System and method for facilitating data leakage and/or propagation tracking
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/64
G06F-017/30
H04L-029/06
G06F-012/0864
출원번호
US-0179933
(2016-06-10)
등록번호
US-9794223
(2017-10-17)
발명자
/ 주소
Gula, Ron
Ranum, Marcus
출원인 / 주소
TENABLE NETWORK SECURITY, INC.
대리인 / 주소
Pillsbury, Winthrop, Shaw, Pittman LLP
인용정보
피인용 횟수 :
0인용 특허 :
68
초록▼
Systems and methods for facilitating data leakage and/or propagation tracking are provided. In some embodiments, a set of hashes associated with files of a user device and a reference set of hashes associated with files of a reference system may be obtained. An additional subset of hashes included i
Systems and methods for facilitating data leakage and/or propagation tracking are provided. In some embodiments, a set of hashes associated with files of a user device and a reference set of hashes associated with files of a reference system may be obtained. An additional subset of hashes included in the set of hashes and not included in the reference set of hashes may be determined. The user device may be classified into a group based on the additional subset of hashes comprising a hash that is the same as a hash associated with a file of at least another user device classified into the group. A prediction that the file is exclusive for the group may be effectuated. Other user devices not classified into the group may be scanned. An alert indicating unauthorized activity may be generated responsive to the scan indicating that the other user devices contain the file.
대표청구항▼
1. A system for facilitating data leakage and/or propagation tracking on a network, comprising: one or more physical processors programmed to execute computer program instructions which, when executed, cause the physical processors to: obtain a set of hashes that are associated with files of a user
1. A system for facilitating data leakage and/or propagation tracking on a network, comprising: one or more physical processors programmed to execute computer program instructions which, when executed, cause the physical processors to: obtain a set of hashes that are associated with files of a user device, and a reference set of hashes that are associated with files of a reference system;determine an additional subset of hashes included in the set of hashes and not included in the reference set of hashes based on a comparison between the set of hashes and the reference set of hashes;classify the user device into a group based on the additional subset of hashes comprising a hash that is the same as a hash associated with a file of at least another user device classified into the group;predict that the file associated with the same hash is exclusive for the group to which the user device is classified;scan one or more other user devices not classified into the group to determine what files are on the other devices; andgenerate an alert indicating unauthorized activity, wherein the alert is generated responsive to the scan indicating that the other user devices contain the file predicted to be exclusive for the group to which the user device is classified. 2. The system of claim 1, wherein the physical processors are further caused to: obtain a set of names or paths that are associated with the files of the user device;obtain a reference set of names or paths associated with the files of the reference system; anddetermine an additional subset of names or paths included in the set of names or paths and not included in the reference set of names or paths based on a comparison between the set of names or paths and the reference set of names or paths,wherein classifying the user device into the group is further based on the additional subset of names or paths, andwherein predicting the file associated with the same hash as being exclusive for the group to which the user device is classified is further based on the additional subset of names or paths. 3. The system of claim 1, wherein the physical processors are further caused to: obtain a set of names and paths that are associated with the files of the user device;obtain a reference set of names and paths associated with the files of the reference system; anddetermine an additional subset of names and paths included in the set of names and paths and not included in the reference set of names and paths based on a comparison between the set of names and paths and the reference set of names and paths,wherein classifying the user device into the group is further based on the additional subset of names and paths, andwherein predicting the file associated with the same hash as being exclusive for the group to which the user device is classified is further based on the additional subset of names and paths. 4. The system of claim 1, wherein the physical processors are further caused to: observe traffic associated with the network to detect activity that changed, copied, moved, or accessed one or more files on user devices of the network; andgenerate, based on the detected activity, an audit trail associated with the files that were changed, copied, moved, or accessed, wherein the audit trail includes information to describe (i) one or more of the user devices at which the detected activity was observed, (ii) one or more users that owned the files associated with the detected activity, (iii) times when the users owned the files associated with the detected activity, and (iv) the detected activity. 5. The system of claim 1, wherein the physical processors are further caused to: obtain, based on the scan, hashes associated with files that are on the other user devices that are not classified into the group to which the user device is classified; andgenerate the alert responsive to a determination that at least one of the hashes obtained based on the scan matches the same hash to which the file predicted to be exclusive for the group is associated. 6. The system of claim 1, wherein the physical processors are further caused to: generate the alert responsive to a determination that one or more files of user devices of the network have different owners on more than one of the user devices. 7. The system of claim 1, wherein the physical processors are further caused to: identify one or more files or file sets having auditing or security significance, wherein one or more of user devices of the network are designated to store the files or file sets having the auditing or security significance; andgenerate the alert responsive to a determination that the files or file sets have been copied or moved off of the designated user devices. 8. The system of claim 1, wherein the physical processors are further caused to: generate statistics that describe normal activities that one or more users perform to interact with files of user devices of the network; andgenerate the alert responsive to a determination that interactions with the files of the user devices deviate from the statistics describing the normal activities that the users perform to interact with the files of the user devices. 9. The system of claim 1, wherein the physical processors are further caused to: generate statistics that describe normal activities that one or more users perform to interact with one or more directories or folders that contain files of user devices of the network; andgenerate the alert responsive to a determination that interactions with the directories or folders deviate from the statistics describing the normal activities that the users perform to interact with the directories or folders. 10. The system of claim 1, wherein the set of hashes associated with the files of the user device comprises one or more of checksums, complete cryptographic hashes, or partial cryptographic hashes. 