US9787720B2 - Lateral account mapping - Google Patents
Lateral account mapping Download PDFInfo
- Publication number
- US9787720B2 US9787720B2 US14/633,100 US201514633100A US9787720B2 US 9787720 B2 US9787720 B2 US 9787720B2 US 201514633100 A US201514633100 A US 201514633100A US 9787720 B2 US9787720 B2 US 9787720B2
- Authority
- US
- United States
- Prior art keywords
- asset
- network
- monitoring
- account
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013507 mapping Methods 0.000 title description 18
- 238000000034 method Methods 0.000 claims abstract description 34
- 238000012550 audit Methods 0.000 claims abstract description 15
- 238000012544 monitoring process Methods 0.000 claims description 21
- 238000004891 communication Methods 0.000 claims description 16
- 238000012545 processing Methods 0.000 claims description 15
- 230000015654 memory Effects 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 4
- 230000000007 visual effect Effects 0.000 claims description 2
- 230000008520 organization Effects 0.000 claims 1
- 230000002596 correlated effect Effects 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 12
- 238000007726 management method Methods 0.000 description 11
- 230000000694 effects Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Definitions
- Embodiments of the invention generally relate to systems and methods for managing accounts used in a network environment, and more specifically to using event logs for network assets to track and manage accounts used among assets in a network.
- assets from different networks can be communicably linked to assets in other networks, each asset having different active accounts. Some of these different accounts may in fact be associated with each other, such as when they are associated with the same user.
- a user may authenticate using account “X” on a first network asset and then through machine-to-machine authentication authenticate using account “Y” on a second network asset.
- Machine-to-machine authentication may purposefully or incidentally obfuscate the identity of the account or the user through account switching.
- Activity at a network asset may be monitored at an account level using various techniques, including event logs.
- the logged information may include the identity of the asset and the information for the account associated with the logged event.
- the typical process for reviewing event information is for a security professional to manually gather information from various event logs, after the fact, and piece together authentication attempts and correlate accounts. This is a time consuming process and prone to error. Further, these techniques do not leverage the information gathered about the accounts to improve or update network or asset policies, nor enable active network monitoring.
- various aspects of the systems, methods, and apparatus described herein are directed toward the mapping of accounts across network assets and tracking the way a user utilizes multiple accounts to access various assets on a network.
- the system and methods described herein are directed to enforcing network policies based on the account mapping described above.
- a method of monitoring a network includes receiving a plurality of authentication audit logs from a plurality of assets, correlating the plurality of authentication audit logs; and generating a notification based on a comparison of correlation results and a database of permitted account associations.
- the plurality of authentication logs comprise a first authentication log from a first asset and a second authentication log from a second asset.
- the first authentication audit log may comprise destination data and account information local to the first asset
- the second authentication audit log may comprise origination data and account information local to the second asset.
- correlating the plurality of authentication audit logs comprises associating a first account from the first asset with a second account from the second asset.
- the first asset and the second asset are network devices.
- the database of permitted account associations comprises permitted account switches.
- the method further comprises generating a visual map of the correlation of the plurality of authentication audit logs.
- a system of monitoring a network includes a database of permitted account associations, and a processing module configured to receive a plurality of authentication audit logs from a plurality of assets, correlate the plurality of authentication audit logs; and generate a notification based on a comparison of correlation results and the database of permitted account associations.
- the processing module is further configured to update the database of permitted account associations based on a user response to the notification.
- the plurality of authentication logs may comprise a first authentication audit log from a first asset and a second authentication log from a second asset.
- the first authentication audit log may comprise destination data and account information local to the first asset and the second authentication audit log may comprise origination data and account information local to the second asset.
- correlating the plurality of authentication audit logs comprises associating a first account from the first asset with a second account from the second asset.
- the first asset and the second asset are network devices.
- the database of permitted account associations comprises permitted account switches.
- the permitted account switches may be based on account information and device information.
- the system further comprises a second database associating at least one device label with user information.
- the user may be identified based on the second database and an authentication record.
- the authentication record may be an Active Directory log.
- the device label may be a domain name or an Internet protocol address.
