffic metadata with the netw ork device metadata to identify the at least one originating device of the egress data packets; and (c) match destination IP addresses of the egress traffic metadata with the suspect destination metadata to identify the suspect destinations of the egress data packets. The code segments may be configured to direct the processor to determine the compromise activity
level further based upon private network port metadata such as metadata concerning one or more private ports of a firewall. The code segments may be configured to direct the processor to act upon the determined compromise activity levels by performing at least one of: blocking, alerting, and notify ing.
[00018] The network device metadata may be stored as a Compromise Translation Table and include for each of a plurality of devices an IP address and a device type. The system may include a user interface to prompt a user to input device metadata. The network device metadata may further include for each of a plurality of devices one or more of a MAC address, a technical name, an organization name, and a department name. Code segments may be configured to direct the processor to match origination IP addresses of the egress traffic metadata with network device metadata, to identify at least one originating device of the egress data packets, by creating a list of one or more origination IP addresses of the egress traffic metadata and using the list of one or more origination IP addresses to search the Compromise Translation Table. The suspect destination metadata may be stored in a content-searchable format.
[00019] The code segments may be configured to direct the processor to match destination IP addresses of the egress traffic metadata with suspect destination metadata, to identify suspect destinations of the egress data packets, by creating a list of one or more destination IP addresses of the egress traffic metadata and using the list of one or more destination IP addresses to query the suspect destination metadata for the suspect threat metadata. The code segments are configured to direct the processor to analyze the egress traffic metadata for data rate of egress traffic to a destination IP address. The code segments may be configured to direct the processor to analyze the egress traffic metadata for contact or call back activity to a device IP address by a destination IP address. The code segments may be configured to direct the processor to analyze the egress traffic metadata for contact or call back activity to a plurality of device IP address by a destination IP address.
[00020] In an embodiment, a network compromise activity monitoring system includes: a network connector having a public network port, at least one private network port and an associated network connector traffic log concerning data packet traffic of the network connector, whereby data packets flowing into the at least one private network port and out of the public network port are egress traffic and wherein data packets flowing into the
public network port and out of the at least one private network port are ingress traffic in which a compromise activity analyzer as described above is operative to determine a compromise activity level of one or more devices coupled to at least one private network port based at least in part, upon the suspect destination metadata, the egress traffic metadata, and the network device metadata; and a compromise defender responsive to the determined compromise activity level of the one or more devices and operative to at least one of block, alert and notify in accordance with the at least one rule. The compromise activity analyzer may have access to ingress traffic metadata so that the ingress traffic metadata is used, at least in part, to determine the compromise activity level of the one or more devices. The egress traffic metadata and the ingress traffic metadata may be derived from the network connector traffic log. The compromise activity analyzer may have access to private network port metadata concerning the at least one private network port so that the private network port metadata is used, at least in part, to determine the compromise activity level of the at least one of the plurality of devices. The compromise defender can be a part of the compromise activity analyzer. The compromise activity analyzer can be a part of the network connector. The network connector can be a firewall or a router.
[00021] A computer-implemented method for monitoring compromise activity of a network device, the method comprising a compromise activity analyzer including a processor and memory: and retrieving egress traffic metadata; identifying at least one originating device of egress data packets, using the egress traffic metadata and network device metadata; identifying suspect destinations of the egress data packets, using the egress traffic metadata and suspect destination metadata; determining a compromise activity level with respect to the at least one originating device based upon egress traffic metadata, the network device metadata, and the suspect destinations; and acting upon determined compromise activity7 levels in accordance with at least one rule. The computer-implemented method may further comprise the compromise activity analyzer retrieving firewall traffic metadata including at least the egress traffic metadata, the egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of the egress traffic of a firewall; matching origination IP addresses of the egress traffic metadata with the network device metadata to identify the at least one originating device of the egress data packets; and matching destination IP addresses of the egress traffic metadata with the suspect destination metadata to identify the suspect
destinations of the egress data packets. The computer-implemented method may further comprise the compromise activity analyzer analyzing the egress traffic metadata for data rates above a given threshold, frequency of egress traffic and/or patterns of egress traffic. The computer-implemented method may further comprise the compromise activity analyzer analyzing the network device metadata for an importance of the device and/or analyzing the suspect destination metadata for threat severity.
[00022] In an embodiment, a network compromise activity monitoring system includes: a network connector having a public network port, at least one private network port, and an associated network connector traffic log concerning data packet traffic of the network connector, whereby data packets flowing into the at least one private network port and out of the public network port are egress traffic and wherein data packets flowing into the public network port and out of the at least one private network port are ingress traffic. A compromise activity' analyzer has access to suspect destination metadata, said traffic log, and network device metadata. The compromise activity analyzer being operative to determine a compromise concern score of one or more devices coupled to the at least one private network port, based at least in part, upon the suspect destination metadata, the egress traffic metadata, and the network device metadata of a number of data packets passing through the network connector. The compromise concern score is given an initial value and is adjusted by a threat level determined for each of said number of data packets from said the suspect destination metadata, the egress traffic metadata, and the network device metadata. A compromise defender responsive to the determined compromise concern score of the one or more devices and operative to at least one of block, alert and notify' in accordance with at least one rule.
[00023] In an embodiment, a non-transitory computer readable media including code segments executable on a processor for monitoring compromise activity of a network device, the code segments configured to direct the processor to perform the methods described herein, can be provided.
[00024] An advantage of example embodiments is that compromises of network devices such as servers and computers can be detected in a timely fashion by an examination of traffic transiting the network connector, one representation of which is a firewall.
[00025] These and other embodiments, features and advantages will become apparent to those of skill in the art upon a reading of the following descriptions and a study of the figures of the drawing.
