US20190058723A1 - Discovering internet protocol (ip) addresses involved in flows traversing the internet - Google Patents

Discovering internet protocol (ip) addresses involved in flows traversing the internet Download PDF

Info

Publication number
US20190058723A1
US20190058723A1 US16/166,906 US201816166906A US2019058723A1 US 20190058723 A1 US20190058723 A1 US 20190058723A1 US 201816166906 A US201816166906 A US 201816166906A US 2019058723 A1 US2019058723 A1 US 2019058723A1
Authority
US
United States
Prior art keywords
internal
management platform
security management
address
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/166,906
Inventor
Matthew Kraning
Gregory Heon
Pamela Toman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Palo Alto Networks Inc
Original Assignee
Expanse Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Expanse Inc filed Critical Expanse Inc
Priority to US16/166,906 priority Critical patent/US20190058723A1/en
Publication of US20190058723A1 publication Critical patent/US20190058723A1/en
Assigned to Expanse, Inc. reassignment Expanse, Inc. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: Qadium, Inc.
Assigned to Qadium, Inc. reassignment Qadium, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEON, Gregory, KRANING, Matthew, TOMAN, Pamela
Assigned to EXPANSE, LLC. reassignment EXPANSE, LLC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: Expanse, Inc.
Assigned to PALO ALTO NETWORKS, INC. reassignment PALO ALTO NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EXPANSE, LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/026Capturing of monitoring data using flow identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]

Definitions

  • Various embodiments concern devices, computer programs, and associated computer-implemented techniques for identifying, assessing, and monitoring organizational vulnerabilities to security threats.
  • a computer network (also referred to as a “data network”) is a digital telecommunications network that allows nodes to share resources.
  • computing devices exchange data with one another via connections (also referred to as “data links”). These data links may be established over cable media, such as copper wires or fiber optic cables, or wireless media, such as Wi-Fi or Bluetooth® communication channels.
  • the traffic in a computer network is often analyzed to improve decision making for network operations, security techniques, etc.
  • Traffic may be acquired from a variety of computing devices residing within the computer network to provide extensive visibility of traffic flow.
  • network tools Given the complexity and volume of traffic routed through many infrastructures, a variety of network tools have conventionally been used to identify, analyze, and/or handle security threats to a computer network. Examples of network tools include intrusion detection systems (IDSs) and intrusion prevention systems (IPSs).
  • IDSs intrusion detection systems
  • IPSs intrusion prevention systems
  • security management platforms configured to identify, assess, and monitor organizational vulnerability to security threats.
  • a security management platform can identify security threats that would otherwise go undetected.
  • Such action can be performed instead of, or in addition to, monitoring netflow data regarding the traffic traversing a local network (also referred to as an “internal network”) associated with an organization under examination.
  • the security management platform can instead monitor traffic traversing the Internet and then filter the traffic to identify flows originating from the local network, flows destined for the local network, or any combination thereof.
  • risk filters When examining the flows, the security management platform can watch for various scenarios that correspond with an increased likelihood that a security threat exists. These scenarios can be referred to as “risk filters.” Together, these risk filters allow the security management platform to identify which public Internet Protocol (IP) addresses on the local network of an organization (also referred to as “internal IP addresses”) are vulnerable to unauthorized access, as well as which IP addresses outside the local network (also referred to as “external IP addresses”) are risky for internal IP addresses to communicate with.
  • IP Internet Protocol
  • IP addresses When we refer to ‘internal IP addresses’ in this application, we are referring to publicly routable IP addresses that belong to a given organization or customer, not IP addresses in reserved or private ranges, such as those outlined in RFC1918 (IPv4) or RFC4193 (IPv6), that are sometimes colloquially referred to as “internal IP addresses.”
  • Each risk filter is based on the premise that a first IP address is communicating with a second IP address.
  • the security management platform will examine communications between internal IP addresses and external IP addresses.
  • the security management platform could also examine communications between pairs of internal IP addresses and/or pairs of external IP addresses.
  • the security management platform can pull active sensing data to see if an external IP address has any vulnerable services running on it. Active sensing data is derived from active probing of the external IP address by the security management platform. More specifically, the security management platform may actively probe the external IP address by sending a query that is intended to elicit a response. Any responses generated in response to the query are described by the active sensing data.
  • the security management platform can pull active sensing data to see if a particular service has been observed running on the port associated with the external IP address. Said another way, the security management platform can generate a query intended to act as a real-time confirmation as to whether a particular service is present at the external IP address.
  • the security management platform can pull active sensing data to see if an internal IP address has any vulnerable services running on it.
  • the third risk filter is similar to the first risk filter, though the focus is on the internal IP address rather than the external IP address.
  • the security management platform can optionally generate alerts based on whether traffic appears to be inbound or outbound from the internal IP address. Outbound traffic is generally riskier because it implies that an action is being taken by the vulnerable service, thereby indicating potential compromise of the corresponding computing device.
  • the security management platform can examine historical netflow from all parts of the local network under examination. For example, the security management platform may examine histograms of flow activity to and from each internal IP address, and then generate a threshold based at least in part on the histograms. Generally, the threshold corresponds to the amount of traffic typically traversing the local network. By implementing thresholds, the security management platform can readily discover when an internal IP address is transmitting/receiving much larger traffic volumes than usual. A threshold may be automatically tuned based on other signals, such as the total traffic volume within the internal network, the number of computing devices on the internal network, the time of day, the day of week, etc.
  • the security management platform can compare the external IP address to a set of “bad” external IP addresses that are known to be risky or vulnerable.
  • the set can come from a variety of sources, including threat intelligence that is publicly posted (e.g., by the Federal Government of the United States) or disclosed by organizations, as well as from other sources such as honeypot servers maintained by the security management platform.
  • FIG. 1 depicts an example of a network arrangement in which multiple computing devices (also referred to as “nodes”) communicate via a computer network.
  • nodes also referred to as “nodes”
  • FIG. 2 illustrates the concept of netflow data through the use of a mailbox metaphor.
  • FIG. 3 is a diagrammatic representation of a local network that illustrates how organizations have conventionally used netflow data.
  • FIG. 4 illustrates how multiple data streams can be fused into a single unified workflow.
  • FIG. 5 illustrates a network environment that includes multiple scanners that are deployed on a computer network.