11. A method for facilitating data leakage and/or propagation tracking on a network, the method being implemented on a computer system that includes one or more physical processors executing computer program instructions which, when executed, perform the method, the method comprising: obtaining, by the physical processors, a set of hashes that are associated with files of a user device, and a reference set of hashes that are associated with files of a reference system;determining, by the physical processors, an additional subset of hashes included in the set of hashes and not included in the reference set of hashes based on a comparison between the set of hashes and the reference set of hashes;classifying, by the physical processors, the user device into a group based on the additional subset of hashes comprising a hash that is the same as a hash associated with a file of at least another user device classified into the group;predicting, by the physical processors, that the file associated with the same hash is exclusive for the group to which the user device is classified;scanning, by the physical processors, one or more other user devices not classified into the group to determine what files are on the other devices; andgenerating, by the physical processors, an alert indicating unauthorized activity responsive to the scan indicating that the other user devices contain the file predicted to be exclusive for the group to which the user device is classified. 12. The method of claim 11, further comprising: obtaining, by the physical processors, a set of names or paths that are associated with the files of the user device;obtaining, by the physical processors, a reference set of names or paths associated with the files of the reference system; anddetermining, by the physical processors, an additional subset of names or paths included in the set of names or paths and not included in the reference set of names or paths based on a comparison between the set of names or paths and the reference set of names or paths;wherein classifying the user device into the group is further based on the additional subset of names or paths, andwherein predicting the file associated with the same hash as being exclusive for the group to which the user device is classified is further based on the additional subset of names or paths. 13. The method of claim 11, further comprising: obtaining, by the physical processors, a set of names and paths that are associated with the files of the user device;obtaining, by the physical processors, a reference set of names and paths associated with the files of the reference system; anddetermining, by the physical processors, an additional subset of names and paths included in the set of names and paths and not included in the reference set of names and paths based on a comparison between the set of names and paths and the reference set of names and paths,wherein classifying the user device into the group is further based on the additional subset of names and paths, andwherein predicting one or more of the files of the user device as being exclusive for the group to which the user device is classified is further based on the additional subset of names and paths. 14. The method of claim 11, further comprising: observing, by the physical processors, traffic associated with the network to detect activity that changed, copied, moved, or accessed one or more files on user devices of the network; andgenerating, by the physical processors, based on the detected activity, an audit trail associated with the files that were changed, copied, moved, or accessed, wherein the audit trail includes information to describe (i) one or more of the user devices at which the detected activity was observed, (ii) one or more users that owned the files associated with the detected activity, (iii) times when the users owned the files associated with the detected activity, and (iv) the detected activity. 15. The method of claim 11, further comprising: obtaining, by the physical processors, based on the scan, hashes associated with files that are on the other user devices that are not classified into the group to which the user device is classified; and generating, by the computer system, the alert responsive to a determination that at least one of the hashes obtained based on the scan matches the same hash to which the file predicted to be exclusive for the group is associated. 16. The method of claim 11, further comprising: generating, by the physical processors, the alert responsive to a determination that one or more files of user devices on the network have different owners on more than one of the user devices. 17. The method of claim 11, further comprising: identifying, by the physical processors, one or more files or file sets having auditing or security significance, wherein one or more user devices of the network are designated to store the files or file sets having the auditing or security significance; andgenerating, by the physical processors, the alert responsive to a determination that the files or file sets have been copied or moved off of the designated user devices. 18. The method of claim 11, further comprising: generating, by the physical processors, statistics to describe normal activities that one or more users perform to interact with files of user devices of the network; andgenerating, by the physical processors, the alert responsive to a determination that interactions with the files of the user devices deviate from the statistics describing the normal activities that the users perform to interact with the files of the user devices. 19. The method of claim 11, further comprising: generating, by the physical processors, statistics that describe normal activities that one or more users perform to interact with one or more directories or folders that contain files of user devices of the network; andgenerating, by the physical processors, the alert responsive to a determination that interactions with the directories or folders deviate from the statistics describing the normal activities that the users perform to interact with the directories or folders. 20. The method of claim 11, wherein the sets of hashes associated with the files of the user devices comprises one or more of checksums, complete cryptographic hashes, or partial cryptographic hashes.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (68)
Duffield, Nicholas; Gong, Weibo; Towsley, Don; Zou, Changchun, Adaptive defense against various network attacks.
Parker, James A.; Legner, Gary J.; Lima, George; Schwartz, David P.; Gunkel, James R., Intelligent data inventory and asset management system method and apparatus.
Medvinsky,Alexander; Peterka,Petr; Moroney,Paul; Sprunk,Eric, Key management protocol and authentication system for secure internet protocol rights management architecture.
Sampath Srivats ; Balasubramaniam Chandrasekar ; Lingarkar Ravi ; Katchapalayam Babu ; Kannan Ravi, Method and system for securing, managing or optimizing a personal computer.
Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules.
Schwaller Peter James ; Walker II John Quillian ; Joyce Steven Thomas ; Huntley Timothy Scott, Methods, systems and computer program products for endpoint pair based communications network performance testing.
Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
McClure,Stuart C.; Kurtz,George; Keir,Robin; Beddoe,Marshall A.; Morton,Michael J.; Prosise,Christopher M.; Cole,David M.; Abad,Christopher, System and method for network vulnerability detection and reporting.
Gorman, David B.; Catherine, Gregory J.; Peragine, Richard; Conrad, Beverly; Gearhart, G. Duane; Moy, David, System for intrusion detection and vulnerability analysis in a telecommunications signaling network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.