Brief Description of Drawings
[00026] Several examples will now be described with reference to the drawings, wherein like elements and/or acts are provided with like reference numerals. The examples are intended to illustrate, not limit, concepts disclosed herein. The drawings include the following figures:
[00027] Figure 1 is a block diagram of a first example public/private network system with a network compromise activity analyzing system;
[00028] Figure 2 is a block diagram of an example computer platform of the network compromise activity analyzing system;
[00029] Figure 3 is a block diagram of a second example public/private network system including multiple network compromise activity analyzing systems;
[00030] Figure 4 is a block diagram of an example cloud-based network compromise activity analyzing system;
[00031] Figure 5 is a block diagram of an example Compromise Defender of Fig. 4;
[00032] Figure 6 is a flow diagram of an example process implemented by a compromise activity analyzer;
[00033] Figure 7 is a flow diagram of an example process for providing firewall traffic metadata;
[00034] Figure 8 is an illustration of an example firewall traffic log file and firewall traffic metadata table;
[00035] Figure 9 is a flow diagram of an example process for matching origination IP addresses of egress traffic metadata with network device metadata;
[00036] Figure 10 is an illustration of an example network device metadata table;
[00037] Figure 11 is an example flow diagram of a process for matching destination IP addresses with suspect destination metadata;
[00038] Figure 12 is an illustration of example suspect destination list and suspect destination metadata table;
[00039] Figure 13 is an illustration of an example methodology for determining a compromise activity level;
[00040] Figure 14 is an illustration of a network port metadata table;
[00041] Figure 15 is a table with a Fibonacci sequence and associated count and volume adjustment values; and
[00042] Figure 16 is an example flow diagram of a process for acting upon determined compromise activity levels in accordance with at least one rule.
Description of Embodiments
[00043] In Fig. 1 , an example network system 10 includes a private network 12, a public network 14, and a network compromise activity analyzing system 16. In this example, the private network 12 is a local area network (LAN) of, for example, a private business, and the public network 14 is a wide area network (WAN), such as the Internet. The public network 14 can provide a number of cloud services such as cloud firewalls, virtual private networks (VPNs), could computing, software as a service (SaaS), cloud data storage, etc. The network compromise activity analyzing system 16, also in this example, includes a firewall 18, a compromise activity analyzer 20 including an integrated compromise defender module CDM. In other embodiments, the CDM can be separate from the compromise activity analyzer 20, e.g., provided as Software as a Service (SaaS) on Internet 14.
[00044] Communication between devices of the network system 10 comprise digital data packets having headers (and sometimes trailers and/or footers) which provide information about the data packet’s contents, origination and destination. For example, an Internet Protocol (IP) packet has a header that contains information about where a packet is from (its source IP address), where it is going (destination IP address), how large the packet is, and how long network routers should continue to forward the packet before dropping it. It may also indicate whether or not the packet can be fragmented and include information about reassembling fragmented packets.
[00045] Private network (LAN) 12. in this non-limiting example, includes a number of devices including a router 22, a hub switch 24, a printer 26, a number of servers 28A- 28N, a switch 30, a number of workstations 32A - 32N, a WiFi router 34 and three example WiFi enabled devices such as computer 36, tablet 38 and mobile phone 40. Each of the devices of example LAN 12 has an assigned Internet Protocol (IP) address, some of which may be static and some of which may be dynamic. For example, WiFi connected devices such as computer 36, tablet 38 and mobile phone 40 may be assigned a dynamic IP address as they connect to the WiFi router 34, while the servers 28A - 28N may be assigned static IP addresses.
[00046] In this example, the firewall 18 is a commercially available hardware firewall available from several manufacturers including Cisco Systems. WatchGuard, Fortinet, and Barracuda Networks. In alternate embodiments, firewall 18 can be implemented as software running on a server, computer, or in the Cloud (e.g., in a cloud firewall on Internet 14). Firewall 18 includes several modules including a packet blocking (PB) module to block certain data packets, a firewall logic (FL) module to control the PB module, a firewall rules (FR) module used by the FL module, a masking (MA) module to mask the IP addresses of devices connected to the private LAN 12, and firewall traffic log (FT) module. In other examples, a firewall can comprise any hardware or virtual networking device that has a public network port and at least one private network port.
[00047] An important purpose for the firewall 18 is to prevent the transfer of malicious code or unauthorized data between the private LAN 12 and the public WAN 14. It accomplishes this in several ways. For one, the MA module can mask the IP addresses of the devices of LAN 12 from the public network 14, typically using a process known as network address translation (NAT). This process results in devices on the LAN being assigned private IP addresses instead of publicly addressable IP addresses. This often presents a challenge to security analytics tools as the same private IP address may be utilized by millions of devices globally. Also, the FL module inspects data packets for source and destination IP addresses, port numbers, type, etc. and uses a set of rules from the FR module to stop certain data packets with the packet blocking module PB from being transferred from the WAN to the LAN and potentially vice versa.
[00048] The example firewall 18 of Fig. 1 is illustrated with a public network port 42 coupled to the WAN 14 and a private network port 44 coupled to a router 22 of LAN 12.
The public network port 42 and the private network port 44 are typically Input/Output (I/O) ports adhering to the IEEE 802.3 standard and are commonly referred to as Ethernet ports. Other firewalls have different configurations of I/O ports, e.g., many hardware firewalls have a number of private network ports to supplement or replace the need for router 22. As noted, not every’ data packet sent from WAN 14 to public network port 42 is allowed to pass through firewall 18 and enter the LAN 12. Furthermore, in some cases, not every data packet sent from LAN 12 to network port 44 is allowed to pass through firewall 18 and enter the WAN 14. The FR module generally includes a rules table which governs which data packets are allowed to flow through the firewall and which packets are to be blocked.