  • FIG. 6 illustrates a network environment that includes a honeypot server that may be employed as part of a security management platform designed to protect an internal network.
  • FIG. 7 illustrates how risk filters can be applied to communications between an internal IP address (also referred to as a “customer IP address” or an “organization IP address”) and an external IP address.
  • an internal IP address also referred to as a “customer IP address” or an “organization IP address”
  • an external IP address also referred to as a “customer IP address” or an “organization IP address”.
  • FIG. 8 depicts several different types of risk filters: (1) communications with critically vulnerable IP addresses; (2) communications with IP addresses having a known bad reputation; (3) communications with new or ephemeral services; and (4) new traffic from non-outbound gateways.
  • FIG. 9 illustrates a scenario in which an external IP address is communicating with an internal IP address running a critically vulnerable service (e.g., Telnet).
  • a critically vulnerable service e.g., Telnet
  • FIG. 10 illustrates a scenario in which an internal IP address is communicating with an external IP address having a known reputation.
  • FIG. 11 illustrates a scenario in which an internal IP address is communicating with an external IP address that is running a new or ephemeral service but has not been blacklisted.
  • FIG. 12 illustrates a scenario in which an internal IP address that was previously silent for an extended duration (e.g., several days, weeks, or months) has begun communicating with an external IP address.
  • an extended duration e.g., several days, weeks, or months
  • FIG. 13 depicts a report that includes records that satisfy one or more filters.
  • FIG. 14 illustrates how additional information on a record can be provided if a user (e.g., a network administrator) selects the record.
  • a user e.g., a network administrator
  • FIG. 15 illustrates how each flow involving an internal IP address belonging to an organization can be modeled as a transmission of data packets to, or the receipt of data packets from, an external IP address.
  • FIG. 16 illustrates how individual certificates, domains, or notes associated with a record can be readily explored by a user.
  • FIG. 17 illustrates an example of a tool tip that could be shown within a filter report.
  • FIG. 18 depicts portions of a security guide that summarizes various features of the security management platform.
  • FIG. 19 includes a series of tags that label different segments of the security guide.
  • FIG. 20 is a block diagram illustrating an example of a security management platform configured to detect security events by examining netflow data acquired from one or more sources.
  • FIG. 21 is a block diagram illustrating an example of a security management platform.
  • FIG. 22 is a block diagram illustrating an example of an internal network (also referred to as an “entity network,” “organization network,” or “customer network”).
  • an internal network also referred to as an “entity network,” “organization network,” or “customer network”.
  • FIG. 23 is a block diagram illustrating an example of an Internet service provider (ISP) fabric.
  • ISP Internet service provider
  • FIG. 24 depicts a flow diagram of a process for detecting a security event involving a computing device.
  • FIG. 25 depicts a flow diagram of a process for actively probing a computing device that resides on a computer network under examination.
  • FIG. 26 depicts a flow diagram of a process for constructing a list of computing devices similar to a computing device that has experienced, or otherwise been involved in, a security event.
  • FIG. 27 depicts a flow diagram of a process for determining whether a computing device is part of a botnet.
  • FIG. 28 depicts a flow diagram of a process for determining whether a computing device has been involved in a Domain Name Servers (DNS) tunneling event.
  • DNS Domain Name Servers
  • FIG. 29 is a block diagram illustrating an example of a processing system in which at least some operations described herein can be implemented.
  • FIG. 1 depicts an example of a network arrangement 100 in which multiple computing devices (also referred to as “nodes”) communicate via a computer network 108 .
  • the nodes couple an originating device 102 (e.g., a desktop computer) to a recipient device 106 (e.g., a computer server).
  • the nodes allow data packets to be transmitted between the originating device 102 and the recipient device 106 .
  • Examples of nodes include switches (e.g., switches 104 a , 104 d ), routers (e.g., routers 104 b , 104 c ), etc.
  • Each node represents a possible entry point into the computer network 108 .
  • the entry points could be, and often are, from different points within the computer network 108 .
  • One technique for managing the threat of malicious actions involves actively monitoring traffic flows traversing a computer network. This technique may also be referred to as “netflow monitoring.”
  • FIG. 2 illustrates the concept of netflow data through the use of a mailbox metaphor.
  • the deliverer here, United States Postal Service
  • the deliverer will be able to readily establish who sent the envelope, who the intended recipient is, when the envelope was sent, how heavy the envelope is, the response cadence, etc.
  • some information will not be apparent to the deliverer.
  • One example of such information is the contents of the envelope.
  • the deliverer will also be unaware of any envelopes delivered by another deliverer (e.g., FedEx, UPS, or DHL).
  • netflow data In the context of data packets, similar information can be derived from netflow data.
  • a mechanism that monitors netflow data can readily establish who sent a data packet (i.e., the source), who will receive the data packet (i.e., the destination), when the data packet was sent, how large the payload is, the response cadence, etc.
  • a holistic view of traffic flows traversing a computer network can be established. For example, an administrator may be able to observe where traffic is coming from, where traffic is going to, how much traffic is being generated, etc.
  • FIG. 3 is a diagrammatic representation of a local network 300 that illustrates how organizations have conventionally used netflow data.
  • IP Internet Protocol
  • an organization will monitor the traffic flows at all public-facing Internet Protocol (IP) addresses the organization owns or controls by putting flow collectors on these perimeter nodes 302 a - c .
  • IP Internet Protocol
  • the flow collectors can readily detect irregular volumes of traffic through these perimeter nodes.
  • the flow collectors can readily stop traffic flows destined for certain recipients (e.g., recipients in foreign countries) before the data packets leave the local network 300 .
  • a security management platform configured to identify, assess, and monitor organizational vulnerability to security threats.
  • a security management platform can identify security threats that would otherwise go undetected.
  • a security management platform may be configured to identify security threats to a local network (also referred to as an “internal network”) associated with an organization.
  • the security management platform can instead monitor global traffic traversing the Internet and then filter the global traffic to identify traffic originating from the internal network, traffic destined for the internal network, or any combination thereof.
  • Some embodiments of the technology described herein concern scanners (also referred to as “scanning mechanisms”) that can be deployed on one or more computer networks, as well as a repository that includes data returned by these scanner mechanisms. If a security management platform is configured to identify security threats to a local network, then a scanner can be deployed on the local network and/or the Internet.