- the second database may be updated upon a dynamic host configuration protocol lease renewal, a virtual private network internet protocol address assignment, or both.
- FIG. 1 illustrates a system that utilizes account lateral movement mapping to manage a network according to an exemplary embodiment of the invention
- FIG. 2 illustrates a process for gathering account information and correlating accounts to facilitate account lateral movement mapping according to an exemplary embodiment of the invention
- FIG. 3 illustrates a process for utilizing account lateral movement mapping to enable authentication policies according to an exemplary embodiment of the invention
- FIG. 4 illustrates a process for utilizing account lateral movement mapping to enforce authentication policies according to an exemplary embodiment of the invention
- FIG. 5 illustrates a system utilizing account lateral movement mapping to manage a network according to an exemplary embodiment of the invention.
- System 1 includes Network 110 , Network 120 , Correlation Engine 130 , a Policy Engine 140 , and Communication Network 150 , although one of ordinary skill would recognize that System 1 may include multiple copies of these components and, in particular, multiple networks each comprising a plurality of interconnected assets.
- Network 110 and Network 120 each are comprised of network assets.
- the network assets are identified as falling into the category of Origination Asset 111 or Destination Asset 121 in the context of an authentication process.
- network assets may be anything that is part of, relates to, or supports information-related activities.
- Network assets may include hardware devices (e.g., servers, switches, and general purpose computers), software, databases, and combinations thereof.
- a particular pair of network assets designated as Origination Asset 111 and Destination Asset 121 could exchange roles as the asset originating an authentication request and the asset receiving an authentication request.
- Correlation Engine 130 has access to a Database 131 .
- the Correlation Engine 130 is operable to correlate account information in order to generate the account lateral movement mapping data that is used in embodiments of the present invention.
- the Database 131 may be used to store the account lateral movement mapping data as well as other data used in the correlation process.
- Correlation Engine 130 is in communication with Origination Asset 111 , Destination Asset 121 , and Policy Engine 140 via Communication Network 150 . Event logs for Origination Asset 111 and Destination Asset 121 are transferred to Correlation Engine 130 over Communication Network 150 . Correlation Engine 130 transfers account lateral movement mapping data to the Policy Engine 140 .
- the System 1 collects the event logs by authenticating to management protocols of the network assets using administrative credentials.
- a management protocol is WindowsTM Management Instrumentation.
- WBEM Web-Based Enterprise Management
- CIM Common Information Model
- DMTF Distributed Management Task Force
- the Correlation Engine 130 includes the functionality to collect the event logs using the techniques described herein.
- one or more third-party administrative tools collect the event logs, and the Correlation Engine 130 interfaces with the third-party administrative tools.
- the event logs may include any information that would assist with generating account lateral movement mapping data.
- the event data logged in an event log for the asset originating the authentication request (e.g., Origination Asset 111 ) includes the local account used and identifying information for the destination asset (e.g., Destination Asset 121 ).
- the event data logged in an event log for the destination asset (e.g., Destination Asset 121 ) includes the local account used and identifying information for the asset originating the authentication request (e.g., Origination Asset 121 ).
- the Correlation Engine 130 may determine that the account on the originating asset—e.g., account ‘X’—is correlated to the account authenticated to at the destination asset—e.g., account ‘Y’.
- Correlation Engine 130 and Policy Engine 140 may be special purpose hardware, special purpose software running on a general purpose hardware, or some combination thereof, that operates on or communicates with the Networks 110 and 120 and Origination Asset 111 and Destination Asset 121 in the manners described herein including, in the case of Policy Engine 140 , to regulate account activity, including machine-to-machine authentication.
- Policy Engine 140 includes an interface (not shown) that allows users, typically system administrators, to specify and modify the policies enforced by Policy Engine 140 . Policy Engine 140 also uses the account lateral movement mapping data to specify and modify its policies and to enable management of the System 1 . Policy Engine 140 is linked to a Database 141 that stores the policy rules and other relevant information for the Policy Engine 140 .