[00049] As noted above, firewall 18 of Fig. 1 includes a FT module which at least temporarily stores log data concerning data packet traffic, referred to herein as ‘'firewall traffic” or “FT”, to facilitate ongoing exchanges between devices of LAN 12 and devices of WAN 14. Data packets leaving port 42 for WAN 14 are referred to herein as “egress data packets” or the like and are labelled “E" on Fig. 1 and data packets leaving port 44 for LAN 12 are referred to herein as “ingress data packets” or the like and are labelled “I” on Fig. 1. The egress data packets will have a masked version of the LAN 12 device IP address as the origination of the packet and the IP address of the device on WAN 14 to which it is travelling. Conversely, ingress data packets will have the IP address of the device on the WAN 14 as its origin, and a masked version of the LAN 12 device IP address to which it is travelling.
[00050] The compromise activity analyzer 20 is a digital logic system including, in the present example, a processor and memory with a firewall traffic metadata (FTM) module, a network device metadata (NDM) module, a compromise activity analysis (CAA) module, a compromise defender module (CDM) module, and a suspect destination metadata (SDM) module. The FTM module derives its data from the FT module of firewall 18, either by direct communication with the firewall 18, e.g., via an Ethernet connection, or by indirect communication, e.g., via the WAN 14, as indicated by broken lines. The NDM module can optionally store the network device metadata in content- addressable format such as content-addressable memory (CAM) so that metadata for a device can be retrieved by the IP address of the device. The CAA module uses metadata from the FTM module and the NDM module to assign a device compromise index (DCI)
to various servers, computers, and other devices of the private network 12. The CDM module uses the DCI of the network devices to take appropriate actions to address the threats of system compromise. While the CDM module forms a part of the compromise activity' analyzer 20 in this embodiment, it can also be a separate module in communication with the compromise activity analyzer. The SDM module includes IP addresses of suspect destinations, along with metadata including threat levels, type of threat, etc. The SDM metadata can be supplemented from a variety of sources, including databases provided in public network 14.
[00051] It wi 11 be noted that the compromise activity analyzer 20 uses metadata from several sources including egress traffic metadata, network device metadata, and suspect destination metadata. As well known to those of skill in the art, metadata is data that describes other data, such as describing the origin, structure and characteristics of data packets, devices, network endpoints, etc. The form that metadata takes can vary, although it is often in the form of a file, array, table, or list. For example, the egress traffic metadata can be derived from the packet headers of egress traffic, e.g., IP address of source, IP address destination, packet importance, packet size, port numbers, etc. The network device data is conveniently created as a table, sometimes referred to herein as a Compromise Translation Table (CTT), and includes such fields as IP Address(es), MAC Address(es), Private Port#, Device Name, Function, Vulnerabilities, User, Groups, etc. The suspect destination metadata can also be arranged as a table, with IP Address(es) of known bad actors, the type of threat associated with the IP Address(es), the severity of the threat, etc. The various metadata structures can be conveniently stored in Content Addressable Memory’ (CAM), such as CAM 53 of Fig. 2. By storing, for example, the suspect destination metadata in CAM, each destination address of the egress traffic can quickly search the suspect destination metadata (which can include thousands of IP addresses) for a match. Other search and metadata data structures are well known to those of skill in the art.
[00052] In Fig. 2, another implementation of compromise activity analyzer 20, set forth by way of example and not limitation, includes a local bus 46 and a Central Processing Unit (CPU) 48 coupled to the local bus 46 by high-speed Static Random Access Memory (SRAM) cache memory 50. Dynamic Random Access Memoiy (DRAM) primary or
"main” memory 52 is coupled to cache memory 50 and to the bus 46. Content Addressable Memory (CAM) 53 or other content-searchable data storage may also be provided in certain embodiments. Basic Input / Output System (BIOS) 54 is coupled to bus 46 and can be reset by power-on reset 56. Compromise activity analyzer 20 also includes non-volatile memory 58, such as "‘flash” memory’ or a hard drive, network interface 60, and other input/output (I/O) interfaces 62. It will be appreciated that this is only one suitable architecture for compromise activity analyzer. For example, the compromise activity' analyzer 20 can be integrated into firewall 18, be implemented on a server, or provided by cloud computing on Internet 14.
[00053] Fig. 3 illustrates an example network system 10’ including anumber of private networks 64A. 64B, and 66, and a public network (e.g, the Internet) 14. Private networks 64A and 64B are, in this example, company intranets or the like, and network 66 is a service provider network providing Software as a Solution (SaaS) services to customers. For example, service provider network 66 can provide network compromise activity' monitoring for companies (a/k/a customers) associated with, for example, company network 64B and for a private virtual network on public network 14.
[00054] In this example, networks are coupled together by network connectors, or simply “connectors.” The defining characteristics of a network connector is that it has one or more private network ports, a public network port, and the ability' to provide data for a connector traffic log (CTL). For example, a network connector can provide Logging Protocol (Syslog) messages which are collected in a Syslog data structure.
[00055] There are several types of connectors that are suitable for use in network system 10’. The aforementioned firewalls are examples of network connectors, where firewall (connector) traffic log messages are stored in a Syslog or other data structure to provide the basis for firewall (connector) traffic metadata. Another example of a connector is a network router having a public network port and one or more private network ports along and having router traffic metadata collection capabilities. Therefore, as used herein, a “network connector” or simply “connector” is defined as a network device having a public network port, one or more private network ports, and the ability to provide connector traffic messages or logs (CTL).
[00056] In this example, private network 64A includes a network connector 68A (including a CTL module) having one or more private network ports 69A coupled to
devices of network 64A and a public network port 69B coupled to a compromise analyzer 70 and to the public network 14. This configuration is like that shown in Fig. 1, where the compromise analyzer 70 (including a CTM module) can be physically located near or within the network connector 68A or can be located remotely, e.g, as a real or virtual device on the public network 14.
[00057] Also, in this example, private network 64B includes a network connector 68B (including a CTL module) having one or more private network ports 71A coupled to devices of private network 64B and a public network port 7 IB coupled to the public network 14 and to a compromise analyzer 76 (including a CTM module) of service provider network 66. Also coupled to compromise analyzer 78 is a public network port 77B of a virtual network connector 78 (including a CTL module), which has a private network port 77A. In this non-limiting example, private network port 77A is coupled to a mobile device 79 which can be monitored by compromise analyzer 76.
