WO2019046147A1 - Managing data exfiltration risk - Google Patents

Managing data exfiltration risk Download PDF

Info

Publication number
WO2019046147A1
WO2019046147A1 PCT/US2018/048055 US2018048055W WO2019046147A1 WO 2019046147 A1 WO2019046147 A1 WO 2019046147A1 US 2018048055 W US2018048055 W US 2018048055W WO 2019046147 A1 WO2019046147 A1 WO 2019046147A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
file
exfiltration
user
files
Prior art date
Application number
PCT/US2018/048055
Other languages
French (fr)
Other versions
WO2019046147A8 (en
Inventor
Oded TIETZ
Mayank Choudhary
Nir Barak
Micky OLAND
Tal SHEMESH
Yigal MESHULAM
Lior CALIF
Original Assignee
Observeit Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Observeit Ltd filed Critical Observeit Ltd
Priority to US16/643,529 priority Critical patent/US11449603B2/en
Priority to IL272980A priority patent/IL272980B1/en
Priority to EP18850695.0A priority patent/EP3676736A4/en
Publication of WO2019046147A1 publication Critical patent/WO2019046147A1/en
Publication of WO2019046147A8 publication Critical patent/WO2019046147A8/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • G06N5/027Frames
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Definitions

  • This disclosure relates to managing data exfiltration risk and, more particularly, managing data exfiltration risk in a computer network (e.g., for an organization).
  • Data exfiltration is the unauthorized transfer of data from a computer. Such a transfer may be manual and carried out by someone with physical access to a computer in a network. Data exfiltration, particularly when done by an insider (e.g., an organization's own employee), can be a huge threat to an organization.
  • an insider e.g., an organization's own employee
  • a computer-based method to facilitate managing data exfiltration risk in a computer network environment.
  • the method includes collecting computer file management information associated with each respective one of a plurality of computer files in an organization's computer network environment from a computer operating system, collecting user activity information associated with each respective one of a plurality of user sessions by users having access to the organization's computer network environment with a plurality of session monitoring agents, correlating at least some of the collected user activity information to one or more of the computer files associated with the collected file management information; and assessing data exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information.
  • the computer-based method includes presenting an alert to one or more particular system users (e.g., system administrators), if the assessment reveals that the data exfiltration risk exists with respect to any one or more of the computer files, and/or preventing a user action that would result in a data exfiltration associated with one of the computer files, if the assessment reveals that the data exfiltration risk exists with respect to that computer file.
  • system users e.g., system administrators
  • the exfiltration risk typically is assessed without regard to content in any of the one or more computer files.
  • a computer system that facilitates managing data exfiltration risk in a computer network environment.
  • the computer system includes a plurality of computer-based user access devices and resources within a computer network that has a firewall, an operating system to support computer operations within the computer network, and an exfiltration detection and response system configured to interact with the operating system, and to facilitate managing data exfiltration risk in the computer network.
  • the data exfiltration system includes a file interceptor to receive computer file management information associated with each respective one of a plurality of computer files in the computer network from the operating system, one or more session-monitoring agents to collect user activity information associated with each respective one or more user sessions on the computer network by users having access to the computer network, a history and exfiltration tracker to correlate at least some of the collected user activity information to one or more of the computer files associated with the file management information received from the operating system, and a rules engine to assess exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information.
  • Data exfiltration can be identified either as it is happening or very shortly thereafter.
  • the user implementing the data exfiltration, or attempting to implement the data exfiltration can be stopped and/or prevented from performing other actions on the network - at least until a person in some authority (e.g., a system administrator or the like) can assess the situation to determine the real risk and whether the user was acting maliciously.
  • the person in authority can be alerted to the data exfiltration immediately - either as it is happening or shortly thereafter. This enables that person to take immediate and timely action to remedy any potential damage.
  • the user attempting to exfiltrate the data can be notified as well that his or her actions are not permissible.
  • a clear and complete record of the data exfiltration, including the identity of the involved user and exactly what the user did is created and stored for later analysis.
  • the techniques and technologies disclosed herein are light, from a processing perspective. That is, they require relatively little in terms of processing resources. They are quick, reliable and robust as well. In short, the techniques and technologies disclosed herein have the potential to significantly prevent, deter, and/or minimize the detrimental effects associated with data exfiltration in an organization's computer network.
  • FIG. 1 is an exemplary computer network environment that includes part of a computer network with a firewall that restricts communications between the computer network and other computer resources and devices outside of the computer network and an exfiltration detection and response system.
  • FIG. 2 is a schematic representation showing part of the computer network in FIG. 1, with a particularly detailed, yet exemplary, representation of the exfiltration detection and response system.
  • FIGS. 3-9 are exemplary screenshots showing functionalities associated with the exfiltration detection and response system that might be viewable by a system administrator, or the like, from one or more of the user access devices in FIG. 1.
  • FIG. 1 is an exemplary computer network environment 100 that includes part of a computer network 102 with a firewall 104 that restricts communications between the computer network 102 and other computer resources and devices 106 (e.g., via the Internet 117) outside of the computer network 102.
  • the part of the computer network 102 represented in the illustrated implementation includes a plurality of computer devices 108 (e.g., computer-based user-access devices), from which an appropriately authorized user can access one or more of the organization's computer- based resources (e.g., programs, files, etc.) within the firewall 104.
  • These resources can be stored or hosted locally (e.g., at a local host 110a that includes processing 112a and memory storage 114a capabilities) or remotely (e.g., at remotely-located host 110b that includes processing 112b and memory storage 114b capabilities).
  • a local host 110a that includes processing 112a and memory storage 114a capabilities
  • remotely e.g., at remotely-located host 110b that includes processing 112b and memory storage 114b capabilities
  • the resources at the local host 110a can be accessed by an authorized user from any one of the plurality of computer devices 108, via a local area network 116.
  • the resources at the remote host 110b can be accessed by an authorized user from any one of the plurality of computer devices 108, via the local area network 116 and the Internet 117.
  • the computer network 102 in the illustrated implementation has an exfiltration detection and response system 118 that is configured to facilitate managing data exfiltration risk in the computer network 102. More particularly, in this regard, the exfiltration detection and response system 118 is configured to detect and respond to any scenarios that might occur during network operations that indicate or suggest that a data exfiltration event has occurred or is about to occur.
  • Data exfiltration refers generally to the unauthorized removal or copying of a computer file, or its contents, for example, to outside of the organization's computer network 102 (e.g., beyond the confines of the firewall 104).
  • Data exfiltration risk refers generally to the possibility that some kind of data exfiltration either has occurred or is about to occur and has potential to harm the organization.
  • the exfiltration detection and response system 118 may take into account any one or more of a variety of different factors to determine whether a data exfiltration risk exists.
  • these factors can include or relate to file management information (e.g., as collected by a file management system in the network operating system), and/or user activity information (e.g., as collected by a computer-based session-monitoring agent during one or more user sessions within the computer network 102).
  • file management information e.g., as collected by a file management system in the network operating system
  • user activity information e.g., as collected by a computer-based session-monitoring agent during one or more user sessions within the computer network 102
  • These factors generally do not include any substantive content of the computer files that are subjected to exfiltration.
  • the file management system is a computer-based system that the network's operating system, for example, may use to organize and keep track of files.
  • the file management system is responsible for creating, deleting, modifying, and controlling access to computer files in an organization's computer network (e.g., 102).
  • Some of the file management information that the exfiltration detection and response system 118 might take into account in determining whether a data exfiltration risk exists with respect to a particular computer file in the computer network 102 includes: the origin of the file (e.g., where in computer network 102 the file was first created and/or stored), metadata of the file at its origin (e.g., file name, file size, etc.), whether the file has been copied or is a copy of another file, whether the file has been given a different name than its original one, whether the file has been stored in a location that is different from its original location, whether the file has been reformatted (e.g., from a .doc file to a jpg file, etc.), whether the file has been or is being moved to a particular location (especially outside the network 102), whether the file has been opened by a particular user, whether a particular file has been deleted, whether a user has run a search for a particular file, and/or whether a user has modified one or more file attributes, properties, or file permissions
  • the session-monitoring agents are computer-based activity monitors that monitor the activities of a user during sessions on the computer network 102.
  • one session-monitoring agent is deployed (e.g., by the exfiltration detection and response system 118) for each respective user session that gets initiated on the computer network 102.
  • a new session-monitoring agent is deployed each time a new user session is initiated (e.g., each time a user logs into the computer network 102 to gain access to the network's resources, programs and/or files). More typically, a session-monitoring agent is deployed just once— when a user logs in, and simply stops running when the user logs out.
  • Some of the user activity information that the exfiltration detection and response system 118 might take into account in determining whether a data exfiltration risk exists with respect to a particular computer file includes: what application(s) (e.g., web browsers, etc.) a user is using at a particular time, what the user is doing with that (those) application(s), what websites (e.g., identified by uniform resource locator (URL)) a user is visiting, metadata (e.g., specific commands, such as FTP requests, being run, etc.) about the application(s) a user is using, etc.).
  • application(s) e.g., web browsers, etc.
  • websites e.g., identified by uniform resource locator (URL)
  • metadata e.g., specific commands, such as FTP requests, being run, etc.