- Each of Database 131 and Database 141 may be a searchable database and may comprise, include or interface to a relational database or noSQL database (such as Cassandra NoSQL). Other databases, such as a query format database, a Structured Query Language (SQL) database, a storage area network (SAN), or another similar data storage device, query format, platform or resource may be used.
- Database 131 and Database 141 may each comprise a single database or a collection of databases, dedicated or otherwise. In one embodiment, Database 131 and Database 141 may store or cooperate with other databases to store the various data and information described herein.
- Database 131 and Database 141 may comprise a file management system, program or application for storing and maintaining data and information used or generated by the various features and functions of the systems and methods described herein.
- Communication Network 150 may communicably link the various modules and devices noted in System 1 .
- the Communication Network 150 may be comprised of, or may interface to, any one or more of the Internet, an intranet, a Personal Area Network (PAN), a Local Area Network (LAN), a Wide Area Network (WAN), a Metropolitan Area Network (MAN), a storage area network (SAN), a frame relay connection, an Advanced Intelligent Network (AIN) connection, a synchronous optical network (SONET) connection, a digital T1, T3, E1 or E3 line, a Digital Data Service (DDS) connection, a Digital Subscriber Line (DSL) connection, an Ethernet connection, an Integrated Services Digital Network (ISDN) line, a dial-up port such as a V.90, a V.34 or a V.34bis analog modem connection, a cable modem, an Asynchronous Transfer Mode (ATM) connection, a Fiber Distributed Data Interface (FDDI) connection, a Copper Distributed Data Interface (CDDI) connection, or an optical/DWDM network.
- Communication Network 150 may also comprise, include or interface to any one or more of a Wireless Application Protocol (WAP) link, a Wi-Fi link, a microwave link, a General Packet Radio Service (GPRS) link, a Global System for Mobile Communication (GSM) link, a Code Division Multiple Access (CDMA) link or a Time Division Multiple Access (TDMA) link such as a cellular phone channel, a Global Positioning System (GPS) link, a cellular digital packet data (CDPD) link, a Research in Motion, Limited (RIM) duplex paging type device, a Bluetooth radio link, or an IEEE 802.11-based radio frequency link.
- WAP Wireless Application Protocol
- Wi-Fi Wireless Fidelity
- microwave link a Global System for Mobile Communication
- GSM Global System for Mobile Communication
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- GPS Global Positioning System
- CDPD cellular digital packet data
- RIM Research in Motion, Limited
- Communication Network 150 may comprise a satellite communications network; such as a direct broadcast communication system (DBS) having the requisite number of dishes, satellites and transmitter/receiver boxes, for example.
- Network 300 may also comprise a telephone communications network, such as the Public Switched Telephone Network (PSTN).
- PSTN Public Switched Telephone Network
- Communication Network 150 may comprise a Personal Branch Exchange (PBX), which may further connect to the PSTN.
- PBX Personal Branch Exchange
- embodiments of the present invention may be provided as one or more computer-readable programs embodied on or in one or more articles of manufacture.
- the article of manufacture may be any suitable hardware apparatus, such as, for example, a floppy disk, a hard disk, a CD ROM, a CD-RW, a CD-R, a DVD ROM, a DVD-RW, a DVD-R, a flash memory card, a PROM, a RAM, a ROM, or a magnetic tape.
- the computer-readable programs may be implemented in any programming language. Some examples of languages that may be used include C, C++, or JAVA.
- the software programs may be further translated into machine language or virtual machine instructions and stored in a program file in that form. The program file may then be stored on or in one or more of the articles of manufacture.
- FIG. 2 illustrates an example of account lateral movement mapping data organized graphically.
- this representation is generated and displayed as part of a graphical user interface (GUI).
- GUI graphical user interface
- the GUI may be displayed for a system administrator account for the Correlation Engine 130 , the Policy Engine 140 , or on a workstation or server that is remote from both the Correlation Engine 130 and the Policy Engine 140 and having administrative access thereto.
- each solid circle represents a network asset
- each directional arrow represents an event (e.g., authentication) involving the two graphically-connected network assets.
- event data Associated with each event is event data.
- Exemplary event data is displayed in Element 3 .