[00058] It will be appreciated that the example network compromise activity monitoring systems described herein have the advantage of detecting compromise activity that may take place before an actual breach of a private network system. An important source of information is the egress traffic metadata, which generally reflects the "Layer 3" or network layer of Internet data packets. In particular, Layer 3 is responsible for all packet forw arding between intermediate routers. While very' useful information concerning compromise activity can be found in the egress traffic metadata alone, complementing this with network device metadata (e.g., the CTT table mentioned previously), and the suspect destination metadata substantially augments the detection process.
[00059] Compromise activity detection and analysis can monitor for potential indicators of a breach including:
• New communication patterns
• C ommunication with known threat hosts
• beaconing or call-back types of activities
• abnormal data flow to or from systems
• communication on non-standard ports
• interaction with new SaaS or Application Servers
• Command & Control activity’
• new or abnormal interaction with Data Upload/ Storage Hosts
• communication with an external server used to download Malware or dow nload more Malware (bootstrapping Malware) - sometimes referred to as "call back systems"
• communication with a threat actor who is conducting surveillance to determine network and system infrastructure and also to look for sensitive content (sometime referred to as communications with "command and control" systems (servers or a person using a laptop or desktop system)
• planting code or Malware that could provide ongoing surveillance activity (key loggers, Remote Access Trojan (RAT), etc.)
• destruction of data, encryption of data, theft, or exfiltration of data
[00060] Hackers have a wide range of motivations ranging from the relatively benign (ego satisfaction, curiosity) to the more sinister. Early detection of hacking by detecting patterns of compromise activity can help prevent business compromise activities such as the follow ing:
• Potential "ransomware" activities
• Potential Data Breach activities - used in some cases with ransomware
• Potential data loss - example of sensitive business data or sensitive government data (classified, CUI, FCI) - used in some cases w ith ransomware
• Potential encryption of data - used in some cases with ransomware
• Potential destruction of data or systems ("Hactivists", or nation states attacking defense or critical infrastructure systems)
[00061] By way of example, abnormal communications can be detected over a period of time to detect changes from the "normal." For example, a device exhibiting a new pattern of communication or sudden high number of communications. Large data volume can be detected when volume of communication increases suddenly with an external host. For example, compromise activity may be detected when communication deviates from a historical norm, e.g., by two standard deviations. Port monitoring with suspect private network ports, such as port 3389 which is used for remote desktop control, can provide useful compromise activity information. Beaconing refers to periodic, routine communications between an internal host and an external host and is sometimes considered a marker for compromise activity .
[00062] Fig. 4 is a block diagram of an example cloud-based network compromise activity analyzing system 16’, including connector 74B and compromise activity analyzer 76. In this example, egress traffic data 82 from the connector 74B is input into the compromise activity analyzer 76 and is processed to determine compromise activity' level of one or more devices on customer private networks. To accomplish this task, the compromise activity analyzer is coupled to a number of modules including a Compromise Translation Table (CTT) module 84 which includes network device metadata, External Data, and Indicators module 86 which includes suspect destination metadata, Internal Automated Analysis module 88 which includes heuristic and statistical analysis, and Machine Learning module 90 which includes expert system and/or neural network analysis. Also shown in Fig. 4 is a Compromise Defender Module (CDM) 92 which is coupled to the compromise activity analyzer 76 and to the connector 74B. The CDM 92 is also coupled to an Automated and Manual Integrations module 94. It is noted that the CDM 92 is separate from the compromise activity analyzer 76 in this embodiment. Network connector device, compromise defender device 92 and compromise activity' analyzer device 76 may be included in one device or may be included in different devices.
[00063] With continuing reference to Fig. 4, the example compromise activity' analyzer 76 includes a Lookup Relationship to Target Systems module 96, an Analyze Traffic module 98, and an Extract Metadata module 100. These three modules analyze the egress traffic 82 from the connector 74B and develop egress traffic metadata used for further analysis. The example compromise activity analyzer 76 further includes a Determine Severity/Impact module 102, a Develop Compromise Risk Rating module 104, and a Determine if Action is Required module 106. These three modules analyze potential compromise activity based, at least in part, upon the device metadata received from CTT module 84, estimates the nsk of the compromise activity, and determines if any deterrent action is required based upon predetermined heuristics. As will be explained in greater detail subsequently, if module 106 determines that action is required, Compromise Defender module 92 can come into play. Finally, the example compromise activity analyzer 76 further includes an Identify Potential Threat Actor Activity module 108, an Identify Anomalous Activity module 110, and a Determine Compromise Probability' module 112. These modules communicate with modules 86-90 and provide an input to module 104 to develop a compromise risk rating.
[00064] Fig. 5 is a block diagram of an example Compromise Defender Module (CDM) 92 of Fig. 4. As noted previously, the Compromise Defender module 92 is coupled to connector 74B, Compromise Activity Analyzer 76 and Automated and Manual Integration module 94. In this example, the Compromise Defender module 92 includes a Compromise Defender Engine module 114, a Determine if Updates Required to CTT module 116, and an Interact with Other Automated and Manual Integrations module 118. These three modules cooperate to coordinate the response to detected compromise activity7 and to update the device metadata (CTT) if required. The Compromise Defender Engine module 114 also selectively activates an Alerts and Notification Engine module 120, which selectively activates a Perform Notifications module 122, which selectively activates a Maintain and Update Alerts module 124. These three modules provide alerts and notifications to system administrators, device administrators, Information Technology (IT) departments, etc. The Compromise Defender Engine module 114 also selectively activates a Create/Update Reporting module 126. which selectively activates the Distribute Reporting module 128. The Compromise Defender Engine module 1 14 further selectively activates a Blocking Engine module 130, which selectively activates an Isolate Endpoint module 132, which selectively activates a Report to Law Enforcement module 134. which selectively activates an Automated Forensics Data Analysis module 136. These modules respond to serious breaches of network devices (endpoints) such as servers by isolating the endpoints from attack. Depending upon the sensitivity of the breached endpoint (e.g, a server including classified information), the breach may be automatically reported to law enforcement. The Compromise Defender Engine module 114 also selectively activates a Mitigation Engine 138, which selectively activates a Monitor Active Compromise module 140, which selectively activates a Patch Endpoint module 142 and a Trigger Forensics Data Collection module 144, the latter of which selectively activates the Automated Forensics Data Analysis module 136. In this instance, a network device (endpoint) that is subject to suspicious compromise activity7 may be '■patched." e.g., reassigned a new IP address, to mitigate the issue.