  • a scanner may comprise a distributed system capable of sending a wide variety of data packets to the public-facing IP addresses of a computer network under examination in an effort to provoke a response. In some embodiments the scanner sends data packets to all public-facing IP addresses of the computer network, while in other embodiments the scanner sends data packets to some public-facing IP addresses of the computer network.
  • IPv4 provides 2 32 (approximately 4.3 ⁇ 10 9 ) addresses while IPv6 provides 2 128 (approximately 3.4 ⁇ 10 38 ) addresses.
  • IPv6 provides 2 128 (approximately 3.4 ⁇ 10 38 ) addresses.
  • a scanner could be configured to send all sorts of different signals to the computing device(s) that reside in the computer network under examination.
  • Embodiments may be described with reference to particular network configurations, protocols, networks, etc. However, those skilled in the art will recognize that these features are equally applicable to other network configurations, protocol types, network types, etc. For example, while certain embodiments may be described in the context of the Internet, the relevant feature(s) may be used in conjunction with other types of computer networks (e.g., internal networks associated with organizations).
  • embodiments may include a machine-readable medium having instructions that may be used to program a computing device to perform a process for collecting netflow data for a computer network, fusing the netflow data together with other information to create a holistic view of the network infrastructure, identifying vulnerabilities in the network infrastructure, assessing threats to the computer network, remediating the threats, etc.
  • references in this description to “an embodiment” or “one embodiment” means that the particular feature, function, structure, or characteristic being described is included in at least one embodiment. Occurrences of such phrases do not necessarily refer to the same embodiment, nor are they necessarily referring to alternative embodiments that are mutually exclusive of one another.
  • the words “comprise” and “comprising” are to be construed in an inclusive sense rather than an exclusive or exhaustive sense (i.e., in the sense of “including but not limited to”).
  • the terms “connected,” “coupled,” or any variant thereof is intended to include any connection or coupling between two or more elements, either direct or indirect.
  • the coupling/connection can be physical, logical, or a combination thereof.
  • devices may be electrically or communicatively coupled to one another despite not sharing a physical connection.
  • module refers broadly to software components, hardware components, and/or firmware components. Modules are typically functional components that can generate useful data or other output(s) based on specified input(s). A module may be self-contained.
  • a computer program may include one or more modules. Thus, a computer program may include multiple modules responsible for completing different tasks or a single module responsible for completing all tasks.
  • One benefit of the technology described herein is its ability to predictively identify and deny vectors of attack against the digital assets (also referred to as “cyber assets”) of an organization.
  • Data from multiple sources can be intelligently fused together to create a unified workflow.
  • FIG. 4 for example, three unclassified Internet-scale data streams 402 a - c have been fused into a single unified workflow 404 .
  • the unified workflow 404 can be acquired by a threat detection module 406 .
  • the threat detection module 406 can collect, structure, index, fuse, and present knowledge gained from the unified workflow 404 to one or more administrators associated with the organization on corresponding computing devices 408 a - b .
  • outputs generated by the threat detection module 406 may be accessible to each administrator via a computer program, such as a web browser, desktop application, mobile application, or over-the-top (OTT) application.
  • the computer program is available through a software as a service (SaaS) licensing/delivery model.
  • the data streams 402 a - c may include various types of data, including:
  • one objective of the technology is to fuse data received from multiple sources into a unified workflow 404 .
  • three unclassified Internet-scale data streams 402 a - c are fused together.
  • Each unclassified data stream 402 a - c could correspond, for example, to network map data, netflow data, and user agent data.
  • the threat detection module 406 can predictively identify and deny vectors of attack against cyber assets belonging to an organization.
  • threat detection module 406 can filter the unified workflow 404 to permit high-signal triage of known/emergent vulnerabilities of organization assets.
  • One or more scanners can be configured to generate/retrieve the unclassified data streams 402 a - c .
  • the threat detection module 406 and the scanner(s) may be referred to as a “security management platform.”
  • the security management platform may include other components as well.
  • the security management platform may be extensible across the entire Internet.
  • the security management platform may be configured to continually interrogate Internet-connected computing devices and services to determine the status of each.
  • the security management platform can store data associated with these interrogations, and then analyze the data to monitor the status of each Internet-connected computing device and service over long periods of time (e.g., months, years, or indefinitely).
  • Network map data could be used for vulnerability minimization
  • additional contextual knowledge may be needed to extrapolate the intent of communications and assess the vulnerabilities of assets functioning as application-layer clients behind hardened edge nodes (e.g., computer servers).
  • Netflow data and user agent data can further enhance the security management platform's abilities in these respects, thereby accelerating cyber network defense.
  • the security management platform can provide network defenders (e.g., third-party services and administrators of organizations) with unprecedented visibility into the nature of communications between cyber assets and the outside world, rather than the content of these communications.
  • Enhanced visibility may be used for critical functions such as identifying indicators of attack, blacklisting adversary infrastructure, forming predictive models of attacker reconnaissance, etc.
  • FIG. 5 illustrates a network environment 500 that includes multiple scanners 502 a - c that are deployed on a computer network 504 .
  • the computer network 504 may be, for example, the Internet or a local network associated with an organization (also referred to as an “internal network”).
  • Data received by the scanners 502 a - c can be transmitted to a security management platform 506 that includes a threat detection module 508 and a repository 510 .
  • the threat detection module 508 can be configured to examine at least some of the data returned by the scanners 502 a - c
  • the repository 510 can be configured to store at least some of the data returned by the scanners 502 a - c .
  • the scanners 502 a - c may also be considered part of the security management platform 506 .
  • Each scanner can be configured to send a wide variety of different kinds of data packets to some or all public-facing IP addresses of the computer network 504 under examination. These data packets can be sent by a scanner in accordance with IPv4 and/or IPv6. Thus, a scanner could be configured to send all sorts of different signals to computing device(s) that reside within the computer network 504 under examination.
  • the security management platform 506 can record any responses that are returned.
  • the security management platform 506 may cause a scanner (e.g., Scanner A 502 a ) to send an HTTP GET request to a certain IP address that may ask whether a web page is hosted on the corresponding service and, if so, to return a copy of the main page.
