Invention Grant
US09306964B2 Using trust profiles for network breach detection 有权
使用信任配置文件进行网络泄漏检测

Using trust profiles for network breach detection
Abstract:
Actions of servers and other network devices within a network are monitored to detect whether the servers and network devices are performing tasks, using protocols, and communicating through ports that are consistent with legitimate (or “permissible”) purposes. That is, rather than attempting to belatedly identify malware signatures and screen all traffic into and out of a network for these signatures, embodiments of the present invention scrutinize devices (such as servers and other network infrastructure elements) for malware behavior that is inconsistent with an identified set of actions known to be consistent with legitimate tasks performed by the network device.
Public/Granted literature
Information query
Patent Agency Ranking
0/0