[00065] Fig. 6 is an example process 146 implemented by code segments running on, for example, the compromise activity analyzer 20 of Fig. 2. Process 146 begins at 148 and, in an operation 150, the compromise activity7 analyzer 20 receives fireyvall traffic metadata including at least egress traffic metadata yvith origination Internet Protocol (IP) addresses and destination IP addresses of egress traffic of a firewall. The fireyvall traffic
metadata can be received from a firewall, can be derived from an examination of egress traffic of the firewall, or by any other suitable method. Next, in an operation 152, the compromise activity analyzer 20 matches origination IP addresses of the egress traffic metadata with network device metadata to identify at least one originating device of the egress data packets. The network device metadata can be derived by automated network mapping or can be in the form of a table or the like provided by a network administrator. The network device metadata includes information related to the at least one originating device. The network device metadata includes at least one of a private network port number, an IP address, a device type for each of the at least one originating device, one or more of a MAC addresses, a technical name, an organization name, and a department name. The compromise activity analyzer device 20 creates a list of one or more origination IP addresses of the egress traffic metadata. Compromise activity analyzer device 20 uses the list of one or more origination IP addresses to query the content- addressable memory of the network device metadata to identify the at least one originating device. Therefore, compromise activity analyzer device 20 can identify at least one originating device of the egress data packets. In an operation 154, the compromise activity analyzer 20 matches destination IP addresses of the egress traffic metadata with suspect destination metadata to identify suspect destinations of the egress data packets. Suspect destination metadata can be derived over time or can be acquired from third party organizations. The compromise activity analyzer device 20 creates a list of one or more destination IP addresses of the egress traffic metadata. The compromise activity analyzer device 20 uses the list of one or more destination IP addresses to query the content-addressable memory for the suspect destination metadata. Therefore, the compromise activity analyzer device 20 can identify' suspect destinations of the egress data packets. Next, in an operation 156, the compromise activity analyzer 20 determines a compromise activity level with respect to the at least one originating device based upon egress traffic metadata, the network device metadata, and the suspect destination metadata. The compromise activity level can be scaled, e.g., on a scale of 1-10, or can be labelled as low, medium, and high. Finally, in an operation 158, the compromise activity analyzer 20 acts upon determined compromise activity7 levels in accordance with at least one rule. For example, low compromise activity levels can be ignored, medium compromise activity levels can be reported to an administrator of a network device, and
a high activity level can result in automated responses to an immediate threat. Examples of various actions include blocking, alerting, and notifying.
[00066] Fig. 7 is a flow diagram of an example process 150' for receiving firewall traffic metadata including at least egress traffic metadata of Fig. 6. In this example, process 150' begins at 160 and, in an operation 1 2, it is determined if there is a current firewall traffic metadata file. If yes, the firewall traffic metadata file is retrieved in an operation 164 and, if not, a new firewall traffic metadata file is created in an operation 166. Next, an operation 168 determines if there is new firewall traffic log data. If so, the firewall traffic metadata file is updated in an operation 170. If not, or after operation 170, the process continues with an operation 172 which determines if the firewall traffic metadata includes egress traffic metadata. If not, process control returns to operation 168 to await new firewall traffic log data. If so, an operation 174 delivers firewall traffic metadata and process 150' ends at 176.
[00067] Fig. 8 is an illustration of an example firewall traffic logfile 178 including a list 180 and an example firewall traffic metadata file 182 including a table 184. The firewall traffic log list 180 can be, in this non-limiting example, derived from System Logging Protocol (Syslog) messages produced by a firewall. Syslog messages include a timestamp, severity rating, device ID (including IP address), and information specific to the event. Syslog messages are typically sent via User Datagram Protocol (UDP) port 514. UDP is considered to be a connectionless protocol, where messages are not acknowledged or guaranteed to arrive. Syslog messages are often in a human-readable format, but do not need to be. In its header, each Syslog message has a priority level, which is a combination of a code for the process of the device creating the message and a severity level.
[00068] With continuing reference to Fig. 8, the example firewall traffic metadata file extracts metadata from the large amount of Syslog data stored in the firewall traffic log 180. For example, table 184 can have rows representing communications between a device on a public network (having a public IP address) and a device on a private network (having a private IP address). Columns of table 184 can include the source and destination IP addresses, port information for the private network device, port information for the public network device, timestamps, flags for egress traffic and ingress traffic, and other relevant factors, in this non-limiting example. It should
be noted that egress traffic metadata and ingress traffic metadata can be subsets of the firewall traffic metadata file 182. Alternatively, the egress traffic metadata and ingress traffic metadata can include their own data structures.
[00069] Fig. 9 is an example flow diagram 152' of the matching origination IP addresses of the egress traffic metadata with network device metadata operation 152 of Fig. 6. Example process 152' begins at 186 and, in an operation 188, origination IP addresses of egress traffic from the firewall are extracted from the firewall traffic metadata. Next, in an operation 190, the extracted origination IP addresses are matched against network device metadata to identify the originating devices. Process 152' then ends at 192.