  • a scanner e.g., Scanner A 502 a
  • Embodiments of the security management platform 506 can perform such actions on a large scale.
  • the scanners 502 a - c could send HTTP GET requests across the entire computer network 504 (e.g., approximately 4.3 billion times across the entire IPv4 space). These requests can be submitted using a variety of different payloads for a variety of different protocols since there are many different services that can respond to such requests.
  • FTP File Transfer Protocol
  • SSH Secure Shell
  • the security management platform 506 can take information learned from any returned responses and, together with data from other sources, fuse the information together to create a view of how infrastructure on the Internet is linked to different organizations. Such action enables the security management platform to better understand the status or vulnerability of each organization based on its corresponding infrastructure. In some cases, there is a lot of nuance in detecting vulnerabilities of an infrastructure. For example, observing a login prompt over a Telnet service on a specific IP belonging to a given organization indicates a vulnerability in the infrastructure for that organization, as any user attempting to sign in to the service must send credentials in clear text, enabling a network attacker to see those credentials and use them for potentially nefarious purposes.
  • a vulnerability may be identified merely because the infrastructure is not designed to face the public (i.e., is not designed with security in mind), and therefore can be easily exploited.
  • some protocols for industrial control systems e.g., BACnet or Modbus
  • BACnet or Modbus are on the Internet that, in many cases, actually predate most of the Internet.
  • These protocols are not designed with network security in mind. Instead, these protocols provide easy, raw access to the underlying control system without requiring any authentication. Therefore, these protocols are, by their nature in terms of the protocols themselves as well as the computer software responsible for implementation, inherently insecure if made publicly accessible on the Internet, and thus can become vulnerable to all sorts of malfeasance by bad actors.
  • Some embodiments of the security management platform 506 are configured to find parts of infrastructure for organizations and their digital assets. Such action allows identification of digital assets that are not only risky, but also digital assets that an organization is not aware of. Thus, the security management platform 506 can provide a unified review of traffic traversing the computer network 504 to identify all items in a certain asset category that belong to an organization, and then provide a rank order of these items based on status and/or risk in a generalized sense.
  • the security management platform 506 may accomplish this using primary signals that include a variety of different public registration databases, as well as analytics and/or public signals available on the Internet.
  • the security management platform 506 includes a control module (not shown) that supports a visibility product (also referred to as a “visibility service”).
  • the visibility product can tell an organization things that it doesn't know with regard to vulnerabilities, alert the organization in real time as these vulnerabilities are discovered, etc.
  • Some embodiments of the security management platform 506 include connectors (not shown) that close a control loop to provide faster responses and near real-time value delivery if there is something in an organization's local network that is a risk, such as a virus, corrupted file, or raw access point. Generally, these connectors close the control loop automatically or near automatically. However, these connectors may also be configured to only close the control loop upon receiving manual input from an administrator. The administrator may be associated with the organization or a third-party security service responsible for managing the security management platform 506 . Accordingly, embodiments of the security management platform 506 can concern improving visibility into a computer network and addressing how actions can be taken to control discovered vulnerabilities. For example, if a vulnerability is automatically discovered in a computing device that resides on a local network, a policy may say that the computing device should be shut down.
  • Such action enables the security management platform 506 to generate a holistic picture of the organization's digital assets from the outside looking in. This picture often encompasses items that the organization never knew about. For example, digital assets may enter the organization's network boundary that the organization is completely unaware of and/or that are not under the organization's control. Digital assets may also leave the organization's network boundary because of some action performed by the organization. By monitoring digital assets associated with the organization, changes in the network boundary can be readily identified. Changes that have a particular consequence for the organization may be flagged in some manner (e.g., an alert may be posted to an interface for review by an administrator). Moreover, changes may drive a feedback loop that causes some remediation action (whose occurrence may be verified) to be performed. The remediation action may cause the organization's network boundary to shrink or otherwise be improved in some way.
  • embodiments of the security management platform 506 can not only see the organization's network boundary, but also what is moving through the organization's network boundary by combining knowledge derived from databases of network traffic information with knowledge regarding the owners of the source, destination, and/or path that the network traffic takes. These observations of network traffic passing through a given organization's network boundary can be called “flux.”
  • the network boundary may be defined in such a manner to give the organization information about how the network boundary changes, as well as to see the flux through the network boundary.
  • the security management platform 506 may also associate the flux with consequences (e.g., the flux is talking to a command-and-control system of a botnet, the flux is talking to some computing device within the network boundary that shouldn't be communicating, etc.).
  • the security management platform 506 cooperates via partnerships with Internet service providers (ISPs) and other network service providers that record data/metadata regarding what is passing over their services. Additionally or alternatively, the security management platform 506 may partner with organizations that record data/metadata regarding what is passing across their monitored network boundary. Accordingly, the security management platform 506 may observe IP addresses that are “talking” to other IP addresses. The security management platform 506 may also receive information such as the ports and protocols these IP addresses are using, whether communication is occurring in accordance with Transmission Control Protocol (TCP) or User Datagram Protocol (UDP), whether the communication is a virtual private network (VPN) transaction using a protocol such as Internet Protocol security (IPSec), etc.
  • TCP Transmission Control Protocol
  • UDP User Datagram Protocol
  • VPN virtual private network
  • IPSec Internet Protocol security
  • the security management platform 506 can intelligently determine which data to process so that security-related actions are more relevant.
  • the security management platform 506 defines network boundaries for certain organizations (e.g., current and/or prospective customers of a security service facilitated by the security management platform 506 ). In such embodiments, the security management platform 506 can draw down netflow and query the netflow for different time ranges (e.g., the last week, month, etc.). Such action enables the security management platform 506 to understand who these IP addresses are talking to, and then correlate those IP addresses with what the security management platform 506 already knows about them. Because the security management platform 506 is not instrumented only to on the perimeter of the network but rather the global internet, analysis isn't limited to a single hop, unlike conventional netflow security products. Moreover, the security management platform 506 can not only see traffic that is coming in and out of an internal network associated with an organization, but also traffic between IP addresses for which neither are part of the organization's network.