- the event information displayed 3 transitions to the event information associated with the selected asset. Accordingly, an operator following interconnected network assets by moving a cursor laterally, following the directional arrows, can observe a user accessing multiple assets through multiple accounts, with multiple “account switches” being observed, stored, and used to enforce policies for the assets and the networks of which they are a part.
- FIG. 3 an exemplary Correlation Process S 100 is illustrated with reference to Steps S 101 through S 105 .
- the Correlation Engine 130 receives event logs, including authentication logs, from a plurality of assets, including the Origination Asset 111 and the Destination Asset 112 (S 101 and S 102 ).
- the Correlation Engine 130 generates account lateral mapping data by correlating the information in the event logs from the Origination Asset 111 and the Destination Asset 112 (S 103 ). This information may be stored as a record.
- Steps S 104 and S 105 are called out with a dashed box in FIG. 3 because they relate to a confirmatory step to generate and update policies related to networks and assets.
- the Correlation Engine 130 Upon correlating account ‘X’ and account ‘Y,’ i.e., two different accounts utilized by a single user to access two different network assets, the Correlation Engine 130 prompts an operator, for example, a system admin, to confirm whether the authentication is permitted (S 104 ).
- the prompt may be sent using known communication techniques over Communication Network 150 , including without limitation to an administrative interface, an e-mail address, a secure messaging system account, the monitoring application hosting the database, or other similar applications.
- the operator may be prompted for additional policy making information. For example, the operator may indicate that the reason that the authentication is not permitted is related to one or more of the identity of the Origination Asset 111 , the account used on the Origination Asset 111 , the identity of the Destination Asset 111 , the account used on the Destination Asset 111 , the identity of the Network 110 or the Network 120 . Further, the reason may be related to specific classes that the accounts, assets, or networks belong to, including user groups or security level classes.
- the Policy Engine 140 may update its policies as they relate to the affected networks, assets, accounts, etc., and combinations thereof (S 105 ).
- the Correlation Engine 130 may prompt the operator and send the operator's responses, possibly after processing or formatting, to the Policy Engine 140 .
- the Policy Engine 140 may itself prompt the operator for information used by the Policy Engine 140 to formulate policy.
- An exemplary Policy Enforcement Process S 200 is described in FIG. 4 and steps S 201 through S 203 .
- an authentication request for account ‘Y’ is received at a destination asset (S 201 ).
- the request is for machine-to-machine authentication, and account ‘X’ is used at the originating asset for the request. Any number of policy rules may apply to this authentication request. If the relevant policies apply (S 202 ) then the authentication request may be denied or accepted (S 203 ). In other embodiments, an alert may also be generated. In some cases, only an alert may be generated and the authentication request may be allowed to proceed even if it violates a defined policy.
- FIG. 5 illustrates System 5 , which includes a User Attribution Engine 200 and a Correlation Engine 140 .
- the System 5 may interact with User Attribution Engine 200 in order to attribute events with specific user identity or identities.
- the User Attribution Engine 200 has access to a Database (not shown) that is an identity store with information associating accounts with Internet protocol (IP) addresses and host names.
- IP Internet protocol
- the identity store is compatible with the Lightweight Directory Access Protocol (LDAP).
- LDAP Lightweight Directory Access Protocol
- DHCP dynamic host configuration protocol
- the User Attribution Engine 200 logs the host name and leased IP address. Each time a DHCP lease is renewed or reassigned the host name and the IP address associated with the lease is updated in the system. In this manner, DHCP leases are tracked in real-time for host name and IP addresses associated with account information.
- a device may join a private network over a public network and send data as if connected to the private network by way of a virtual private network (VPN).
- VPN virtual private network
- the VPN assigns the device an IP address.
- the User Attribution Engine 200 tracks VPN sessions as they are created and ended. The IP address assigned to a device during a VPN session may be stored as well as the account used to connect to the VPN and other event data.
- the User Attribution Engine 200 may also track internal authentications. For Active Directory and similar authentication tools and domain authentication tools, the IP address and/or host name associated with the authentication is tracked. Using the IP address and account information stored by the User Attribution Engine 200 , the account information may be associated with authentication operations at the system level.