  • the exfiltration detection and response system 118 assesses data exfiltration risk (and facilitates management of data exfiltration risk) with respect to specific computer files without taking into account any substantive content from the computer files themselves. This is one of the reasons why the computing techniques disclosed herein that facilitate managing data exfiltration risk are so light - the amount of data that is taken into account is low. And, although the amount of data taken into account is low, the performance (and ability to facilitate managing data exfiltration risk) is robust and reliable.
  • FIG. 2 is a schematic representation showing part of the computer network 102 in FIG. 1, with a particularly detailed representation of an exemplary exfiltration detection and response system 118.
  • the illustrated exfiltration detection and response system 118 has a file interceptor 220 and a plurality of session-monitoring agents 222a, 222b, 222c . . . 222n.
  • the file interceptor 220 collects computer file management information associated with each respective one of a plurality of computer files in the computer network 102 from the computer network's operating system 224.
  • the file interceptor 220 may receive the file management information from the computer network's operating system 224, for example, periodically in bundles, as new file management information becomes available, or in any other convenient manner.
  • the exfiltration detection and response system 118 registers with the operating system 224 so that the file interceptor 220 will receive the file management information from the operating system 220.
  • the exfiltration detection and response system 118 registers with the operating system 224 so that the file interceptor 220 will receive the file management information from the operating system 220.
  • the operating system 220 simply provides this information to the file interceptor 220 condition-free and simply performs its functionalities without waiting for the exfiltration detection and response system 118 to check for exfiltration risk based on a particular piece of file management information provided.
  • the file management information may be provided to the file interceptor 220 with a call-back condition, requiring an indication, for example, from the exfiltration detection and response system 118 that any actions associated with a particular piece of file management information provided (e.g., the moving of a file) does not pose a data exfiltration risk before allowing that action (e.g., the moving of the file) to happen.
  • implementation is associated with, and adapted to receive user activity information from one of a plurality of a user sessions 226a, 226b, 226c, . . . 226n on the network 102, respectively.
  • the number of session-monitoring agents 222a, 222b, 222c . . . 222n deployed on the network 102 can vary over time, and, at any given point of time, the number of session-monitoring agents 222a, 222b, 222c . . . 222n deployed on the network 102 will match the number of user sessions that are active on the network 102.
  • the network 102 For example, at one point in time, if there is only one active user session on the network 102 (e.g., only one user logged into the network 102), there will be only one session-monitoring agent deployed on the network 102 and that session-monitoring agent will receive user activity information from the one active user session. At other times, there may be many users logged into the network and, therefore, many active user sessions (one per user). At those points in time, there will be many session- monitoring agents deployed on the network 102 - one per active user session, and each session- monitoring agent will receive user activity information from one of the many active user sessions, respectively.
  • the illustrated exfiltration detection and response system 118 also has a history and exfiltration tracker 228 that is configured to communicate with the file interceptor 220 and each active session-monitoring agent 222a, 222b, 222c, . . . 222n.
  • the history and exfiltration tracker 228 receives data (e.g., the file management information and user activity information collected by the file interceptor 220 and the session-monitoring agents 222a, 222b, 222c . . . 222n, respectively).
  • the history and exfiltration tracker 228 determines, based at least in part on the data it receives, which, if any, of the computer files in the network 102 should be tracked for purposes of managing data exfiltration risk. In some implementations, this determination is made on a file-by-file basis, and may be based on one or more parameters or characteristics of each file.
  • the history and exfiltration tracker 228 might determine that a particular file warrants tracking for purposes of managing data exfiltration risk based on that file's original storage location in the computer network 102. So, if the particular file was created into a network storage location that a system administrator, for example, had designated for storing sensitive or confidential information, then the history and exfiltration tracker may determine that that particular file warrants tracking for purposes of managing data exfiltration risk. As another example, the history and exfiltration tracker 228 might determine that a particular file warrants tracking based on specific actions that a user may have taken in connection with that file.
  • the history and exfiltration tracker may determine that that particular file warrants tracking for purposes of managing exfiltration risk.
  • a .doc format e.g., a text file
  • a jpg format e.g., an image file
  • the history and exfiltration tracker may determine that that particular file warrants tracking for purposes of managing exfiltration risk.
  • the underlying rationale for designating this kind of file for tracking might be that the user's behavior - in converting the file format from text to image - seems a bit suspicious, particularly if the file in question might include sensitive or confidential information.
  • the history and exfiltration tracker 228 might determine that a particular file warrants tracking based on a combination of that file's original storage location (e.g., a location designated for storing somewhat, or possibly, sensitive materials) and/or potentially suspicious activities by a user relating to that file. There might be other bases (e.g., a file having been downloaded from the web or from a specific website, etc.) upon which the history and exfiltration tracker 228 might determine a particular file warrants tracking for purposes of managing exfiltration risk.
  • a particular file warrants tracking based on a combination of that file's original storage location (e.g., a location designated for storing somewhat, or possibly, sensitive materials) and/or potentially suspicious activities by a user relating to that file.
  • There might be other bases e.g., a file having been downloaded from the web or from a specific website, etc.
  • some or all of the bases upon which the history and exfiltration tracker 228 might determine a particular file warrants tracking for purposes of managing exfiltration risk can be preprogrammed or customized/specified by a user (e.g., a system administrator).
  • the network 102 may be configured such that a user (e.g., a system administrator) can specify, from one of user access devices 108, which parameters (e.g., sensitive storage locations, suspicious user actions, etc.) should trigger the history and exfiltration tracker 228 to designate a particular file for tracking.
  • the history and exfiltration tracker 228 For each respective one of the computer files that the history and exfiltration tracker 228 designates for tracking, the history and exfiltration tracker creates and maintains a file history chain 234a, 234b . . . 234n.
  • Each respective one of the file history chains 234a, 234b . . . 234n typically includes at least some (or all) of the file management information and correlated user activity information associated with a particular one of the tracked computer files.
  • the history and exfiltration tracker 228 correlates the user activity information to the file management information for each of the tracked computer files.
  • the history and exfiltration tracker 228 performs this correlation by comparing various types of data (e.g., time stamp information, session identifiers, user identifiers, process identifiers, metadata, etc.) associated with the file management information to the same or similar types of data (e.g., time stamp information, session identifiers, user identifiers, process identifiers, metadata etc.) associated with the user activity information.
  • Correlating information from these two different data sources e.g., file management information and user activity information gives the history and exfiltration tracker 228 deep context about each particular file being tracked within the network 102 to facilitate exfiltration risk assessment on those files.
  • the history and exfiltration tracker 228 may receive user activity information indicating that the user accessed his or her personal email account and file management information indicating that a file from a confidential storage location (the confidential customer list) was being attached to an email.
  • FTP file transfer protocol
  • the confidential customer list may be interesting, but together they are quite interesting.
  • the history and exfiltration tracker 228 will correlate these two pieces of information (e.g., by saving them into a single file history chain) based on their respective time stamps indicating that the activities happened at the same time or close in time, user identifiers indicating that the same user was involved in both activities, common or similar process identifiers indicating that the same or similar processes were involved in both activities, and/or other metadata or information showing commonalities between the activities that might make one relevant to the other.
  • correlating file e.g., by saving them into a single file history chain
  • management information and user activity information does not involve, or rely upon, consideration of any substantive content in the computer file at issue.
  • the file history chains 234a, 234b . . . 234n may be stored in any
  • the history and exfiltration tracker 228 stores, for each respective one of computer files identified for tracking, the computer file management information and any user activity information that has been correlated to the computer file management information in the file history chain for that computer file. Moreover, as new pieces of information relevant to a particular tracked file arrives at the history and exfiltration tracker 228 that new information can be correlated as appropriate and added to the file history chain for that computer file. Thus, at any point in time, the file history chain 234a, 234b . . . 234n for all of the tracked computer files will be generally up-to-date.
  • the illustrated history and exfiltration tracker 228 also has a rules engine 232.
  • the rules engine 232 in a typical implementation is configured to apply rules (or logic) to a set of data (e.g., the file history chain for any of the tracked computer files) to determine whether a particular user activity on a particular one of the tracked computer files creates an exfiltration risk (i.e., a risk that data exfiltration has happened or may be about to happen) that warrants some kind of action (e.g., generating an alert, blocking a user action, etc.) by the history and exfiltration tracker 228.
  • an exfiltration risk i.e., a risk that data exfiltration has happened or may be about to happen
  • some kind of action e.g., generating an alert, blocking a user action, etc.
  • the rules engine 232 typically performs its role by considering not only its own rules, but also the file history chain for the file at issue (including, e.g., the file's original storage location, whether there have been any suspicious user activities on that file, etc.). Notably, in a typical implementation, the rules engine performs its role without any regard to substantive content contained in the file at issue. In a typical implementation, the rules engine 232 performs its role every time a new piece of information relevant to one of the tracked files is added to the file history chain 234a, 234b . . . 234n for that file. However, in some implementations, the rules engine 232 performs this function at set time intervals (for all or some of the files), based on some other trigger, etc.
  • rules engine there are a number of different rules that could be used by the rules engine to determine that a particular user activity on a particular file creates an exfiltration risk that warrants some action by the exfiltration detection and response system 118.