[00070] Fig. 10 is an example network device metadata file structure 194, hereafter referred to as a Compromise Translation Table (CTT) 194. In this non-limiting example, CTT 194 is a table having rows for various private network devices and columns for various attributes of those private network devices. Examples of private network devices include servers, computers, routers, peripherals, etc. In this example, the attributes of the network devices provided by columns of the CTT include the IP address(es). Media Access Control (MAC) address(es), a human-readable name, function(s), vulnerabilities, users, groups, and other attributes of the network devices. The CTT 194 can be partially populated automatically, e.g., using a network mapper, but is preferably augmented manually by the system administrator for the private network via a suitable user interface.
[00071] Fig. 11 is an example flow diagram 154' of the matching destination IP addresses of the egress traffic metadata with suspect destination metadata to identify suspect destinations of the egress data packets operation 154 of Fig. 6. Example process 154' begins at 196 and, in an operation 198, destination IP addresses of egress traffic are extracted from the firewall traffic metadata. Next, in an operation 200, the extracted destination IP addresses are matched with suspect destination metadata to identify suspect destinations of the egresses packet data. Process 154' then ends at 202.
[00072] Fig. 12 is an illustration of an example suspect destination file 204 including a list 206 of suspect IP addresses, and of an example suspect destination metadata file 208 including a table 210. The list 206 of the suspect destination file may be static
or dynamic and can be populated with commercially available lists, manually, heuristically, etc. Jn this non-limiting example, the table 210 of the suspect destination metadata fde 208 can be populated, at least in part, from the suspect destination list 206 and augmented with additional metadata including IP ranges, threat type, severity, etc.
[00073] Fig. 13 is an illustration of an example methodology 156' for determining a compromise activity level of operation 156 of Fig. 6. The methodology 156' includes a Host Sensitivity Multiplier table 212, a Destination Host Score Factor table 214, a Port Criticality Factor table 216, a Communications of Concern table 218, a Factor/ Value/ Result table 220, an example score parameters 222 and example adjusted compromise concern calculation 224. In this example, the example score parameters had a minimum score of 23.75 and a maximum score 123.75 , which is then normalized to a scale of 1 to 100. The adjusted compromise concern calculation 224 uses two scales against a Fibonacci sequence to determine an adjustment for count of communications and data volume. The maximum of the Count Adjustment and the Data Volume Adjustment is then used with a weighted average to calculate a compromise concern value (CCV) between 1 and 100. A compromise activity level (CAL) can be derived from the CCV using one or more rules. For example, the CAL can be assigned the value LOW for 1 < CCV < 20, MEDIUM for 20 < CCV < 80, and HIGH for 80 < CCV < 100.
[00074] Fig. 14 is an illustration of a network port metadata file 226 including a table 228 including metadata concerning the one or more private network ports of the firewall. It will be noted that the methodology of Fig. 13 includes a port criticality factor 216. Egress traffic to suspect destinations sourced from private network ports 3389, 1433, 1521, 1531, 1541, 3306, etc. all factor into the compromise activity level concerns. For example, private network port 3389 is used for remote access by Window s RDP and others. It will therefore be appreciated that network port metadata file 226, in this example, has a port table 228 including such entries as port number, common port usage (e.g, remote access, database access, etc.), and criticality’.
[00075] Fig. 15 is a table 230 with a Fibonacci sequence and associated count adjustment and volume adjustment columns. In this non-limiting example, the count adjustment increases by 5 and the volume adjustment increases by 2 for each number
in the Fibonacci sequence. At Fibonacci number 6,765 the count adjustment becomes fixed at 100, and at Fibonacci number 12,586,269,025 the volume adjust becomes fixed at 100.
[00076] With further reference to Figs. 13-15, the general approach to determining a compromise concern score is as follows:
1. Start with a score of 50 as a default.
2. Use the Host Sensitivity Multiplier to adjust the score by 25% or 50%
3. Use the Destination Host Threat Score to adjust the number up or down by 50%
4. Apply a factonng based on the criticality of the port.
5. In this example, this results in a number between 23.75 and 123.75. Normalize the number to a scale of 1 to 100.
6. Use the count of communications and the volume of communications to adjust the score on a weighted average as follows: a. Weight count and data volume with a Fibonacci sequence, where count adjustments increment by 5, and data volume adjustments increment by 2 against the sequence, as seen in Fig. 15; and b. Use the maximum of these scores with a 2X weighted average against the Normalized Score to calculate the Compromise Concern Score (CCS)
[00077] Fig. 16 is an example flow diagram 158' of the acting upon determined compromise activity levels in accordance with at least one rule operation 158 of Fig. 6. Process 158' idles in an operation 232 until a compromise concern score (CCS) is received. If the CCS is LOW, an operation 234 reports one or more potential system compromises before returning to operation 232. Since the CCS is LOW, the reports can be regular, scheduled reports to, for example, a system administrator. If the CCS is MEDIUM, one or more alerts are sent by operation 236. These alerts are of higher urgency and can be sent out immediately to one or more system managers, such as a database server manager or a group manager. Process control can then go to operation 234 for a more extensive report or can return directly to the idle operation 232. If the CCS is HIGH, an operation 238 can automatically block the compromised activity, e.g., blocking a malicious device on the public network at the firewall or isolating a device on the private network that is infected with malware. Process control can then go to operation 236 to send one or more alerts and to operation 234 to send one or
more reports, or process control can return directly to the idling operation 232. It will be appreciated that the action(s) undertaken are subject to one or more rules, e.g.. always notify, sometimes alert, but only block under extreme threat conditions.
Industrial Applicability
[00078] The present invention has significant industrial applicability in the realms of cybersecurity and computer network management.
Claims
1. A network device compromise activity analyzer (20) comprising: a processor (48); and memory (50, 52) coupled to the processor (48) including code segments executable on the processor (48) and configured to direct the processor (48) to:
(a) retrieve egress traffic metadata associated with egress traffic;
(b) identify at least one originating device (26, 28A, 28N, 32A, 32N, 36, 38, 40) of egress data packets, using the egress traffic metadata and network device metadata;
(c) identify suspect destinations of the egress data packets, using the egress traffic metadata and suspect destination metadata;
(d) determine a compromise activity level with respect to the at least one originating device (26, 28A, 28N, 32A, 32N, 36, 38, 40) based upon the egress traffic metadata, the network device metadata, and the suspect destinations; and
(e) act upon determined compromise activity levels in accordance with at least one rule.
