DEVICE DETECTION IN NETWORK TELEMETRY WITH TLS FINGERPRINTING

    公开(公告)号:US20210152526A1

    公开(公告)日:2021-05-20

    申请号:US16686364

    申请日:2019-11-18

    Abstract: In one embodiment, a traffic analysis service obtains telemetry data regarding encrypted traffic associated with a particular device in the network, wherein the telemetry data comprises Transport Layer Security (TLS) features of the traffic. The service determines, based on the TLS features from the obtained telemetry data, a set of one or more TLS fingerprints for the traffic associated with the particular device. The service calculates a measure of similarity between the set of one or more TLS fingerprints for the traffic associated with the particular device and a set of one or more TLS fingerprints of traffic associated with a second device. The service determines, based on the measure of similarity, that the particular device and the second device were operated by the same user.

    Device detection in network telemetry with TLS fingerprinting

    公开(公告)号:US11245675B2

    公开(公告)日:2022-02-08

    申请号:US16686364

    申请日:2019-11-18

    Abstract: In one embodiment, a traffic analysis service obtains telemetry data regarding encrypted traffic associated with a particular device in the network, wherein the telemetry data comprises Transport Layer Security (TLS) features of the traffic. The service determines, based on the TLS features from the obtained telemetry data, a set of one or more TLS fingerprints for the traffic associated with the particular device. The service calculates a measure of similarity between the set of one or more TLS fingerprints for the traffic associated with the particular device and a set of one or more TLS fingerprints of traffic associated with a second device. The service determines, based on the measure of similarity, that the particular device and the second device were operated by the same user.

    CROSS-DOMAIN INDICATOR OF COMPROMISE (IOC) IDENTIFICATION

    公开(公告)号:US20230281300A1

    公开(公告)日:2023-09-07

    申请号:US17847829

    申请日:2022-06-23

    CPC classification number: G06F21/55 G06F2221/034

    Abstract: Techniques for identifying malicious actors across datasets of different origin. The techniques may include receiving input data indicative of network interactions between entities and modalities. Based at least in part on the input data, a maliciousness score associated with a first entity may be determined. In some instances, a value of the maliciousness score may be partially based on a number of the modalities that are interacting with the first entity and also interacting with one or more malicious entities. The techniques may further include determining whether the value of the maliciousness score exceeds a threshold value and, based at least in part on the value of the maliciousness score exceeding the threshold value, a request may be made to identify the first entity as a new malicious entity.

    RANSOMWARE DETECTION USING FILE REPLICATION LOGS

    公开(公告)号:US20200244672A1

    公开(公告)日:2020-07-30

    申请号:US16261682

    申请日:2019-01-30

    Abstract: In one embodiment, a device in a network obtains log data regarding replication of files stored on an endpoint client to a file replication service. The device tracks, based on the obtained logs, encryption changes to the files that convert the files from unencrypted files to encrypted files. The device determines that the tracked encryption changes to the files are indicative of a ransomware infection on the endpoint client. The device initiates a mitigation action regarding the ransomware infection.

    CLASSIFICATION OF IOT DEVICES BASED ON THEIR NETWORK TRAFFIC

    公开(公告)号:US20200120004A1

    公开(公告)日:2020-04-16

    申请号:US16156020

    申请日:2018-10-10

    Abstract: In one embodiment, a traffic analysis service obtains telemetry data regarding network traffic associated with a device in a network. The traffic analysis service forms a histogram of frequencies of the traffic features from the telemetry data for the device. The traffic features are indicative of endpoints with which the device communicated. The traffic analysis service associates a device type with the device, by comparing the histogram of the traffic features from the telemetry data to histograms of traffic features associated with other devices. The traffic analysis service initiates, based on the device type associated with the device, an adjustment to treatment of the traffic associated with the device by the network.

    ITERATIVE CROSS-PRODUCT THREAT DETECTION BASED ON NETWORK TELEMETRY RELATIONSHIPS

    公开(公告)号:US20240356957A1

    公开(公告)日:2024-10-24

    申请号:US18373765

    申请日:2023-09-27

    CPC classification number: H04L63/1433 H04L63/1425

    Abstract: Techniques for identifying malicious threats for investigation using network telemetry data. The techniques include receiving network telemetry data regarding a computer network and also receiving information regarding one or more known malicious nodes which are designated as seeds. A Risk Map Graph (RMG) is constructing using the one or more seeds and the relationship data. The RMG is used to assign risk scores to the network nodes. Data regarding the most at-risk nodes is sent to a security service for investigation. Data is received from the security service as to which of the selected nodes is malicious. These malicious nodes are designated as new seeds, and another RMG is constructed with these new seed nodes. This process can be continuously iterated until either the security budget has been reached or all relevant nodes have been investigated.

Patent Agency Ranking