  • Some examples of these rules might include: 1) take an action if a file from a sensitive or confidential storage location is about to be sent (or has been sent) to an email address not associated with the organization (e.g., a personal email address), 2) take an action is a file from a sensitive or confidential storage location has had its format changed (e.g., from a text format to an image format) and is now about to be saved (or has been saved) in a non-sensitive and non-confidential storage location, 3) take an action if any file has been subjected to a certain type of suspicious user activity and is now poised to be removed (or has been removed) from the network, etc.
  • the rules or logic in the rules engine 232 can be preprogrammed rules, user-specified rules, or a combination of both. In implementations where the rules or logic can be user-specified, a system administrator, for example, may be able program those rules or logic into the rules engine 232 from any one of the user access devices 108 in the network 102.
  • the rules can be broad (e.g., generate an alert if any file from a particular storage location is attached to an email, shut down the user session if certain users access a file from a particular storage location, etc.) or specific (e.g., generate an alert if a particular file is attached to a personal email account of a specific user).
  • Different rules can apply to different users, roles within the organization, files, types of files, storage locations, times of day, days of the week, etc.
  • the exfiltration detection and response system 118 may cause an alert to be sent to a system administrator and/or other designated alert recipient(s).
  • the alert may be sent in any number of possible ways including, for example, via text, email, phone call, etc.
  • the way that an alert is sent can be specified / personalized by the system administrator, or other intended recipient.
  • the alert may indicate genetically that a data exfiltration risk has been identified, or may include, or facilitate access to, additional information about the data exfiltration risk - e.g., what the risk is (e.g., a file from a sensitive location has been attached to an email, a file from a sensitive location has had its format changed from text to an image, etc.), which network user is involved, the time and date of the event, where the event happened (e.g., in the office, outside the office from a computer logged into the network, etc.), etc.
  • the alert may present the system administrator with information that helps the system administrator take whatever next steps might be appropriate.
  • the alert may include, or facilitate access to, contact information for the user involved, a button that the system administrator can select to block the involved user from taking any further actions or from taking a specific action, an option that allows the system administrator to text or email with etc.
  • the alert may include an option to share the alert with others within the organization.
  • the exfiltration detection and response system 118 may send a message to the user involved in the activity that created the exfiltration risk.
  • the message may be sent in any number of possible ways including, for example, via pop-up on a user's screen, text, email, phone call, etc.
  • the way that an alert is sent can be specified / personalized by the system administrator.
  • the message may indicate genetically that some activity that the user is engaged in has been flagged as creating a risk of data exfiltration, or may include, or facilitate access to, additional information about the data exfiltration risk - e.g., what the risk is (e.g., a file from a sensitive location has been attached to an email, a file from a sensitive location has had its format changed from text to an image, etc.), etc.
  • additional information about the data exfiltration risk e.g., what the risk is (e.g., a file from a sensitive location has been attached to an email, a file from a sensitive location has had its format changed from text to an image, etc.), etc.
  • the exfiltration detection and response system 118 may
  • the exfiltration detection and response system 118 may cause the operating system to terminate the user's session.
  • the exfiltration detection and response system 118 may cause the network 102 to block only specific actions (e.g., sending an email) on the network 102.
  • the exfiltration detection and response system 118 may block the user's screen.
  • the exfiltration detection and response system 118 may take more than one actions in response to the rules engine 232 determining that a particular user activity on a particular one of the tracked computer files creates an exfiltration risk that warrants some kind of action. For example, in some implementations, the exfiltration detection and response system 118 may send a message to the user involved in the questionable activity and to the system administrator. In some implementations, the exfiltration detection and response system 118 may block a user's actions on the network 102 and send an alert to the system administrator. In some implementations, the exfiltration detection and response system 118 may block a user's actions on the network 102, send an alert to the system administrator, and send a message to the user involved in the questionable activity. Other actions and/or combinations of actions in this regard are possible as well.
  • the rules engine 232 may store information about its determinations regarding exfiltration risk and any actions taken as a result of those
  • the rules engine 232 in the illustrated implementation is coupled to (and stored this, and perhaps other information in) a server 238 that is outside the exfiltration detection and response system 118.
  • the information stored in this regard includes the underlying file history chain(s) as well.
  • the information stored in the server 238 may be used after the fact by a system administrator, for example, to analyze a particular circumstance that may have been flagged as a data exfiltration risk.
  • the illustrated exfiltration detection and response system 118 has an output 236 that is coupled to the user access terminals 108, and through which the exfiltration detection and response system 118 can send alerts, messages, instructions, etc. to implement associated reactions to data exfiltration risks.
  • FIGS. 3 - 9 are screenshots that might appear, for example, at one or more of the user access devices 108 in a network 102 when user is logged into the network 102 through that device 108. These screenshots correspond to only one exemplary implementation of the exfiltration detection and response system 118 being implemented on a network.
  • the screenshot in FIG. 3 shows file history, and other data for a tracked file - a list of customer names— in the network 102. More particularly, the illustrated screenshot identifies the original file name, the file source, the original file path, and a file identification code. Moreover, the screenshot includes a chronological listing of user actions taken with respect to the tracked file. In a typical implementation, the chronological listing of user actions includes information from or related to the file history chain for the file.
  • the chronological listing of user actions taken with respect to the tracked file specifies, for each entry, the time (and, typically, date), the file name, the operation, details, the user logged in (who performed the action), the application involved, the end point, and a link to a video of the associated user session when the action happened.
  • the video may be captured, for example, by the session-monitoring agent operating when each action happened.
  • the rules engine determines that, under the indicated circumstances (e.g., sensitive information, being converted from a text file into an image file, and then being moved to a dropbox) warranted an alert.
  • information about the operation performed is provided under the column heading "operation.”
  • a user viewing the screenshot in FIG. 3 can click on any one of the entries to access more information about the associated user action.
  • the system also typically allows a user (e.g., a system administrator or the like) to search for various types of user actions that may have occurred with respect to tracked files.
  • FIG. 4 shows one example of a search screen that allows the user to search based on time period, status (e.g., new, old, etc.), risk level (e.g., high, medium, low, etc.), whether an alert was generated or an action was prevented, the type of operating system, the applicable rule name that may have been implicated, an identification code for the associated alert, and/or other filters.
  • the bottom portion of the FIG. 4 screenshot shows the first result of a search conducted based on the parameters specified in the top portion of the FIG. 4 screenshot. This result just so happens to correspond to the last entry in the chronological listing of user action involving the customers. numbers file in FIG. 3.
  • the information about this user action provided in the bottom portion of the screenshot in FIG. 4 specifies who performed the action, what the action was (e.g., the exfiltrated file, the destination of the exfiltrated file, the file operation performed to exfiltrate, where the file originated from, and the initial file name), on which computer the action happened, from which client, and when.
  • the bottom portion of the FIG. 4 screenshot also has a link to "View File History,” which, if selected, would return the user to the screenshot of FIG. 3.
  • each entry in the chronological listing of user actions relating to the customers. numbers file includes a camera symbol that is a link to a video showing the user action that corresponds to the associated entry.
  • clicking on that camera symbol causes the system to present to the user the associated video.
  • the video shows what was happening on the screen of the user that performed the action at issue when that action was performed (and may include actions leading up to and/or following the action at issues).
  • FIGS. 5A-5E are screenshots showing stills from a video that might be presented to a user if that user clicked on the camera icon for the last entry in the chronological listing in FIG. 3.
  • the video is being played in a video player.
  • the video player shows the user action of downloading the file.
  • the video player shows an alert on entry point.
  • the alert in the illustrated example indicates who performed the action that caused the alert, on which computer, from which client, and when.
  • the alert also identifies what was done, including specifying the file name and the originated from website.
  • the video player shows the file appearing with the exfiltration point (in this example Dropbox).
  • FIG. 5D the video player shows the file being moved into Dropbox.
  • FIG. 5E the video player shows another alert.
  • This alert indicates who performed the action that caused the alert, on which computer, from which client, and when.
  • the alert also identifies what was done, including specifying the exfiltrated tracked file name, where the file was synched to, the originated from website, the initial file name, and the file operation trigger (e.g., move).
  • the information contained in a video clip such as the one represented in FIGS. 5A-5E provide system administrators, or the like, with a great deal of useful information about exfiltration events.
  • FIGS. 6 and 7 show a screenshot that includes functionality that enables a user to specify rules (e.g., detection policies) for the rules engine to apply in determining whether an exfiltration risk exists or not.
  • rules e.g., detection policies
  • the upper portion of FIG. 6 shows is a portion of the screenshot that enables the user to specify who this rule should apply to (or be enforced on).
  • the two choices provided are: all users or a list of specific user.
  • the lower portion of FIG. 6 the screenshot includes functionality that allows the user to specify the contours of the particular rule (policy).
  • the lower portion of the screenshot includes functionality that allows the user to set rules to produce an action based on who did what, on which computer, when, and from which client.
  • the "did what" portion is further broken down, in the illustrated implementation, to enable specifying downloading or exporting files from particular locations, that were originated from particular categories of websites and/or named websites, and/or having particular file attributes.
  • This screen also provides the user with functionality to specify the action to perform if the rules / policies so warrant an action.
  • the portion of the screenshot in FIG. 7 includes functionality that enables a user to define exfiltration points in the network.
  • the user can define the exfiltration points based on the methods to take files out of the system (to be alerted on), for example - copy to dropbox, or to a Google drive, as well as entry points to track (e.g., from a specific website or category).
  • the user may be able to limit tracking by file name or file type (the default may be to track all files from all sites).