2. The network device compromise activity analyzer (20) of claim 1, wherein the code segments are configured to direct the processor (48) to:
(a) retrieve firewall traffic metadata including at least the egress traffic metadata, the egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of the egress traffic of a firewall (18);
(b) match origination IP addresses of the egress traffic metadata with the network device metadata to identify the at least one originating device (26, 28A, 28N, 32A, 32N, 36, 38, 40) of the egress data packets; and
(c) match destination IP addresses of the egress traffic metadata with the suspect destination metadata to identify the suspect destinations of the egress data packets.
3. The network device compromise activity analyzer (20) of one of claims 1 or 2, wherein the code segments are configured to direct the processor (48) to determine the compromise activity level further based upon private network port metadata.
4. The network device compromise activity analyzer (20) of one of claims 1 or 2, wherein the code segments are configured to direct the processor (48) to determine the compromise activity level further based upon private network port metadata, the private network port metadata concerning one or more private ports (44) of a firewall (18).
5. The network device compromise activity analyzer (20) of one of claims 1 to 4, wherein the code segments are configured to direct the processor (48) to act upon the determined compromise activity levels by performing least one of: blocking, alerting, and notifying.
6. The network device compromise activity analyzer (20) of one of claims 1 to 5, wherein the network device metadata includes for each of a plurality of devices an IP address and a device type.
7. The network device compromise activity analyzer (20) of one of claims 1 to 6, wherein the network device metadata further includes for each of a plurality of devices one or more of: a MAC address, a technical name, an organization name, and a department name.
8. The network device compromise activity analyzer (20) of one of claims 1 to 7, wherein the network device metadata is stored as a Compromise Translation Table (194).
9. The network device compromise activity analyzer (20) of claim 8, wherein the Compromise Translation Table (194) can be partially populated automatically but is preferably augmented manually by a system administrator.
10. The network device compromise activity analyzer (20) of claim 9 wherein the Compromise Translation Table (194) includes vulnerabilities and other attributes of the network devices.
11. The network device compromise activity analyzer (20) of one of claims 8 to 10, wherein the code segments are configured to direct the processor (48) to match origination IP addresses of the egress traffic metadata with network device metadata, to identify at least one originating device (26, 28A, 28N, 32A, 32N, 36, 38, 40) of the egress data packets, by creating a list of one or more origination IP addresses of the egress traffic metadata, and using the list of one or more origination IP addresses to search the Compromise Translation Table.
12. The network device compromise activity analyzer (20) of one of claims 1 to 11, wherein the suspect destination metadata is stored in a content-searchable format.
13. The network device compromise activity analyzer (20) of one of claims 1 to 12, wherein the code segments are configured to direct the processor (48) to match destination IP addresses of the egress traffic metadata with suspect destination metadata, to identify suspect destinations of the egress data packets, by creating a list of one or more destination IP addresses of the egress traffic metadata, and using the list of one or more destination IP addresses to query the suspect destination metadata for the suspect threat metadata.
14. The network device compromise activity analyzer (20) of one of claims 1 to 13, wherein the code segments are configured to direct the processor (48) to analyze the egress traffic metadata for data rate of egress traffic to a destination IP address.
15. The network device compromise activity analyzer (20) of one of claims 1 to 14, wherein the code segments are configured to direct the processor (48) to analyze the egress traffic metadata for contact or call back activity to a device IP address by a destination IP address.
16. The network device compromise activity analyzer (20) of one of claims 1 to 15, wherein the code segments are configured to direct the processor (48) to analyze the egress traffic metadata for contact or call back activity to a plurality of device IP address by a destination IP address.
17. The network device compromise activity analyzer (20) of one of claims 1 to 16. further comprising a network connector (18, 68A. 68B) connected to said processor (48), the network connector having a public network port (42, 69B, 7 IB), at least one private network port (44, 69A, 71 A).
18. A network compromise activity monitoring system comprising: anetwork connector (18, 68A, 68B) having a public network port (42, 69B, 71B), at least one private network port (44, 69A, 71 A), and an associated network connector traffic log concerning data packet traffic of the network connector (18, 68A, 68B), whereby data packets flowing into the at least one private network port (44, 69 A, 71 A) and out of the public network port (42, 69B, 7 IB) are egress traffic and wherein data packets flowing
into the public network port (42, 69B, 7 IB) and out of the at least one private network port (44, 69 A, 71 A) are ingress traffic; a compromise activity analyzer (20. 70. 76) according to any one of claims 1 to 16. being operative to determine a compromise activity level of one or more devices coupled to at least one private network port (44, 69 A, 71A), based at least in part, upon the suspect destination metadata, the egress traffic metadata, and the network device metadata; and a compromise defender (92) responsive to the determined compromise activity level of the one or more devices and operative to at least one of block, alert and notify in accordance with the at least one rule.
19. The network compromise activity monitoring system of claim 18, wherein the compromise activity analyzer (20, 70, 76) has access to ingress traffic metadata, whereby the ingress traffic metadata is used, at least in part, to determine the compromise activity level of the one or more devices.
20. The network compromise activity monitoring system of one of claims 18 or 19, wherein the egress traffic metadata and the ingress traffic metadata are derived from the network connector traffic log.
21. The network compromise activity monitoring system of one of claims 18 to 20, wherein the compromise activity analyzer (20, 70, 76) has access to private network port metadata concerning the at 1 east one private network port (69A, 71 A), whereby the private network port metadata is used, at least in part, to determine the compromise activity level of the at least one of the plurality of devices.