  • the security management platform 506 can follow the traffic past those proxy node(s) to identify the actual source. For example, if IP address 1.1.1.1 (owned by an organization) talks to IP address 2.2.2.2 and then IP address 2.2.2.2 talks to IP address 3.3.3.3, the security management platform 506 may infer that these two separate communications were actually a single communication between IP address 1.1.1.1 and IP address 3.3.3.3, even though no direct communication occurred between these nodes, and no system looking only at traffic from the organizations network boundary could infer the connection with 3.3.3.3.
  • the security management platform 506 may infer that IP address 2.2.2.2 was simply acting as a proxy (also referred to as a “routing conduit”).
  • the security management platform 506 is configured to perform such analysis to detect any number of hops between any number of intermediate routing conduits (e.g., if IP address 3.3.3.3 talks to IP address 4.4.4.4, IP address 4.4.4.4 talks to IP address 5.5.5.5, and so on).
  • the security management platform 506 can observe more than conventional netflow security products by performing “n”-hop analysis.
  • a security management platform 506 can collect different types of data on the Internet, regardless of whether it is at the IP address level, certificate level, or domain name level. For IP addresses in particular, the security management platform 506 can collect quite a bit of information that can subsequently be associated with the appropriate IP address(es). For example, the security management platform 506 may query an IP address to discover what service(s) are running on the corresponding computing device and on what port(s) those service(s) are available. Moreover, the security management platform 506 may discover what service(s) used to be running on the computing device and on what port(s) those service(s) were available.
  • the security management platform 506 will also have a sense of who owns and/or is responsible for managing an IP address under review. In general, the security management platform 506 can use its sense of how IP addresses are used on the Internet for routing to a unique address much like an individual could send an envelope via the post office.
  • the security management platform 506 can then evaluate the risk of a communication entering or exiting an internal network based on which internal IP address is involved (i.e., who the communication is talking to on the internal network), as well as which external IP address is involved (i.e., who the communication is talking to on an external network, such as the Internet). For example, the security management platform 506 may determine whether the external IP address looks particularly vulnerable to takeover, is running a vulnerable service, appears to have a good way for a bad actor to take over for use as a proxy to talk to the internal network, etc.
  • An internal IP address also referred to as an “organization IP address” or a “customer IP address”
  • An external IP address on which there is a critically vulnerable service running.
  • Items such as Telnet, MySQL, self-signed certifications on an HTTPS service, etc., allow the security management platform 506 to get a sense of not only which external IP address(es) an internal IP address is talking to, but also why these external IP address(es) might be at risk.
  • the security management platform 506 may also determine why the external IP address(es) might be vulnerable to use as a proxy in an attack against an internal network that includes the internal IP address.
  • the security management platform 506 can also do interesting things with new or ephemeral services. These are services are defined as those that are recently stood up at a given IP address, and stood up for a short period of time. An example would be an SSH server present on IP 2.2.2.2 for only 6 hours on one day, and never seen again at that IP. These services are of interest as there is rarely a legitimate use for such services to be communicating with a network, and malicious actors frequently stand up attack infrastructure on previously unused IPs to conducts attacks on networks by evading blacklists. these services, the security management platform 506 can observe that an IP address residing on a network is talking to IP address 1.2.3.4.
  • the security management platform 506 may classify this as alarming behavior.
  • the security management platform 506 may also have an excellent infrastructure that is very hard to block, so the security management platform 506 can confidently infer that if no service is determined to be running based on the active scans, that service is in fact not running on the network under consideration (e.g., an internal network or the Internet).
  • the security management platform 506 may associate the service with a potentially bad actor. For example, the potentially bad actor may have stood up the service for a malicious reason (e.g., to gain unauthorized access to digital assets in the network). The potentially malicious actor may have also stood up the service for a limited timeframe (e.g., an hour). However, if the security management platform 506 scans the network under consideration at a consistent frequency (e.g., every 2 hours, 6 hours, 12 hours, or 24 hours), then the security management platform 506 is likely to detect potential threats before any harm is caused by them.
  • a consistent frequency e.g., every 2 hours, 6 hours, 12 hours, or 24 hours
  • the security management platform 506 may not immediately catch all potential threats, the security management platform 506 will typically detect when new or ephemeral services are stood up with significant success. Moreover, if a potentially bad actor tries to be clever by standing an ephemeral service up quickly and then taking it down for an attack, the security management platform 506 can see these communications and alert the appropriate individual(s).
  • a third correlation looks at the services running on the IP address belonging to the organization involved in a communication with an external IP address. If there is something that the security management platform 506 has alerted on in the past at an internal IP address that is high risk (e.g., an exposed database service or industrial control system protocol), communicating with an external IP address is an extremely high-risk behavior. In such instances, the security management platform 506 may prompt an individual associated with the network (e.g., a network administrator) to determine whether the internal IP address should be accessible on the network. Moreover, if the security management platform 506 sees the internal IP address talking to the outside world (i.e., to one or more external IP addresses residing outside the network), the security management platform 506 can alert the individual.
  • an individual associated with the network e.g., a network administrator
  • a fourth correlation doesn't necessary correlate active sensing data with global netflow data.
  • the security management platform 506 can take advantage of the fact that even when organizations believe they are perfectly instrumented with collecting flows off their corresponding internal networks, there seem to be things that the security management platform 506 is able to observe that these organizations cannot.
  • the security management platform 506 is often able to see the most alarming flows, such as instances where large data packets are being sent back and forth in a manner indicative of data exfiltration. In theory, these organizations think that they have flow collectors instrumented on these internal IP addresses. However, some organizations' IP addresses are consistently missed or not put in properly to their enterprise network monitoring systems.
  • the security management platform 506 can see these flows when it examines communications traversing the Internet rather than instruments flow collector(s) along the perimeter of an organization's internal network. For this correlation, the security management platform 506 can look for internal IP addresses that have been silent for an extended duration (e.g., several days, weeks, or months). If an internal IP address goes from silent to communicating with an external IP address, the security management platform 506 can generate an alert that indicates the organization's IP address should undergo additional examination. Generally, such action is not reported to the Internet. There is also a high probability that no instrumentation exists on the internal IP address because the organization may not have been expecting it to communicate.
  • an extended duration e.g., several days, weeks, or months
  • the security management platform 506 can alert an individual associated with the organization so that appropriate action can be taken if the organization is aware that such communication is occurring. Such communication can be indicative of an unauthorized entity attempting to evade security measures implemented by the organization.