  • FIG. 8 has a pop-up that enables a user to edit an alert notification policy.
  • the pop-up includes a field that the user can populate to identify the policy name that the user wants to edit.
  • the pop-up includes another field that the user can populate with email addresses of users that should receive alerts (via email).
  • the pop-up also includes buttons that enable the user to specify email frequency.
  • FIG. 9 is a screenshot that includes functionality that enables a user to specify when the system should alert and when the system should stop or block user activity.
  • the screenshot in this regard enables the user to add new alert rules, or add new Linux prevent rules.
  • the screenshot also includes a search functionality that enables the user to search for alert / prevent rules based on action, risk level, status, and/or, optionally, more filters.
  • the bottom portion of the screenshot shows one rule name and its associated parameters.
  • the techniques and technologies disclosed herein can be deployed in virtually any kind of computer network.
  • the computer network can have a firewall and/or other security measures or not.
  • the organization that runs, controls, or owns the network can be virtually any type of entity comprising multiple people, such as a business, an institution, or an association, that has one or more collective goals and is linked to an external environment.
  • organizations including, for example, corporations, governments, governmental entities, non-governmental organizations, political organizations, armed forces, charities, not-for-profit corporations, partnerships, cooperatives, educational institutions, religious organizations (e.g., churches), hybrid organizations (e.g., that operate in the public sector and private sector simultaneously), voluntary associations (including informal clubs), secret societies, etc.
  • the organization's computer network environment is defined by a computer-based firewall.
  • the firewall can be virtually any kind of firewall.
  • a firewall is a network security system that monitors and/or controls incoming and outgoing network traffic based on predetermined security rules.
  • a firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.
  • access to the organization's computer-based resources within the firewall may require a log in or satisfying some access criteria.
  • the network architecture, and/or the architecture of the exfiltration detection and response system can vary.
  • the functions and sub-components of the different exfiltration detection and response system can be combined, consolidated, or separated into a different configuration of sub-components.
  • the sub-components can be local to one another (e.g., implemented in a single network component) or distributed across the network.
  • the functionalities associated with the exfiltration detection and response system and/or its subcomponents can be performed by other components or sub-components.
  • the exfiltration detection and response system may be deployed in a variety of different ways within the computer network. For example, some portions of the exfiltration detection and response system may be incorporated into the specific computers (e.g., user access devices) on the computer network, whereas other portions of the exfiltration detection and response system may be incorporated on the server side of the computer network 102 (e.g., in one or more servers).
  • the rules for the rules engine and alert portions of the exfiltration detection system may be implemented on the server side of the computer network 102 (and serve, for example, the entire network), whereas the other portions of the exfiltration detection and response system (e.g., the history and exfiltration tracker, file interceptor and/or session monitoring agent) may be implemented in each respective one of the network computer devices.
  • any portions of the exfiltration detection and response system incorporated into a particular network computer device typically would be dedicated to serving that particular network computer device.
  • the specific types of file management information and/or user activity information that the exfiltration detection and response system receives can vary.
  • the filtering of any received information can vary. There are a variety of ways that this information might be collected.
  • the file management information may be collected based on the kernel action of the network's operating system.
  • the user activity information may also come from the operating system, but typically is not based on the kernel action.
  • each session-monitoring agent may connect to a user session, and listen for specific user actions (e.g., which application is active, what it is doing, what website is being accessed, what browser is being used, meta data about the application (e.g., specific commands being run, FTP requests being made, etc.).
  • the session-monitoring agents may be operable to always be running (and recording) inside a session (silently or not silently) and recording everything, or maybe set to operate based on a policy - e.g., set to operate on trigger.
  • the session-monitoring agents may be configured to capture a video of the user's session (e.g., showing the user's screen during the entire session or during some relevant portion of the session), and/or collect data about the session in any one or more of a variety of ways.
  • the session monitoring agent For each session, the session monitoring agent typically gets a session ID from the operating system. If the user logs out and logs back in, the operating system and the exfiltration detection and response system treat that as a new session.
  • session information does not include things like "open a file” or "move a file,” but the system may learn about those things indirectly from session information (e.g., the session-level information may reveal that a user opened application known as WORD, and inside the header of document in WORD there is a name, so the system can assume that this is the name of the file that was being opened). In this sort of situation, the system may correlate the session level information with the file management information to be sure of the session level information's relevance.
  • the correlating functionalities can be performed in any one of several possible ways and can take into account various types of file management information (e.g., process IDs, user IDs, session IDs, file names, operations, time stamps, etc.), and session level information (e.g., session IDs, user IDs, process IDs, window IDs, information in the windows, time stamps, etc.).
  • file management information e.g., process IDs, user IDs, session IDs, file names, operations, time stamps, etc.
  • session level information e.g., session IDs, user IDs, process IDs, window IDs, information in the windows, time stamps, etc.
  • the file history chains can be saved in one location or multiple locations and can be saved locally, remotely and/or in a distributed fashion.
  • the rules engine can include and be configured to apply a wide variety of possible rules.
  • the exfiltration detection and response system can be implemented in a number of possible ways.
  • the exfiltration detection and response system is implemented in software (e.g., saved in memory on the network, or in some non-transitory computer-based memory storage medium) that causes network processors, etc. to perform and/or facilitate the various functionalities disclosed herein as being attributable to the exfiltration detection and response system.
  • the design of the screenshots can vary considerably from the exemplary screenshots disclosed herein.
  • entry points that the system may use to start tracking a file (e.g., a sensitive origin, some suspicious activity, etc.)
  • exit points that the system may consider as possible indicators that a file, or its contents might be exfiltrated from the network (e.g., Gmail, USB, cloud folder, etc.).
  • different entry point, exfiltration points or actions can be important to or be part of the system, like zipping or archiving a file or getting the file into the system in a different way like creating it using some application.
  • the alerts and/or responses can take on any number of various forms. Different levels of user action blocking are possible. For example, a user's action may be blocked and accompanied by a message to the user (e.g., "you tried to do something that is not allowed” and giving reason why the action is not allowed).
  • the exfiltration detection and response system 118 interact with and receive information, directly or indirectly, from a network's operating system.
  • the operating system can be virtually any kind of operating system including, for example, a mobile device operating system, or any other kind of operating system.
  • an operating system is a program that, after being initially loaded into a computer or network, manages other programs in the computers of the network.
  • certain functionalities described herein may be provided by a downloadable software application (i.e., an app).
  • the app may, for example, implement or facilitate one or more (or all) of the functionalities described herein as taking place at or in association with a website.
  • the subject matter disclosed herein can be implemented in digital electronic circuitry, or in computer-based software, firmware, or hardware, including the structures disclosed in this specification and/or their structural equivalents, and/or in
  • the subject matter disclosed herein can be implemented in one or more computer programs, that is, one or more modules of computer program instructions, encoded on computer storage medium for execution by, or to control the operation of, one or more data processing apparatuses (e.g., processors).
  • the program instructions can be encoded on an artificially generated propagated signal, for example, a machine-generated electrical, optical, or electromagnetic signal that is generated to encode information for transmission to suitable receiver apparatus for execution by a data processing apparatus.
  • a computer storage medium can be, or can be included within, a computer-readable storage device, a computer-readable storage substrate, a random or serial access memory array or device, or a combination thereof.
  • a computer storage medium should not be considered to include a propagated signal, a computer storage medium may be a source or destination of computer program instructions encoded in an artificially generated propagated signal.
  • the computer storage medium can also be, or be included in, one or more separate physical components or media, for example, multiple CDs, computer disks, and/or other storage devices.
  • the operations described in this specification can be implemented as operations performed by a data processing apparatus (e.g., a processor) on data stored on one or more computer-readable storage devices or received from other sources.
  • a data processing apparatus e.g., a processor
  • the term "processor” encompasses all kinds of apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, a system on a chip, or multiple ones, or combinations, of the foregoing .
  • the apparatus can include special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
  • the apparatus can also include, in addition to hardware, code that creates an execution environment for the computer program in question, for example, code that constitutes processor firmware, a protocol stack, a database management system, an operating system, a cross- platform runtime environment, a virtual machine, or a combination of one or more of them.
  • the apparatus and execution environment can realize various different computing model
  • At least some of the functionalities associated with the system disclosed herein can be accessed from virtually any kind of electronic computer device, including, for example, cell phones and tablet.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A computer-based method is disclosed to facilitate managing data exfiltration risk in a computer network environment. The method includes collecting computer file management information associated with each respective one of a plurality of computer files in an organization's computer network environment from a computer operating system, collecting user activity information associated with each respective one of a plurality of user sessions by users having access to the organization's computer network environment with a plurality of session monitoring agents, correlating at least some of the collected user activity information to one or more of the computer files associated with the collected file management information; and assessing data exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information associated with a file history chain.