22. The network compromise activity monitoring system of one of claims 18 to 21, wherein the compromise defender (92) is a part of the compromise activity analyzer (20, 70. 76).
23. The network compromise activity monitoring system of one of claims 18 to 22, wherein the compromise activity analyzer (20, 70, 76) is part of the network connector (18, 68A, 68B).
24. The network compromise activity monitoring system of one of claims 18 to 23, wherein the network connector (68A, 68B) is one of: a firewall (18) and a router.
25. A computer-implemented method for monitoring compromise activity of a network device comprising a compromise activity analyzer (20) including a processor (48) and memoiy (50, 52), the method comprising: retrieving egress traffic metadata; identifying at least one originating device of egress data packets, using the egress traffic metadata and network device metadata; identifying suspect destinations of the egress data packets, using the egress traffic metadata and suspect destination metadata; determining a compromise activity level with respect to the at least one originating device based upon egress traffic metadata, the network device metadata, and the suspect destinations; and acting upon determined compromise activity levels in accordance with at least one rule.
26. The computer-implemented method of claim 25, further comprising the compromise activity analyzer (20): retrieving firewall traffic metadata including at least the egress traffic metadata, the egress traffic metadata having origination Internet Protocol (IP) addresses and destination IP addresses of the egress traffic of a firewall; matching origination IP addresses of the egress traffic metadata with the network device metadata to identify the at least one originating device of the egress data packets; and matching destination IP addresses of the egress traffic metadata with the suspect destination metadata to identify the suspect destinations of the egress data packets.
27. The computer-implemented method of one of claims 25 or 26, further comprising the compromise activity analyzer (20) analyzing the egress traffic metadata for data rates above a given threshold.
28. The computer-implemented method of one of claims 25 to 27, further comprising the compromise activity analyzer (20) analyzing the egress traffic metadata for at least one of: frequency of egress traffic and patterns of egress traffic.
29. The computer-implemented method of one of claims 25 to 28, further comprising the compromise activity analyzer (20) analyzing the network device metadata for an importance of the device.
30. The computer-implemented method of one of claims 25 to 29, further comprising the compromise activity analyzer (20) analyzing the suspect destination metadata for threat severity.
31. A non-transitory computer readable media including code segments executable on a processor (48) for monitoring compromise activity of a network device, the code segments configured to direct the processor (48) to perform the method of one of claims 25 to 30.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202363485739P | 2023-02-17 | 2023-02-17 | |
US18/111,351 US11848953B1 (en) | 2023-02-17 | 2023-02-17 | Network compromise activity monitoring system |
US63/485,739 | 2023-02-17 | ||
US18/111,351 | 2023-02-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024173746A1 true WO2024173746A1 (en) | 2024-08-22 |
Family
ID=90458068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2024/016081 WO2024173746A1 (en) | 2023-02-17 | 2024-02-16 | Network compromise activity monitoring system |
Country Status (2)
Country | Link |
---|---|
CA (1) | CA3229517A1 (en) |
WO (1) | WO2024173746A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040044912A1 (en) * | 2002-08-26 | 2004-03-04 | Iven Connary | Determining threat level associated with network activity |
US20200329072A1 (en) * | 2019-04-11 | 2020-10-15 | Level 3 Communications, Llc | System and method for utilization of threat data for network security |
-
2024
- 2024-02-16 CA CA3229517A patent/CA3229517A1/en active Pending
- 2024-02-16 WO PCT/US2024/016081 patent/WO2024173746A1/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040044912A1 (en) * | 2002-08-26 | 2004-03-04 | Iven Connary | Determining threat level associated with network activity |
US20200329072A1 (en) * | 2019-04-11 | 2020-10-15 | Level 3 Communications, Llc | System and method for utilization of threat data for network security |
Non-Patent Citations (1)
Title |
---|
"Cost of a Data Breach Report 2022", July 2022, IBM CORPORATION |
Also Published As
Publication number | Publication date |
---|---|
CA3229517A1 (en) | 2024-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10601844B2 (en) | Non-rule based security risk detection | |
US10601853B2 (en) | Generation of cyber-attacks investigation policies | |
Hoque et al. | Network attacks: Taxonomy, tools and systems | |
US9094288B1 (en) | Automated discovery, attribution, analysis, and risk assessment of security threats | |
US7596807B2 (en) | Method and system for reducing scope of self-propagating attack code in network | |
US20030188189A1 (en) | Multi-level and multi-platform intrusion detection and response system | |
US20050216956A1 (en) | Method and system for authentication event security policy generation | |
Bou-Harb et al. | A novel cyber security capability: Inferring internet-scale infections by correlating malware and probing activities | |
Gupta et al. | Detecting attacks in high-speed networks: Issues and solutions | |
Alparslan et al. | BotNet detection: Enhancing analysis by using data mining techniques | |
AU2024200502B9 (en) | Network compromise activity monitoring system | |
Dzurenda et al. | Network protection against DDoS attacks | |
Abaid et al. | Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study | |
US10296744B1 (en) | Escalated inspection of traffic via SDN | |
Araújo et al. | EICIDS-elastic and internal cloud-based detection system | |
Resmi et al. | Intrusion detection system techniques and tools: A survey | |
Whyte et al. | Tracking darkports for network defense | |
Panimalar et al. | A review on taxonomy of botnet detection | |
WO2024173746A1 (en) | Network compromise activity monitoring system | |
Iheagwara et al. | Evaluation of the performance of id systems in a switched and distributed environment: the realsecure case study | |
Abudalfa et al. | Evaluating performance of supervised learning techniques for developing real-time intrusion detection system | |
Prabhu et al. | Network intrusion detection system | |
Rizvi et al. | A review on intrusion detection system | |
Karthikeyan et al. | NETWORK INTRUSION DETECTION SYSTEM BASED ON PACKET FILTERS. | |
Kaur et al. | Intrusion detection system using honeypots and swarm intelligence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24713808 Country of ref document: EP Kind code of ref document: A1 |