  • a fifth correlation can look for multiple-hop communication patterns between a list of “bad” external IP addresses (e.g., those corresponding to known malware command-and-control servers) and internal IP addresses.
  • Bad external IP addresses can be derived from a variety of public and private sources.
  • Internal IP addresses are those IP addresses that reside within a network under consideration. Generally, the network under consideration will be an enterprise network or set of enterprise networks that is associated with an organization. However, the security management platform 506 could also examine IP addresses accessible on the Internet, in which case the security management platform 506 may analyze communications between pairs of IP addresses. Given a list of bad external IP addresses, the security management platform 506 can look for other external IP addresses that are in direct communication with these bad external IP addresses.
  • the security management platform 506 can then look for communications between internal IP addresses and Set P. If any communications are discovered, the security management platform 506 can generate an alert. Next, the security management platform 506 can look for any IP address that has communicated with both an intermediary IP address in Set P and an internal IP address. Any discovered flows involving these intermediary IP addresses can be flagged for further review because these intermediary IP addresses could be acting as proxies for an attack initiated by an IP address in Set P. Such a technique can be readily extended to multiple hops.
  • Each correlation can be done on a per-flow basis. Therefore, given a flow from an internal IP address to an external IP address, the security management platform 506 can discover whether any of these correlations exist.
  • the security management platform 506 may also discover that medium-sized data packets are being sent to multiple IP addresses that are owned by the same entity. Thus, when the total payload is aggregated, the collective data conveyed by the data packets is massive. Because the security management platform 506 is able to access and/or derive information about the owner of each IP address involved in a communication, the security management platform 506 can monitor both possibilities.
  • Some embodiments of the security management platform 506 are configured for botnet tracking and/or dynamic blacklisting.
  • a botnet is a string of Internet-connected computing devices, each of which is running one or more bots configured to collectively perform a task.
  • botnets are often used to perform distributed denial-of-service (DDoS) attacks, steal data, send spam, and allow unauthorized entities to access a targeted computing device and its network connection.
  • DDoS distributed denial-of-service
  • the five correlations described above are set up to be responsive rather than proactive.
  • the security management platform 506 could also examine these risk filters as data is received from organizations (also referred to as “customers”). If a particular risk is nearly always considered bad, then the security management platform 506 may begin to be proactive with respect to the particular risk. For example, the security management platform 506 may push an appropriate instrument to the firewall on the perimeter of a network under consideration that prevents transmission of a certain type of traffic responsive to a determination that the certain type of traffic represents a significant risk to the network.
  • Some embodiments of the security management platform 506 are configured to approach dynamic blacklisting by tracking botnets through global netflow.
  • the term “global netflow” generally refers to all traffic flows traversing the Internet. This can be done on an IP address level or another level (e.g., a port level).
  • the security management platform 506 may, in real time, monitor kinetic control nodes and their communication with bots to discover which bots are part of which botnets. These mappings can be made available to organizations so that if an organization begins to see a large influx of traffic from any of these bots, the organization can shut down the appropriate IP addresses before other IP addresses are hit.
  • the security management platform 506 may preemptively blacklist the other 995 bots, which could also send large volumes of traffic as part of the DDoS attack if the responsible entity rotates which hosts are responsible for sending traffic.
  • FIG. 6 illustrates a network environment 600 that includes a honeypot server 612 that may be employed as part of a security management platform designed to protect an internal network 610 .
  • a honeypot server 612 (also referred to as a “honeypot”) is a security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems residing on the internal network 610 .
  • the honeypot server 612 includes data that appears to be a legitimate part of the internal network 610 that contains information/resources of value to attackers, but the honeypot server 612 is actually isolated and monitored so that attackers can be blocked.
  • an attacker may attempt to breach an organization's network 610 by communicating with an internal IP address via an external IP address that resides elsewhere on the Internet 602 .
  • Communications are generally received by a firewall 604 , which represents the outer perimeter of the organization network 610 .
  • the firewall 604 can be communicatively coupled to a router 606 , which may be communicatively coupled to the honeypot server 612 and a hub 608 connected to the internal network 610 .
  • the firewall 604 can be configured to deflect an incoming scanning attack 614 to the honeypot server 612 . Such action prevents the scanning attack 614 from breaching the organization network 610 and discovering digital assets of value.
  • Botnets tend to scan for vulnerable IP addresses. Accordingly, the security management platforms described herein may periodically perform random scans throughout the Internet. In such embodiments, honeypot servers can be placed on IP addresses throughout the Internet, and the security management platform can simply wait for individuals to scan these IP addresses by pulling netflow off the IP addresses. Said another way, the security management platform may parse global netflow to identify traffic involving the IP addresses corresponding to the honeypot servers. These IP addresses may belong to organizations that knowingly agree to such action, as well as entities (e.g., third-party security services) that the organizations interact with. Often, the security management platform is looking for a sense of similarity where it can find commands coming from command-and-control infrastructure to the object responsible for scanning at least one IP address associated with a honeypot server.
  • Example inquiries include discovering who instructed the botnet to scan the at least one IP address, when the scan occurred, who else the botnet is talking to, etc.
  • the security management platform can immediately pull netflow corresponding to the bot (e.g., by identifying Internet communications involving the IP address of the bot).
  • Such action allows the security management platform to see every other object the bot is talking to.
  • the vast majority of these objects are usually other IP addresses that are being scanned.
  • the security management platform may try to find those key communications between a bot and a command-and-control center, which could correspond to a single IP address or multiple IP addresses.
  • the command-and-control center will often be distributed.
  • the security management platform can discover these characteristics of a botnet, as well as validate which computing device(s) the botnet is talking to at any given point in time. While some noise must be consistently removed, the security management platform can look for patterns of similarity between the way these potential new bots are scanning IP addresses associated with an organization and the way confirmed bots previously scanned these and other IP addresses. Several different pattern features can be examined, including the timing of scans, the external port(s) being scanned, what is being scanned, how these bots are behaving, etc. Any sort of similarity may increase confidence that a botnet (and, in some cases, a known botnet) is responsible.