Description

MANAGING DATA EXFILTRATION RISK
CROSS REFERENCE TO RELATED APPLICATION
The present application claims the benefit of U.S. Provisional Patent Application No. 62/552,438, entitled MANAGING DATA EXFILTRATION RISK, which was filed on August 31, 2017. The disclosure in the prior application is incorporated by reference, herein, in its entirety.
FIELD OF THE INVENTION
This disclosure relates to managing data exfiltration risk and, more particularly, managing data exfiltration risk in a computer network (e.g., for an organization).
BACKGROUND
Data exfiltration is the unauthorized transfer of data from a computer. Such a transfer may be manual and carried out by someone with physical access to a computer in a network. Data exfiltration, particularly when done by an insider (e.g., an organization's own employee), can be a huge threat to an organization.
SUMMARY OF THE INVENTION
In one aspect, a computer-based method is disclosed to facilitate managing data exfiltration risk in a computer network environment. The method includes collecting computer file management information associated with each respective one of a plurality of computer files in an organization's computer network environment from a computer operating system, collecting user activity information associated with each respective one of a plurality of user sessions by users having access to the organization's computer network environment with a plurality of session monitoring agents, correlating at least some of the collected user activity information to one or more of the computer files associated with the collected file management information; and assessing data exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information.
In a typical implementation, the computer-based method includes presenting an alert to one or more particular system users (e.g., system administrators), if the assessment reveals that the data exfiltration risk exists with respect to any one or more of the computer files, and/or preventing a user action that would result in a data exfiltration associated with one of the computer files, if the assessment reveals that the data exfiltration risk exists with respect to that computer file.
The exfiltration risk typically is assessed without regard to content in any of the one or more computer files.
In another aspect, a computer system is disclosed that facilitates managing data exfiltration risk in a computer network environment. The computer system includes a plurality of computer-based user access devices and resources within a computer network that has a firewall, an operating system to support computer operations within the computer network, and an exfiltration detection and response system configured to interact with the operating system, and to facilitate managing data exfiltration risk in the computer network.
The data exfiltration system includes a file interceptor to receive computer file management information associated with each respective one of a plurality of computer files in the computer network from the operating system, one or more session-monitoring agents to collect user activity information associated with each respective one or more user sessions on the computer network by users having access to the computer network, a history and exfiltration tracker to correlate at least some of the collected user activity information to one or more of the computer files associated with the file management information received from the operating system, and a rules engine to assess exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information.
In some implementations, one or more of the following advantages are present.
Data exfiltration can be identified either as it is happening or very shortly thereafter. The user implementing the data exfiltration, or attempting to implement the data exfiltration, can be stopped and/or prevented from performing other actions on the network - at least until a person in some authority (e.g., a system administrator or the like) can assess the situation to determine the real risk and whether the user was acting maliciously. Along those lines, the person in authority can be alerted to the data exfiltration immediately - either as it is happening or shortly thereafter. This enables that person to take immediate and timely action to remedy any potential damage. The user attempting to exfiltrate the data can be notified as well that his or her actions are not permissible. A clear and complete record of the data exfiltration, including the identity of the involved user and exactly what the user did is created and stored for later analysis.
All of this typically happens automatically (e.g., once the system is up and running, it monitors and blocks/reports without requiring further involvement, aside from perhaps routine maintenance) from a system administrator.
Moreover, the techniques and technologies disclosed herein are light, from a processing perspective. That is, they require relatively little in terms of processing resources. They are quick, reliable and robust as well. In short, the techniques and technologies disclosed herein have the potential to significantly prevent, deter, and/or minimize the detrimental effects associated with data exfiltration in an organization's computer network.
Other features and advantages will be apparent from the description and drawings, and from the claims.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is an exemplary computer network environment that includes part of a computer network with a firewall that restricts communications between the computer network and other computer resources and devices outside of the computer network and an exfiltration detection and response system.
FIG. 2 is a schematic representation showing part of the computer network in FIG. 1, with a particularly detailed, yet exemplary, representation of the exfiltration detection and response system.
FIGS. 3-9 are exemplary screenshots showing functionalities associated with the exfiltration detection and response system that might be viewable by a system administrator, or the like, from one or more of the user access devices in FIG. 1.
Like reference characters refer to like elements.
DETAILED DESCRIPTION FIG. 1 is an exemplary computer network environment 100 that includes part of a computer network 102 with a firewall 104 that restricts communications between the computer network 102 and other computer resources and devices 106 (e.g., via the Internet 117) outside of the computer network 102.
The part of the computer network 102 represented in the illustrated implementation includes a plurality of computer devices 108 (e.g., computer-based user-access devices), from which an appropriately authorized user can access one or more of the organization's computer- based resources (e.g., programs, files, etc.) within the firewall 104. These resources can be stored or hosted locally (e.g., at a local host 110a that includes processing 112a and memory storage 114a capabilities) or remotely (e.g., at remotely-located host 110b that includes processing 112b and memory storage 114b capabilities). According to the illustrated
implementation, the resources at the local host 110a can be accessed by an authorized user from any one of the plurality of computer devices 108, via a local area network 116. Moreover, according to the illustrated implementation, the resources at the remote host 110b can be accessed by an authorized user from any one of the plurality of computer devices 108, via the local area network 116 and the Internet 117.
The computer network 102 in the illustrated implementation has an exfiltration detection and response system 118 that is configured to facilitate managing data exfiltration risk in the computer network 102. More particularly, in this regard, the exfiltration detection and response system 118 is configured to detect and respond to any scenarios that might occur during network operations that indicate or suggest that a data exfiltration event has occurred or is about to occur. Data exfiltration refers generally to the unauthorized removal or copying of a computer file, or its contents, for example, to outside of the organization's computer network 102 (e.g., beyond the confines of the firewall 104). Data exfiltration risk refers generally to the possibility that some kind of data exfiltration either has occurred or is about to occur and has potential to harm the organization.
The exfiltration detection and response system 118 may take into account any one or more of a variety of different factors to determine whether a data exfiltration risk exists. In various implementations, these factors can include or relate to file management information (e.g., as collected by a file management system in the network operating system), and/or user activity information (e.g., as collected by a computer-based session-monitoring agent during one or more user sessions within the computer network 102). These factors generally do not include any substantive content of the computer files that are subjected to exfiltration.
The file management system is a computer-based system that the network's operating system, for example, may use to organize and keep track of files. In a typical implementation, the file management system is responsible for creating, deleting, modifying, and controlling access to computer files in an organization's computer network (e.g., 102). Some of the file management information that the exfiltration detection and response system 118 might take into account in determining whether a data exfiltration risk exists with respect to a particular computer file in the computer network 102 includes: the origin of the file (e.g., where in computer network 102 the file was first created and/or stored), metadata of the file at its origin (e.g., file name, file size, etc.), whether the file has been copied or is a copy of another file, whether the file has been given a different name than its original one, whether the file has been stored in a location that is different from its original location, whether the file has been reformatted (e.g., from a .doc file to a jpg file, etc.), whether the file has been or is being moved to a particular location (especially outside the network 102), whether the file has been opened by a particular user, whether a particular file has been deleted, whether a user has run a search for a particular file, and/or whether a user has modified one or more file attributes, properties, or file permissions associated with a particular file.
The session-monitoring agents are computer-based activity monitors that monitor the activities of a user during sessions on the computer network 102. In some implementations, one session-monitoring agent is deployed (e.g., by the exfiltration detection and response system 118) for each respective user session that gets initiated on the computer network 102. In those typical implementations, a new session-monitoring agent is deployed each time a new user session is initiated (e.g., each time a user logs into the computer network 102 to gain access to the network's resources, programs and/or files). More typically, a session-monitoring agent is deployed just once— when a user logs in, and simply stops running when the user logs out. Some of the user activity information that the exfiltration detection and response system 118 might take into account in determining whether a data exfiltration risk exists with respect to a particular computer file includes: what application(s) (e.g., web browsers, etc.) a user is using at a particular time, what the user is doing with that (those) application(s), what websites (e.g., identified by uniform resource locator (URL)) a user is visiting, metadata (e.g., specific commands, such as FTP requests, being run, etc.) about the application(s) a user is using, etc.).
Notably, none of this information - e.g., file management information, or user activity information— relates to (or includes) any substantive content of the computer files
themselves. For example, none of this information relates to (or includes) any of the words, characters, or other substantive content stored in the computer files themselves. To be more specific, in a typical implementation, the exfiltration detection and response system 118 assesses data exfiltration risk (and facilitates management of data exfiltration risk) with respect to specific computer files without taking into account any substantive content from the computer files themselves. This is one of the reasons why the computing techniques disclosed herein that facilitate managing data exfiltration risk are so light - the amount of data that is taken into account is low. And, although the amount of data taken into account is low, the performance (and ability to facilitate managing data exfiltration risk) is robust and reliable.
FIG. 2 is a schematic representation showing part of the computer network 102 in FIG. 1, with a particularly detailed representation of an exemplary exfiltration detection and response system 118.
The illustrated exfiltration detection and response system 118 has a file interceptor 220 and a plurality of session-monitoring agents 222a, 222b, 222c . . . 222n.
During network operations, the file interceptor 220 collects computer file management information associated with each respective one of a plurality of computer files in the computer network 102 from the computer network's operating system 224. The file interceptor 220 may receive the file management information from the computer network's operating system 224, for example, periodically in bundles, as new file management information becomes available, or in any other convenient manner. In a typical implementation, the exfiltration detection and response system 118 registers with the operating system 224 so that the file interceptor 220 will receive the file management information from the operating system 220. In a typical
implementation, the operating system 220 simply provides this information to the file interceptor 220 condition-free and simply performs its functionalities without waiting for the exfiltration detection and response system 118 to check for exfiltration risk based on a particular piece of file management information provided. In some implementations, however, the file management information may be provided to the file interceptor 220 with a call-back condition, requiring an indication, for example, from the exfiltration detection and response system 118 that any actions associated with a particular piece of file management information provided (e.g., the moving of a file) does not pose a data exfiltration risk before allowing that action (e.g., the moving of the file) to happen.
Each session-monitoring agent 222a, 222b, 222c, . . . 222n in the illustrated
implementation is associated with, and adapted to receive user activity information from one of a plurality of a user sessions 226a, 226b, 226c, . . . 226n on the network 102, respectively. In a typical implementation, the number of session-monitoring agents 222a, 222b, 222c . . . 222n deployed on the network 102 can vary over time, and, at any given point of time, the number of session-monitoring agents 222a, 222b, 222c . . . 222n deployed on the network 102 will match the number of user sessions that are active on the network 102. For example, at one point in time, if there is only one active user session on the network 102 (e.g., only one user logged into the network 102), there will be only one session-monitoring agent deployed on the network 102 and that session-monitoring agent will receive user activity information from the one active user session. At other times, there may be many users logged into the network and, therefore, many active user sessions (one per user). At those points in time, there will be many session- monitoring agents deployed on the network 102 - one per active user session, and each session- monitoring agent will receive user activity information from one of the many active user sessions, respectively.
The illustrated exfiltration detection and response system 118 also has a history and exfiltration tracker 228 that is configured to communicate with the file interceptor 220 and each active session-monitoring agent 222a, 222b, 222c, . . . 222n. The history and exfiltration tracker 228 receives data (e.g., the file management information and user activity information collected by the file interceptor 220 and the session-monitoring agents 222a, 222b, 222c . . . 222n, respectively). In a typical implementation, the history and exfiltration tracker 228 determines, based at least in part on the data it receives, which, if any, of the computer files in the network 102 should be tracked for purposes of managing data exfiltration risk. In some implementations, this determination is made on a file-by-file basis, and may be based on one or more parameters or characteristics of each file.