- event information including IP addresses may be tracked back to a specific account even in the event of multiple “account switches”—as illustrated in Assets 161 , 162 , and 163 —based on the User Attribution System 200 and the account lateral movement mapping data generated and stored by the Correlation Engine 140 .
- the invention may be practiced with various computer system configurations, including hand-held wireless devices such as mobile phones or PDAs, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like.
- the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
- program modules may be located in both local and remote computer storage media including memory storage devices.
- the System 1 may include a plurality of software processing modules stored in a memory as described above and executed on a processor in the manner described herein.
- the program modules may be in the form of any suitable programming language, which is converted to machine language or object code to allow the processor or processors to read the instructions.
- the computer system may include a general-purpose computing device in the form of a computer including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit.
- the processing unit that executes commands and instructions may be a general purpose computer, but may utilize any of a wide variety of other technologies including a special purpose computer, a microcomputer, mini-computer, mainframe computer, programmed micro-processor, micro-controller, peripheral integrated circuit element, a CSIC (Customer Specific Integrated Circuit), ASIC (Application Specific Integrated Circuit), a logic circuit, a digital signal processor, a programmable logic device such as an FPGA (Field Programmable Gate Array), PLD (Programmable Logic Device), PLA (Programmable Logic Array), RFID integrated circuits, smart chip, or any other device or arrangement of devices that is capable of implementing the steps of the processes of the invention.
- a programmable logic device such as an FPGA (Field Programmable Gate Array), PLD (Programmable Logic Device), PLA (Programmable Logic Array), RFID integrated circuits, smart chip, or any other device or arrangement of devices that is capable of implementing the steps of the processes of the invention.
- processors and/or memories of the computer system need not be physically in the same location.
- processors and each of the memories used by the computer system may be in geographically distinct locations and be connected so as to communicate with each other in any suitable manner. Additionally, it is appreciated that each of the processor and/or memory may be composed of different physical pieces of equipment.
- the computing environment may also include other removable/non-removable, volatile/nonvolatile computer storage media.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/633,100 US9787720B2 (en) | 2015-02-26 | 2015-02-26 | Lateral account mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/633,100 US9787720B2 (en) | 2015-02-26 | 2015-02-26 | Lateral account mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160255114A1 US20160255114A1 (en) | 2016-09-01 |
US9787720B2 true US9787720B2 (en) | 2017-10-10 |
Family
ID=56799747
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/633,100 Active US9787720B2 (en) | 2015-02-26 | 2015-02-26 | Lateral account mapping |
Country Status (1)
Country | Link |
---|---|
US (1) | US9787720B2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230247034A1 (en) * | 2022-02-01 | 2023-08-03 | Sap Se | Log entry buffer extension network |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6023762A (en) * | 1997-07-09 | 2000-02-08 | Northern Telecom Limited | Multi-view personalized communications agent |
US20090300589A1 (en) * | 2008-06-03 | 2009-12-03 | Isight Partners, Inc. | Electronic Crime Detection and Tracking |
US20110185055A1 (en) * | 2010-01-26 | 2011-07-28 | Tenable Network Security, Inc. | System and method for correlating network identities and addresses |
US20110258118A1 (en) * | 2010-04-12 | 2011-10-20 | Peter Ciurea | Authentication Process Using Search Technology |
US20120084438A1 (en) * | 2008-06-05 | 2012-04-05 | Raleigh Gregory G | Secure Device Data Records |
US8301753B1 (en) * | 2006-06-27 | 2012-10-30 | Nosadia Pass Nv, Limited Liability Company | Endpoint activity logging |
US20130067062A1 (en) * | 2011-09-12 | 2013-03-14 | Microsoft Corporation | Correlation of Users to IP Address Lease Events |
US20140283083A1 (en) * | 2013-03-15 | 2014-09-18 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets |
US20150033315A1 (en) * | 2013-07-23 | 2015-01-29 | Salesforce.Com, Inc. | Authentication and diagnostic functions for a database system |
US20150058923A1 (en) * | 2013-03-15 | 2015-02-26 | Authentic8, Inc. | Secure web container for a secure online user environment |
US20150128274A1 (en) * | 2013-11-04 | 2015-05-07 | Crypteia Networks S.A. | System and method for identifying infected networks and systems from unknown attacks |
-
2015
- 2015-02-26 US US14/633,100 patent/US9787720B2/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6023762A (en) * | 1997-07-09 | 2000-02-08 | Northern Telecom Limited | Multi-view personalized communications agent |
US8301753B1 (en) * | 2006-06-27 | 2012-10-30 | Nosadia Pass Nv, Limited Liability Company | Endpoint activity logging |
US20090300589A1 (en) * | 2008-06-03 | 2009-12-03 | Isight Partners, Inc. | Electronic Crime Detection and Tracking |
US20120084438A1 (en) * | 2008-06-05 | 2012-04-05 | Raleigh Gregory G | Secure Device Data Records |
US20110185055A1 (en) * | 2010-01-26 | 2011-07-28 | Tenable Network Security, Inc. | System and method for correlating network identities and addresses |
US20110258118A1 (en) * | 2010-04-12 | 2011-10-20 | Peter Ciurea | Authentication Process Using Search Technology |
US20130067062A1 (en) * | 2011-09-12 | 2013-03-14 | Microsoft Corporation | Correlation of Users to IP Address Lease Events |
US20140283083A1 (en) * | 2013-03-15 | 2014-09-18 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets |
US20150058923A1 (en) * | 2013-03-15 | 2015-02-26 | Authentic8, Inc. | Secure web container for a secure online user environment |
US20150033315A1 (en) * | 2013-07-23 | 2015-01-29 | Salesforce.Com, Inc. | Authentication and diagnostic functions for a database system |
US20150128274A1 (en) * | 2013-11-04 | 2015-05-07 | Crypteia Networks S.A. | System and method for identifying infected networks and systems from unknown attacks |
Also Published As
Publication number | Publication date |
---|---|
US20160255114A1 (en) | 2016-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10382469B2 (en) | Domain age registration alert | |
US9954896B2 (en) | Preconfigured honey net | |
US9917858B2 (en) | Honey user | |
US11962614B2 (en) | Techniques for cloud security monitoring and threat intelligence | |
US10572857B2 (en) | Mobile check-in with push notification services | |
US10972461B2 (en) | Device aware network communication management | |
US9560067B2 (en) | Correlation based security risk identification | |
US20230188529A1 (en) | Personal-public service set identifiers | |
US20110107411A1 (en) | System and method for implementing a secure web application entitlement service | |
US11310238B1 (en) | System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources | |
CN106161566A (en) | A kind of cloud computation data center access management method and cloud computation data center | |
US20150156079A1 (en) | Methods and Apparatus to Dynamically Provide Network Policies | |
CN109891853B (en) | Method and system for detecting impossible trips in a local setting | |
KR20160072391A (en) | the Integrated Access Security Management for Smart Work Environment and method thereof | |
KR101832295B1 (en) | Incidents information intelligence analysis system | |
CN111614641A (en) | Cloud account management system and application method | |
US9787720B2 (en) | Lateral account mapping | |
CN106506239B (en) | Method and system for authentication in organization unit domain | |
WO2016122685A1 (en) | Authorization for multiple user data storage and separation | |
US11784996B2 (en) | Runtime credential requirement identification for incident response | |
US20230420147A1 (en) | Dns recursive ptr signals analysis | |
CN117834270A (en) | Login management method, system, device and storage medium | |
CN110610076A (en) | User login authority verification method based on user authority and store change |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RAPID7, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HATHAWAY, MATTHEW;ADAMS, SAMUEL;MYERS, JEFFREY;AND OTHERS;SIGNING DATES FROM 20150714 TO 20150916;REEL/FRAME:036627/0255 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: KEYBANK NATIONAL ASSOCIATION, OHIO Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:RAPID7, INC.;REEL/FRAME:052489/0939 Effective date: 20200423 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: RAPID7, INC., MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:KEYBANK NATIONAL ASSOCIATION, AS ADMINISTRATIVE AGENT;REEL/FRAME:069785/0328 Effective date: 20241223 |