  • the security management platform can monitor which bot(s) are communicating with the command-and-control infrastructure. This allows the security management platform to build a dynamic blacklist of bots that are associated with the command-and-control infrastructure. More specifically, the security management platform can maintain a list of command-and-control nodes and/or a list of bots. These lists may be associated with different confidence levels (e.g., the security management platform may have high confidence in the accuracy of the list of command-and-control nodes and lower confidence in the accuracy of the list of bots). Thus, for all IP addresses owned by one or more organizations, the security management platform can find interceptions for every command-and-control infrastructure being monitored.
  • the organization(s) may represent some or all of the organizations whose internal networks are being monitored by the security management platform. If the security management platform discovers that an external IP address associated with a command-and-control node and an IP address associated with an organization are communicating with the same object, the security management platform may alert the organization.
  • IP addresses there are also other ways to acquire IP addresses that are associated with command-and-control centers.
  • One key feature present in some embodiments is integration, where there are other lists that have been populated by individuals who have indicated that an IP address might be associated with a command-and-control center but the IP address does not usually talk to internal networks directly. Rather, the IP address may communicate with an organization's network through one or more compromised hosts. Attackers will typically be completely unaware that the security management platform has this type of visibility into communications.
  • the security management platform has a list of IP addresses associated with a command-and-control center, the security management platform can readily determine if an organization is talking to object that is likely compromised and is itself communicating with an attacker.
  • the security management platform can also chain multiple instances together for a higher-order analysis of communications (e.g., of second hop, third hop, etc.).
  • Some embodiments of the security management platform also include a risk filter.
  • a risk filter For example, the Federal Government of the United States recently released a list of Hidden Cobra IP addresses that are associated with North Korea. All of these IP addresses can be put into a risk filter. Then, if the security management platform sees an organization talking to an external IP address on the list, the security management platform can estimate a sense of risk with the external IP address. The security management platform may alert the organization if the sense of risk exceeds a certain threshold.
  • a command-and-control center In a botnet attack, a command-and-control center generally relays orders to multiple bots that specify how these bots should scan IP address(es) of interest. For example, the command-and-control center may order a first bot and a second bot to scan a given IP address at some future point in time. The first and second bots may remain silent until then. Before these bots attack (e.g., via some sort of denial-of-service (DoS) attack), the commend-and-control center sends instructions to each bot indicating that it is time to attack.
  • DoS denial-of-service
  • the security management platform can observe different elements of this approach. For example, the security management platform may detect that an external IP address will be part of an attack before the attack actually occurs and automatically blacklist the external IP address.
  • Some remediation actions may be manually performed.
  • an individual e.g., a network administrator
  • Some actions performed by the security management platform may be manually prompted while others are automatically initiated (e.g., a provisioning module may periodically update infrastructure by distributing certificates across an organization's network).
  • a provisioning module may periodically update infrastructure by distributing certificates across an organization's network. For example, an object could be reimaged if the flow directed to/from the corresponding IP address was suspicious.
  • a local network could be segmented from the Internet based on risk.
  • a subset of a local network could be segmented from other parts of the local based on risk.
  • IP address could also be pushed organization-wide across a firewall to make sure that no computing devices managed by the organization are able to communicate with the IP address.
  • a log of IP address(es) associated with high risk is maintained by the security management platform.
  • Part of the feedback loop employed by the security management platform could be implemented via a ticketing system.
  • the ticketing system can be configured to generate an action ticket that is picked up and used by the security management platform to improve future actions.
  • the action ticket may spawn some other action that ultimately results in feedback indicating that the original action is closed.
  • these action tickets could be used to validate, for example, that a change actually occurred.
  • Some embodiments of the security management platform also provide continuous monitoring on an ongoing basis and generate alerts upon observing a progression in consistent changes.
  • Some remedial actions might be entirely internal (i.e., performed only on the IP addresses and/or computing devices residing on an organization's network).
  • remedial actions might involve interactions with other organizations (e.g., when a domain name is changed, an IP address is updated, etc.). Said another way, some remedial actions may require that the security management platform interact with a third party or facilitate an interaction between an organization and a third party. Thereafter, the security management platform can validate the feedback loop.
  • the first step may be for a security management platform to identify vulnerabilities in an internal network. Then, once the vulnerabilities have been identified, the security management platform can take the action(s) necessary to remediate these threats. Any number of actions could be performed. For example, the security management platform may automatically generate a blacklist by capturing a log of risky IP addresses. The blacklist could then be applied in accordance with a specific policy inside the organization. Thus, the security management platform may observe communications in real time, and these observations can drive the creation and/or augmentation of a blacklist.
  • the security management platform will send out a signal to one or more IP addresses.
  • the security management platform can then examine any responses that are received from these IP address(es).
  • Each response will typically include data and metadata that allows the security management platform to infer information about the source (e.g., the corresponding computing device), computer software running on the source, organizational associations, vulnerabilities, and/or misconfigurations. This information can then be fused together with additional data to gain a better understanding of the communications involving these IP address(es).
  • a security product In conventional flow analysis, a security product would monitor netflow across the perimeter of an internal network associated with an organization and draw simple conclusions regarding security of the organization. For example, if data packets were transmitted to an IP address located in China or Russia, then a security product is likely to determine that a high security risk exists. However, such action is not enough to discover more advanced security threats.
  • a security management platform can address the drawbacks of conventional security products. More specifically, the security management platforms described herein can examine large amounts of fine-grain details regarding communications traversing a network (e.g., a local network or the Internet), and then perform remediation action(s), as necessary, in real time as security threats are identified.
  • the security management platform can also fuse data from different sources together in a manner that allows corrective actions to be more rapidly taken (e.g., before the security threat matures into an issue).
  • the security management platform can discover the assets (e.g., IP addresses) belonging to an organization across the entire Internet. After these assets have been identified, the security management platform can look for flows emanating from (or directed to) the assets on the boundary on a network associated with the organization. Said another way, the security management platform can examine traffic entering the Internet from the organization's network, or vice versa, even if the network has not been explicitly instrumented by the organization, and even if the organization itself was not aware or tracking that network in their other enterprise systems. The security management platform may do this by actively scanning IP addresses accessible on the Internet. In some embodiments, the security management platform also has access to information that allows it to join these communications (e.g., by sending signals to the IP addresses and parsing responses received in return).