As an example, the history and exfiltration tracker 228 might determine that a particular file warrants tracking for purposes of managing data exfiltration risk based on that file's original storage location in the computer network 102. So, if the particular file was created into a network storage location that a system administrator, for example, had designated for storing sensitive or confidential information, then the history and exfiltration tracker may determine that that particular file warrants tracking for purposes of managing data exfiltration risk. As another example, the history and exfiltration tracker 228 might determine that a particular file warrants tracking based on specific actions that a user may have taken in connection with that file. So, if a user has converted a particular file from a .doc format (e.g., a text file) to a jpg format (e.g., an image file), then the history and exfiltration tracker may determine that that particular file warrants tracking for purposes of managing exfiltration risk. The underlying rationale for designating this kind of file for tracking might be that the user's behavior - in converting the file format from text to image - seems a bit suspicious, particularly if the file in question might include sensitive or confidential information. As yet another example, the history and exfiltration tracker 228 might determine that a particular file warrants tracking based on a combination of that file's original storage location (e.g., a location designated for storing somewhat, or possibly, sensitive materials) and/or potentially suspicious activities by a user relating to that file. There might be other bases (e.g., a file having been downloaded from the web or from a specific website, etc.) upon which the history and exfiltration tracker 228 might determine a particular file warrants tracking for purposes of managing exfiltration risk.
In various implementations, some or all of the bases upon which the history and exfiltration tracker 228 might determine a particular file warrants tracking for purposes of managing exfiltration risk can be preprogrammed or customized/specified by a user (e.g., a system administrator). For example, the network 102 may be configured such that a user (e.g., a system administrator) can specify, from one of user access devices 108, which parameters (e.g., sensitive storage locations, suspicious user actions, etc.) should trigger the history and exfiltration tracker 228 to designate a particular file for tracking.
For each respective one of the computer files that the history and exfiltration tracker 228 designates for tracking, the history and exfiltration tracker creates and maintains a file history chain 234a, 234b . . . 234n. Each respective one of the file history chains 234a, 234b . . . 234n typically includes at least some (or all) of the file management information and correlated user activity information associated with a particular one of the tracked computer files.
In this regard, in a typical implementation, the history and exfiltration tracker 228 correlates the user activity information to the file management information for each of the tracked computer files. According to one exemplary implementation, the history and exfiltration tracker 228 performs this correlation by comparing various types of data (e.g., time stamp information, session identifiers, user identifiers, process identifiers, metadata, etc.) associated with the file management information to the same or similar types of data (e.g., time stamp information, session identifiers, user identifiers, process identifiers, metadata etc.) associated with the user activity information. Correlating information from these two different data sources (e.g., file management information and user activity information) gives the history and exfiltration tracker 228 deep context about each particular file being tracked within the network 102 to facilitate exfiltration risk assessment on those files.
If, for example, a user downloads his or her employer's confidential customer list through a web browser, using file transfer protocol (FTP), for example, and then attaches that customer list to an email from the user's personal email account (using the Gmail® electronic mail service, for example), the history and exfiltration tracker 228 may receive user activity information indicating that the user accessed his or her personal email account and file management information indicating that a file from a confidential storage location (the confidential customer list) was being attached to an email. On their own, each piece of information in this regard may be interesting, but together they are quite interesting.
In a typical implementation, the history and exfiltration tracker 228 will correlate these two pieces of information (e.g., by saving them into a single file history chain) based on their respective time stamps indicating that the activities happened at the same time or close in time, user identifiers indicating that the same user was involved in both activities, common or similar process identifiers indicating that the same or similar processes were involved in both activities, and/or other metadata or information showing commonalities between the activities that might make one relevant to the other. Notably, in a typical implementation, correlating file
management information and user activity information does not involve, or rely upon, consideration of any substantive content in the computer file at issue.
Once created, the file history chains 234a, 234b . . . 234n may be stored in any
convenient storage location on the network 102, such as computer-based memory storage 230. In a typical implementation, the history and exfiltration tracker 228 stores, for each respective one of computer files identified for tracking, the computer file management information and any user activity information that has been correlated to the computer file management information in the file history chain for that computer file. Moreover, as new pieces of information relevant to a particular tracked file arrives at the history and exfiltration tracker 228 that new information can be correlated as appropriate and added to the file history chain for that computer file. Thus, at any point in time, the file history chain 234a, 234b . . . 234n for all of the tracked computer files will be generally up-to-date.
The illustrated history and exfiltration tracker 228 also has a rules engine 232. The rules engine 232 in a typical implementation is configured to apply rules (or logic) to a set of data (e.g., the file history chain for any of the tracked computer files) to determine whether a particular user activity on a particular one of the tracked computer files creates an exfiltration risk (i.e., a risk that data exfiltration has happened or may be about to happen) that warrants some kind of action (e.g., generating an alert, blocking a user action, etc.) by the history and exfiltration tracker 228.
The rules engine 232 typically performs its role by considering not only its own rules, but also the file history chain for the file at issue (including, e.g., the file's original storage location, whether there have been any suspicious user activities on that file, etc.). Notably, in a typical implementation, the rules engine performs its role without any regard to substantive content contained in the file at issue. In a typical implementation, the rules engine 232 performs its role every time a new piece of information relevant to one of the tracked files is added to the file history chain 234a, 234b . . . 234n for that file. However, in some implementations, the rules engine 232 performs this function at set time intervals (for all or some of the files), based on some other trigger, etc.
There are a number of different rules that could be used by the rules engine to determine that a particular user activity on a particular file creates an exfiltration risk that warrants some action by the exfiltration detection and response system 118. Some examples of these rules might include: 1) take an action if a file from a sensitive or confidential storage location is about to be sent (or has been sent) to an email address not associated with the organization (e.g., a personal email address), 2) take an action is a file from a sensitive or confidential storage location has had its format changed (e.g., from a text format to an image format) and is now about to be saved (or has been saved) in a non-sensitive and non-confidential storage location, 3) take an action if any file has been subjected to a certain type of suspicious user activity and is now poised to be removed (or has been removed) from the network, etc. The rules or logic in the rules engine 232 can be preprogrammed rules, user-specified rules, or a combination of both. In implementations where the rules or logic can be user-specified, a system administrator, for example, may be able program those rules or logic into the rules engine 232 from any one of the user access devices 108 in the network 102. The rules can be broad (e.g., generate an alert if any file from a particular storage location is attached to an email, shut down the user session if certain users access a file from a particular storage location, etc.) or specific (e.g., generate an alert if a particular file is attached to a personal email account of a specific user). Different rules can apply to different users, roles within the organization, files, types of files, storage locations, times of day, days of the week, etc. There are various actions that the exfiltration detection and response system 118 can take in response to the rules engine 232 determining that a particular user activity on a particular one of the tracked computer files creates an exfiltration risk that warrants some kind of action.
For example, the exfiltration detection and response system 118 may cause an alert to be sent to a system administrator and/or other designated alert recipient(s).
The alert may be sent in any number of possible ways including, for example, via text, email, phone call, etc. In some implementations, the way that an alert is sent can be specified / personalized by the system administrator, or other intended recipient. The alert may indicate genetically that a data exfiltration risk has been identified, or may include, or facilitate access to, additional information about the data exfiltration risk - e.g., what the risk is (e.g., a file from a sensitive location has been attached to an email, a file from a sensitive location has had its format changed from text to an image, etc.), which network user is involved, the time and date of the event, where the event happened (e.g., in the office, outside the office from a computer logged into the network, etc.), etc. In some implementations, the alert may present the system administrator with information that helps the system administrator take whatever next steps might be appropriate. For example, the alert may include, or facilitate access to, contact information for the user involved, a button that the system administrator can select to block the involved user from taking any further actions or from taking a specific action, an option that allows the system administrator to text or email with etc. In some implementations, the alert may include an option to share the alert with others within the organization.
As another example, the exfiltration detection and response system 118 may send a message to the user involved in the activity that created the exfiltration risk. The message, of course, may be sent in any number of possible ways including, for example, via pop-up on a user's screen, text, email, phone call, etc. In some implementations, the way that an alert is sent can be specified / personalized by the system administrator. The message may indicate genetically that some activity that the user is engaged in has been flagged as creating a risk of data exfiltration, or may include, or facilitate access to, additional information about the data exfiltration risk - e.g., what the risk is (e.g., a file from a sensitive location has been attached to an email, a file from a sensitive location has had its format changed from text to an image, etc.), etc.
As another example, the exfiltration detection and response system 118 may
automatically block one or more user activities after a determination that an activity by the user has created an exfiltration risk that warrants blocking. There are a variety of ways that user activities may be blocked. In one exemplary implementation, the exfiltration detection and response system 118 may cause the operating system to terminate the user's session. In another exemplary implementation, the exfiltration detection and response system 118 may cause the network 102 to block only specific actions (e.g., sending an email) on the network 102. In some implementations, the exfiltration detection and response system 118 may block the user's screen.
In some implementations, the exfiltration detection and response system 118 may take more than one actions in response to the rules engine 232 determining that a particular user activity on a particular one of the tracked computer files creates an exfiltration risk that warrants some kind of action. For example, in some implementations, the exfiltration detection and response system 118 may send a message to the user involved in the questionable activity and to the system administrator. In some implementations, the exfiltration detection and response system 118 may block a user's actions on the network 102 and send an alert to the system administrator. In some implementations, the exfiltration detection and response system 118 may block a user's actions on the network 102, send an alert to the system administrator, and send a message to the user involved in the questionable activity. Other actions and/or combinations of actions in this regard are possible as well.
In a typical implementation, the rules engine 232 may store information about its determinations regarding exfiltration risk and any actions taken as a result of those
determinations. In this regard, the rules engine 232 in the illustrated implementation is coupled to (and stored this, and perhaps other information in) a server 238 that is outside the exfiltration detection and response system 118. In some implementations, the information stored in this regard includes the underlying file history chain(s) as well. The information stored in the server 238 may be used after the fact by a system administrator, for example, to analyze a particular circumstance that may have been flagged as a data exfiltration risk.
The illustrated exfiltration detection and response system 118 has an output 236 that is coupled to the user access terminals 108, and through which the exfiltration detection and response system 118 can send alerts, messages, instructions, etc. to implement associated reactions to data exfiltration risks.
FIGS. 3 - 9 are screenshots that might appear, for example, at one or more of the user access devices 108 in a network 102 when user is logged into the network 102 through that device 108. These screenshots correspond to only one exemplary implementation of the exfiltration detection and response system 118 being implemented on a network.
The screenshot in FIG. 3 shows file history, and other data for a tracked file - a list of customer names— in the network 102. More particularly, the illustrated screenshot identifies the original file name, the file source, the original file path, and a file identification code. Moreover, the screenshot includes a chronological listing of user actions taken with respect to the tracked file. In a typical implementation, the chronological listing of user actions includes information from or related to the file history chain for the file.
The chronological listing of user actions taken with respect to the tracked file specifies, for each entry, the time (and, typically, date), the file name, the operation, details, the user logged in (who performed the action), the application involved, the end point, and a link to a video of the associated user session when the action happened. The video may be captured, for example, by the session-monitoring agent operating when each action happened. According to the chronological listing in the illustrated screenshot, user, nirbarak, downloaded the
customers. numbers file, converted that file into an image (.png) file, and then moved the image file into a dropbox. The last entry in the chronological listing has a bell symbol to the left of the listing that indicates that an alert became associated with that file upon that entry. Presumably, the rules engine determines that, under the indicated circumstances (e.g., sensitive information, being converted from a text file into an image file, and then being moved to a dropbox) warranted an alert.
In a typical implementation, one can reach the screen of FIG. 3 from either an alert itself or from one of the file activities in a file history chain, that can appear, for example, in another system diary. In some implementations, information about the operation performed is provided under the column heading "operation."
In a typical implementation, a user viewing the screenshot in FIG. 3 can click on any one of the entries to access more information about the associated user action.
The system also typically allows a user (e.g., a system administrator or the like) to search for various types of user actions that may have occurred with respect to tracked files. FIG. 4 shows one example of a search screen that allows the user to search based on time period, status (e.g., new, old, etc.), risk level (e.g., high, medium, low, etc.), whether an alert was generated or an action was prevented, the type of operating system, the applicable rule name that may have been implicated, an identification code for the associated alert, and/or other filters.
The bottom portion of the FIG. 4 screenshot shows the first result of a search conducted based on the parameters specified in the top portion of the FIG. 4 screenshot. This result just so happens to correspond to the last entry in the chronological listing of user action involving the customers. numbers file in FIG. 3. The information about this user action provided in the bottom portion of the screenshot in FIG. 4 specifies who performed the action, what the action was (e.g., the exfiltrated file, the destination of the exfiltrated file, the file operation performed to exfiltrate, where the file originated from, and the initial file name), on which computer the action happened, from which client, and when.
The bottom portion of the FIG. 4 screenshot also has a link to "View File History," which, if selected, would return the user to the screenshot of FIG. 3.
Referring again to FIG. 3, as mentioned above, each entry in the chronological listing of user actions relating to the customers. numbers file includes a camera symbol that is a link to a video showing the user action that corresponds to the associated entry. In a typical
implementation, clicking on that camera symbol causes the system to present to the user the associated video. To be clear, the video shows what was happening on the screen of the user that performed the action at issue when that action was performed (and may include actions leading up to and/or following the action at issues).
FIGS. 5A-5E are screenshots showing stills from a video that might be presented to a user if that user clicked on the camera icon for the last entry in the chronological listing in FIG. 3. The video is being played in a video player. In FIG. 5 A the video player shows the user action of downloading the file.
In FIG. 5B the video player shows an alert on entry point. The alert in the illustrated example indicates who performed the action that caused the alert, on which computer, from which client, and when. The alert also identifies what was done, including specifying the file name and the originated from website.
In FIG. 5C the video player shows the file appearing with the exfiltration point (in this example Dropbox).
In FIG. 5D the video player shows the file being moved into Dropbox.
IN FIG. 5E the video player shows another alert. This alert indicates who performed the action that caused the alert, on which computer, from which client, and when. The alert also identifies what was done, including specifying the exfiltrated tracked file name, where the file was synched to, the originated from website, the initial file name, and the file operation trigger (e.g., move).
In a typical implementation, the information contained in a video clip such as the one represented in FIGS. 5A-5E provide system administrators, or the like, with a great deal of useful information about exfiltration events.
FIGS. 6 and 7 show a screenshot that includes functionality that enables a user to specify rules (e.g., detection policies) for the rules engine to apply in determining whether an exfiltration risk exists or not.
The upper portion of FIG. 6 shows is a portion of the screenshot that enables the user to specify who this rule should apply to (or be enforced on). The two choices provided are: all users or a list of specific user. The lower portion of FIG. 6 the screenshot includes functionality that allows the user to specify the contours of the particular rule (policy). In particular, the lower portion of the screenshot includes functionality that allows the user to set rules to produce an action based on who did what, on which computer, when, and from which client. The "did what" portion is further broken down, in the illustrated implementation, to enable specifying downloading or exporting files from particular locations, that were originated from particular categories of websites and/or named websites, and/or having particular file attributes. This screen also provides the user with functionality to specify the action to perform if the rules / policies so warrant an action.
The portion of the screenshot in FIG. 7 includes functionality that enables a user to define exfiltration points in the network. In a typical implementation, the user can define the exfiltration points based on the methods to take files out of the system (to be alerted on), for example - copy to dropbox, or to a Google drive, as well as entry points to track (e.g., from a specific website or category). In some implementations, the user may be able to limit tracking by file name or file type (the default may be to track all files from all sites).
FIG. 8 has a pop-up that enables a user to edit an alert notification policy. The pop-up includes a field that the user can populate to identify the policy name that the user wants to edit. The pop-up includes another field that the user can populate with email addresses of users that should receive alerts (via email). The pop-up also includes buttons that enable the user to specify email frequency.
FIG. 9 is a screenshot that includes functionality that enables a user to specify when the system should alert and when the system should stop or block user activity. The screenshot in this regard enables the user to add new alert rules, or add new Linux prevent rules. The screenshot also includes a search functionality that enables the user to search for alert / prevent rules based on action, risk level, status, and/or, optionally, more filters. The bottom portion of the screenshot shows one rule name and its associated parameters.
A number of embodiments of the invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention.
For example, the techniques and technologies disclosed herein can be deployed in virtually any kind of computer network. The computer network can have a firewall and/or other security measures or not. The organization that runs, controls, or owns the network can be virtually any type of entity comprising multiple people, such as a business, an institution, or an association, that has one or more collective goals and is linked to an external environment. There are a variety of types of organizations, including, for example, corporations, governments, governmental entities, non-governmental organizations, political organizations, armed forces, charities, not-for-profit corporations, partnerships, cooperatives, educational institutions, religious organizations (e.g., churches), hybrid organizations (e.g., that operate in the public sector and private sector simultaneously), voluntary associations (including informal clubs), secret societies, etc.
In some implementations, the organization's computer network environment is defined by a computer-based firewall. The firewall can be virtually any kind of firewall. In computing, a firewall is a network security system that monitors and/or controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted. In some implementations, access to the organization's computer-based resources within the firewall may require a log in or satisfying some access criteria.
The network architecture, and/or the architecture of the exfiltration detection and response system can vary. For example, the functions and sub-components of the different exfiltration detection and response system can be combined, consolidated, or separated into a different configuration of sub-components. The sub-components can be local to one another (e.g., implemented in a single network component) or distributed across the network. Likewise, the functionalities associated with the exfiltration detection and response system and/or its subcomponents can be performed by other components or sub-components.
The exfiltration detection and response system may be deployed in a variety of different ways within the computer network. For example, some portions of the exfiltration detection and response system may be incorporated into the specific computers (e.g., user access devices) on the computer network, whereas other portions of the exfiltration detection and response system may be incorporated on the server side of the computer network 102 (e.g., in one or more servers). More particularly, in one exemplary implementation, the rules for the rules engine and alert portions of the exfiltration detection system may be implemented on the server side of the computer network 102 (and serve, for example, the entire network), whereas the other portions of the exfiltration detection and response system (e.g., the history and exfiltration tracker, file interceptor and/or session monitoring agent) may be implemented in each respective one of the network computer devices. In those sorts of implementations, any portions of the exfiltration detection and response system incorporated into a particular network computer device typically would be dedicated to serving that particular network computer device. The specific types of file management information and/or user activity information that the exfiltration detection and response system receives can vary. The filtering of any received information can vary. There are a variety of ways that this information might be collected. For example, in some implementations, the file management information may be collected based on the kernel action of the network's operating system. The user activity information may also come from the operating system, but typically is not based on the kernel action.
In this regard, for example, each session-monitoring agent may connect to a user session, and listen for specific user actions (e.g., which application is active, what it is doing, what website is being accessed, what browser is being used, meta data about the application (e.g., specific commands being run, FTP requests being made, etc.). The session-monitoring agents may be operable to always be running (and recording) inside a session (silently or not silently) and recording everything, or maybe set to operate based on a policy - e.g., set to operate on trigger. The session-monitoring agents may be configured to capture a video of the user's session (e.g., showing the user's screen during the entire session or during some relevant portion of the session), and/or collect data about the session in any one or more of a variety of ways.
For each session, the session monitoring agent typically gets a session ID from the operating system. If the user logs out and logs back in, the operating system and the exfiltration detection and response system treat that as a new session. Generally, session information does not include things like "open a file" or "move a file," but the system may learn about those things indirectly from session information (e.g., the session-level information may reveal that a user opened application known as WORD, and inside the header of document in WORD there is a name, so the system can assume that this is the name of the file that was being opened). In this sort of situation, the system may correlate the session level information with the file management information to be sure of the session level information's relevance.
The correlating functionalities can be performed in any one of several possible ways and can take into account various types of file management information (e.g., process IDs, user IDs, session IDs, file names, operations, time stamps, etc.), and session level information (e.g., session IDs, user IDs, process IDs, window IDs, information in the windows, time stamps, etc.).
The file history chains can be saved in one location or multiple locations and can be saved locally, remotely and/or in a distributed fashion. The rules engine can include and be configured to apply a wide variety of possible rules.
The exfiltration detection and response system can be implemented in a number of possible ways. Typically, the exfiltration detection and response system is implemented in software (e.g., saved in memory on the network, or in some non-transitory computer-based memory storage medium) that causes network processors, etc. to perform and/or facilitate the various functionalities disclosed herein as being attributable to the exfiltration detection and response system.
The design of the screenshots can vary considerably from the exemplary screenshots disclosed herein. There are various entry points that the system may use to start tracking a file (e.g., a sensitive origin, some suspicious activity, etc.), and there are various exit points that the system may consider as possible indicators that a file, or its contents might be exfiltrated from the network (e.g., Gmail, USB, cloud folder, etc.). Indeed, different entry point, exfiltration points or actions can be important to or be part of the system, like zipping or archiving a file or getting the file into the system in a different way like creating it using some application. The alerts and/or responses can take on any number of various forms. Different levels of user action blocking are possible. For example, a user's action may be blocked and accompanied by a message to the user (e.g., "you tried to do something that is not allowed" and giving reason why the action is not allowed).
The exfiltration detection and response system 118, and other components mentioned herein, interact with and receive information, directly or indirectly, from a network's operating system. The operating system can be virtually any kind of operating system including, for example, a mobile device operating system, or any other kind of operating system. In general, an operating system is a program that, after being initially loaded into a computer or network, manages other programs in the computers of the network.
In some implementations, certain functionalities described herein may be provided by a downloadable software application (i.e., an app). The app may, for example, implement or facilitate one or more (or all) of the functionalities described herein as taking place at or in association with a website.
In various embodiments, the subject matter disclosed herein can be implemented in digital electronic circuitry, or in computer-based software, firmware, or hardware, including the structures disclosed in this specification and/or their structural equivalents, and/or in
combinations thereof. In some embodiments, the subject matter disclosed herein can be implemented in one or more computer programs, that is, one or more modules of computer program instructions, encoded on computer storage medium for execution by, or to control the operation of, one or more data processing apparatuses (e.g., processors). Alternatively, or additionally, the program instructions can be encoded on an artificially generated propagated signal, for example, a machine-generated electrical, optical, or electromagnetic signal that is generated to encode information for transmission to suitable receiver apparatus for execution by a data processing apparatus. A computer storage medium can be, or can be included within, a computer-readable storage device, a computer-readable storage substrate, a random or serial access memory array or device, or a combination thereof. While a computer storage medium should not be considered to include a propagated signal, a computer storage medium may be a source or destination of computer program instructions encoded in an artificially generated propagated signal. The computer storage medium can also be, or be included in, one or more separate physical components or media, for example, multiple CDs, computer disks, and/or other storage devices.
The operations described in this specification can be implemented as operations performed by a data processing apparatus (e.g., a processor) on data stored on one or more computer-readable storage devices or received from other sources. The term "processor" encompasses all kinds of apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, a system on a chip, or multiple ones, or combinations, of the foregoing.. The apparatus can include special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit). The apparatus can also include, in addition to hardware, code that creates an execution environment for the computer program in question, for example, code that constitutes processor firmware, a protocol stack, a database management system, an operating system, a cross- platform runtime environment, a virtual machine, or a combination of one or more of them. The apparatus and execution environment can realize various different computing model
infrastructures, such as web services, distributed computing and grid computing infrastructures. While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any inventions or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple
embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings and described herein as occurring in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
At least some of the functionalities associated with the system disclosed herein can be accessed from virtually any kind of electronic computer device, including, for example, cell phones and tablet.
Other implementations are within the scope of the claims.

Claims

What is claimed is:
1. A computer-based method to facilitate managing data exfiltration risk in a computer network environment, the computer-based method comprising:
collecting computer file management information associated with each respective one of a plurality of computer files in an organization's computer network environment from a computer operating system;
collecting user activity information associated with each respective one of a plurality of user sessions by users having access to the organization's computer network environment with a plurality of session monitoring agents;
correlating at least some of the collected user activity information to one or more of the computer files associated with the collected file management information; and
assessing data exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information.
2. The computer-based method of claim 1, further comprising:
presenting an alert to one or more particular system users, if the assessment reveals that the data exfiltration risk exists with respect to any one or more of the computer files.
3. The computer-based method of claim 1, further comprising:
preventing a user action that would result in a data exfiltration associated with one of the computer files, if the assessment reveals that the data exfiltration risk exists with respect to that computer file.
4. The computer-based method of claim 1, wherein the exfiltration risk is assessed without regard to content in any of the one or more computer files.
5. The computer-based method of claim 1, further comprising:
identifying which of the computer files in the organization's computer network environment should be tracked for purposes of assessing the data exfiltration risk with respect to those computer files.
6. The computer-based method of claim 5, further comprising:
creating a file history chain for each respective one of the computer files identified for tracking.
7. The computer-based method of claim 6, wherein the file history chain for each respective one of the computer files identified for tracking includes the collected file management information for that computer file and any of the correlated user activity information for that computer file.
8. The computer-based method of claim 5, wherein identifying which of the computer files should be tracked for possible data exfiltration takes into account each computer file's original storage location in the organization's computer network environment, and/or whether any suspicious actions may have been performed by a user on that computer file.
9. The computer-based method of claim 5, wherein assessing the exfiltration risk comprises: utilizing a rules engine to check whether one or more particular actions in a tracked file history chain or characteristics associated with a particular one of the computer files being tracked creates the data exfiltration risk.
10. The computer-based method of claim 1, wherein correlating at least some of the collected user activity information to one or more of the computer files associated with the collected file management information comprises:
comparing time stamp information, session identifiers, user identifiers, and/or process identifiers associated with the collected computer file management information to time stamp information, session identifiers, user identifiers, and/or process identifiers associated with the collected user activity information.
11. The computer-based method of claim 1, wherein the computer file management information comprises information about one or more of the following: creating a file, opening a file, renaming a file, moving a file, copying a file, deleting a file, searching for a file, encrypting a file, putting a file into an archive, and/or modifying one or more file attributes, properties, or file permissions.
12. The computer-based method of claim 1, wherein each respective one the user sessions is corresponds to a period of time between a particular system user logging into and subsequently logging out of the computer environment.
13. The computer-based method of claim 1, wherein the organization's computer network environment has a firewall that that restricts communications between the computer network environment and other computer resources and devices outside of the computer network environment.
14. The computer-based method of claim 1, further comprising:
filtering the computer file management information to remove out any information related to or including temporary files prior to the correlating.
15. A computer system comprising:
a plurality of computer-based user access devices and resources within a computer network that has a firewall;
an operating system to support computer operations within the computer network;
an exfiltration detection and response system configured to interact with the operating system, and to facilitate managing data exfiltration risk in the computer network, wherein the data exfiltration system comprises:
a file interceptor to receive computer file management information associated with each respective one of a plurality of computer files in the computer network from the operating system;
one or more session-monitoring agents to collect user activity information associated with each respective one or more user sessions on the computer network by users having access to the computer network; a history and exfiltration tracker to correlate at least some of the collected user activity information to one or more of the computer files associated with the file management information received from the operating system; and
a rules engine to assess exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information.
16. The computer system of claim 15, wherein the exfiltration detection and response system is configured to present an alert to one or more particular users of the system logged into the computer network from any one of the computer-based user access devices, in response to the rules engine determining that an exfiltration risk exists with respect to a particular one of the one or more computer files.
17. The computer system of claim 15, wherein the exfiltration detection and response system is configured to prevent a user action that would result in a data exfiltration, in response to the rules engine determining that an exfiltration risk exists with respect to a particular one of the one or more computer files.
18. The computer system of claim 15, wherein the exfiltration detection and response system assesses the data exfiltration risk without regard to substantive content in any of the one or more computer files.
19. The computer system of claim 15, wherein the history and exfiltration tracker identifies which, if any, of the computer files should be tracked for purposes of the data exfiltration risk assessment, based on each computer file's original storage location in the organization's computer network environment, and/or whether any suspicious actions have performed by a user on each computer file.
20. The computer system of claim 19, wherein the history and exfiltration tracker stores, for each respective one of computer files identified for tracking, the computer file management information and any user activity information that has been correlated to the computer file management information in a file history chain for that computer file.
21. The computer system of claim 20, wherein the rules engine assesses the exfiltration risk for a particular one of the computer files being tracked by checking whether one or more particular actions or characteristics associated with that computer file creates the exfiltration risk.
22. The computer system of claim 15, wherein the history and exfiltration tracker correlates at least some of the collected user activity information to the one or more of the computer files associated with the collected file management information by:
comparing time stamp information, session identifiers, user identifiers, and/or process identifiers associated with the received computer file management information to time stamp information, session identifiers, user identifiers, and/or process identifiers associated with the collected user activity information.
23. The computer system of claim 15, wherein the computer file management information comprises information about one or more of the following: creating a file, opening a file, renaming a file, moving a file, copying a file, deleting a file, searching for a file, encrypting a file, putting a file into an archive, and/or modifying one or more file attributes, properties, or file permissions, and
wherein each respective one the user sessions corresponds to a period of time between a particular system user logging into and logging out of the computer environment.
24. The computer system of claim 15, wherein the one or more session-monitoring agents comprise one session-monitoring agent for each respective one of the user sessions in the computer environment.
25. The computer system of claim 15, wherein the file interceptor is configured to filter the file management information to remove any information related to or including temporary files before the history and exfiltration tracker correlates the file management information.
PCT/US2018/048055 2017-08-31 2018-08-27 Managing data exfiltration risk WO2019046147A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US16/643,529 US11449603B2 (en) 2017-08-31 2018-08-27 Managing data exfiltration risk
IL272980A IL272980B1 (en) 2017-08-31 2018-08-27 Computer-Based Method and System to Facilitate Managing Data Exfiltration Risk in a Computer Network Environment
EP18850695.0A EP3676736A4 (en) 2017-08-31 2018-08-27 Managing data exfiltration risk

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201762552438P 2017-08-31 2017-08-31
US62/552,438 2017-08-31

Publications (2)

Publication Number Publication Date
WO2019046147A1 true WO2019046147A1 (en) 2019-03-07
WO2019046147A8 WO2019046147A8 (en) 2019-12-26

Family

ID=65526038

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/048055 WO2019046147A1 (en) 2017-08-31 2018-08-27 Managing data exfiltration risk

Country Status (4)

Country Link
US (1) US11449603B2 (en)
EP (1) EP3676736A4 (en)
IL (1) IL272980B1 (en)
WO (1) WO2019046147A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111814144A (en) * 2020-07-14 2020-10-23 深信服科技股份有限公司 Leakage data processing method, device, equipment and medium

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020051500A1 (en) 2018-09-06 2020-03-12 Coffing Daniel L System for providing dialogue guidance
EP3850781A4 (en) * 2018-09-14 2022-05-04 Coffing, Daniel L. Fact management system
US11526506B2 (en) * 2020-05-14 2022-12-13 Code42 Software, Inc. Related file analysis
US11720702B2 (en) * 2021-04-28 2023-08-08 Code42 Software, Inc. Application-based file exfiltration detection
CN113904879A (en) * 2021-12-10 2022-01-07 北京指掌易科技有限公司 Mobile terminal file tracking method and device, electronic equipment and storage medium
CN114465978B (en) * 2022-02-07 2023-10-13 北京知道创宇信息技术股份有限公司 Mailbox leakage discovery method, device and system and readable storage medium
CN116308762B (en) * 2023-05-19 2023-08-11 杭州钱袋数字科技有限公司 Credibility evaluation and trust processing method based on artificial intelligence
CN116738485B (en) * 2023-06-21 2023-12-05 江苏克胜集团股份有限公司 Security management system based on digital information transmission

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182583A1 (en) * 2002-03-25 2003-09-25 Panareef Pty. Ltd. Electronic document classification and monitoring
US20130097709A1 (en) * 2011-10-18 2013-04-18 Mcafee, Inc. User behavioral risk assessment
US9043905B1 (en) * 2012-01-23 2015-05-26 Hrl Laboratories, Llc System and method for insider threat detection
US20160065601A1 (en) * 2014-02-24 2016-03-03 Cyphort Inc. System And Method For Detecting Lateral Movement And Data Exfiltration
US9641544B1 (en) * 2015-09-18 2017-05-02 Palo Alto Networks, Inc. Automated insider threat prevention

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9292404B1 (en) * 2009-02-02 2016-03-22 Symantec Corporation Methods and systems for providing context for parental-control-policy violations
US8601034B2 (en) * 2011-03-11 2013-12-03 Sourcefire, Inc. System and method for real time data awareness
US9721089B2 (en) * 2011-05-06 2017-08-01 The University Of North Carolina At Chapel Hill Methods, systems, and computer readable media for efficient computer forensic analysis and data access control
US9830450B2 (en) * 2013-12-23 2017-11-28 Interset Software, Inc. Method and system for analyzing risk
US20150205962A1 (en) 2014-01-23 2015-07-23 Cylent Systems, Inc. Behavioral analytics driven host-based malicious behavior and data exfiltration disruption
CN107409126B (en) * 2015-02-24 2021-03-09 思科技术公司 System and method for securing an enterprise computing environment
US10033702B2 (en) * 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange
US10915644B2 (en) * 2017-05-15 2021-02-09 Forcepoint, LLC Collecting data for centralized use in an adaptive trust profile event via an endpoint
US10318729B2 (en) * 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
US10853496B2 (en) * 2019-04-26 2020-12-01 Forcepoint, LLC Adaptive trust profile behavioral fingerprint
US11223646B2 (en) * 2020-01-22 2022-01-11 Forcepoint, LLC Using concerning behaviors when performing entity-based risk calculations

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182583A1 (en) * 2002-03-25 2003-09-25 Panareef Pty. Ltd. Electronic document classification and monitoring
US20130097709A1 (en) * 2011-10-18 2013-04-18 Mcafee, Inc. User behavioral risk assessment
US9043905B1 (en) * 2012-01-23 2015-05-26 Hrl Laboratories, Llc System and method for insider threat detection
US20160065601A1 (en) * 2014-02-24 2016-03-03 Cyphort Inc. System And Method For Detecting Lateral Movement And Data Exfiltration
US9641544B1 (en) * 2015-09-18 2017-05-02 Palo Alto Networks, Inc. Automated insider threat prevention

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3676736A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111814144A (en) * 2020-07-14 2020-10-23 深信服科技股份有限公司 Leakage data processing method, device, equipment and medium
CN111814144B (en) * 2020-07-14 2023-11-07 深信服科技股份有限公司 Leakage data processing method, device, equipment and medium

Also Published As

Publication number Publication date
EP3676736A1 (en) 2020-07-08
IL272980B1 (en) 2024-04-01
EP3676736A4 (en) 2021-05-19
US11449603B2 (en) 2022-09-20
US20200193019A1 (en) 2020-06-18
WO2019046147A8 (en) 2019-12-26
IL272980A (en) 2020-04-30

Similar Documents

Publication Publication Date Title
US11449603B2 (en) Managing data exfiltration risk
Ab Rahman et al. Cloud incident handling and forensic‐by‐design: cloud storage as a case study
Kent et al. Guide to Computer Security Log Management:.
US9652597B2 (en) Systems and methods for detecting information leakage by an organizational insider
US20170264619A1 (en) Middle ware security layer for cloud computing services
Grance et al. Computer Security Incident Handling Guide:.
JP2019096339A (en) System and method for monitoring and controlling business information saved on cloud computing service (ccs), and encrypting business information for each document
Duncan et al. An overview of insider attacks in cloud computing
Scarfone et al. Computer security incident handling guide
Easttom System forensics, investigation, and response
US11003790B2 (en) Preventing data leakage via version control systems
Shavers Placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects
Easttom Digital Forensics, Investigation, and Response
US10606817B2 (en) System and method for capturing data sent by a mobile device
Khan et al. Analysis of digital investigation techniques in cloud computing paradigm
Garchery User-centered intrusion detection using heterogeneous data
Schroader et al. Alternate data storage forensics
Alqahtani A novel approach to providing secure data storage using multi cloud computing
Jenkins Overview of whistleblowing software
Sibiya Digital forensic model for a cloud environment
Carlson Microsoft 365 and Exchange Server Hybrid Forensics
Mansoor Intranet Security
Keter Forensic Analysis of Evernote Data Remnants on Windows 10
Kanhai Limiting Identity Data Theft obtained through malicious means in a Digital performing World
Ismaila et al. Digital Forensics and Incident Response

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18850695

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 272980

Country of ref document: IL

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018850695

Country of ref document: EP

Effective date: 20200331