  • assets e.g., IP addresses
  • the security management platform can look for flows emanating from (or directed to) the assets on the boundary on a network associated with the organization. Said another way, the security management platform can examine traffic entering the Internet from the organization's network, or vice vers
  • the security management platform can examine the IP address at which a communication is received, as well as additional information about any other IP addresses involved in the exchange of data packets. As noted above, the security management platform can also establish the bounds of an internal network with high confidence.
  • the security management platform can act in a similar fashion with respect to communications traversing the Internet. In general, most organizations use instruments on IP addresses along the perimeter of their internal networks. Such a design is good at several things, including detecting irregular volumes of traffic and stopping direct flows to certain locations (e.g., foreign countries). However, this design will often miss some communications. Because the security management platform observes traffic on the Internet, the security management platform is able to see all communications to/from an organization, regardless of whether the organization is aware of these communications.
  • the security management platform can consider three items: (1) details on flow; (2) details on the internal IP address; and (3) details on the external IP address. If the security management platform determines that communication poses a risk to the internal network on which the internal IP address resides, then the security management platform can communicate the risk to the organization associated with organization network. The communication may provide context regarding the internal IP address and/or external IP address, a sense of appropriate remediation action(s), etc.
  • Information regarding the internal IP address and/or the external IP address can be derived by a global scanning infrastructure that includes one or more scanners (e.g., scanners 502 a - c of FIG. 5 ).
  • the global scanning infrastructure can examine the type of computing device corresponding to each IP address, who the computing device belongs to, other risk factors, etc. For example, if the security management platform discovers that the internal IP address corresponds to a Telnet computer server, then the security management platform can enrich the corresponding information by specifying that the internal IP address should not be publicly exposed on the Internet. Such action may be referred to as “tagging” data to specify additional details that are useful in determining risk. Some of these additional details can be discerned by simply knowing the internal IP address. The security management platform can integrate these additional details with information gleaned by active scans and other databases, and then apply analytics to determine how strong the association is in a statistical sense.
  • each risk filter requires that a first IP address be communicating with a second IP address.
  • internal IP addresses are those IP addresses residing within the boundary of an organization network associated with an organization, while external IP addresses are those IP addresses residing outside of the boundary of the internal network.
  • the security management platform can filter global netflow (e.g., all Internet traffic) down to flows that involve internal IP addresses. That is, the security management platform can filter the global network down to flows that have an internal IP address as either the source or destination.
  • the security management platform can pull active sensing data to see if the external IP address has any exceptionally vulnerable services running on it.
  • This can include a set of insecure-by-design protocols, as well as easily and/or commonly exploited services. Examples of vulnerable services include:
  • the security management platform can pull active sensing data to see if an active service or an open port has been observed running on the port associated with the external IP address of a given flow record.
  • the second risk filter may be tunable, with a parameter specifying how far into the past the security management platform looks (e.g., 1 hour, 1 day, 6 days, 2 months, etc.) for services that have responded to active sensing.
  • the security management platform can optionally determine to perform an active scan of the external IP address on the corresponding port found in the flow record to get a higher assurance. Said another way, the security management platform can send a signal intended to provoke a response to the external IP address as a real-time confirmation as to whether a service is present at the external IP address.
  • the security management platform can take the same set of vulnerable services as described above with respect to the first risk filter and apply these to the internal IP address of the flow record rather than the external IP address.
  • the security management platform can optionally generate alerts based on whether traffic appears to be inbound or outbound from the internal IP address. Outbound traffic is generally riskier because it implies that an action is being taken by the vulnerable service, thereby indicating potential compromise of the corresponding computing device.
  • the security management platform can also generate alerts based on whether communication appears to be bidirectional (e.g., the security management platform can check for the presence of an acknowledgment (ACK) in the case of TCP, or multiple bidirectional flow records in the case of UDP). Bidirectional communication is generally riskier than unidirectional communication where the security management platform only observes synchronize messages (SYNs).
  • the security management platform can examine historical netflow from all parts of an organization's network. For example, the security management platform can look at a variety of histograms of flow activity to and from each internal IP address and block of internal IP addresses (e.g., those corresponding to certain divisions within the organization).
  • the security management platform may have tunable triggers for data volume and communication frequency, among other features. These tunable triggers allow the security management platform to readily set thresholds that allow organizations to be alerted if, for example, a block including 24 internal IP addresses has had no communications for the past 30 days and then suddenly begins sending 50 megabytes (MB) of outbound traffic per day. In some embodiments, thresholds are fixed.
  • a threshold may be manually set at 25 MB, 50 MB, 100 MB, etc. In other embodiments, thresholds are variable. For example, a threshold may be configured to automatically tune itself over time based on other signals, such as the total traffic volume within the internal network, the number of computing devices on the internal network, the time of day, the day of week, etc.
  • Set P of known “bad” external IP addresses can come from a variety of sources, including threat intelligence that is publicly posted (e.g., by the Federal Government of the United States) or disclosed by organizations, as well as from other sources such as honeypot servers maintained by the security management platform.
  • the security management platform can filter global netflow and generate alerts for those flow records corresponding to communications directly between these “bad” external IP addresses and internal IP addresses belonging to an organization under examination.
  • the security management platform may also filter global netflow and generate alerts for those external IP addresses that communicate with both “bad” external IP addresses and internal IP addresses.
  • Set P is associated with a specific time window (e.g., those external IP addresses in the set may only be deemed “bad” for a certain period of time).
  • “bad” external IP addresses may not necessarily be associated with botnets.
  • the “bad” external IP addresses may be organization-specific. For example, for a financial company based in the United States, the “bad” external IP addresses could include any IP addresses associated with foreign corporations designated by the Office of Foreign Assets Control (OFAC). As another example, for computing devices operated by the Federal Government of the United States, the “bad” external IP addresses could include any IP addresses associated with Kaspersky Labs. Thus, Set P could vary on a per-organization bases.
  • netflow is received directly from ISPs, while in other embodiments netflow is received directly from the organizations themselves.
  • netflow may include traffic collected by flow collector(s) arranged along the perimeter of an internal network by the organization. The technology can operate the same even if organizations provide their own flows in addition to flows provided by the ISPs. In such embodiments, the security management platform can simply treat the excess traffic as additional netflow to be considered (e.g., the security management platform may not assign a higher priority to flows from a particular source).
  • each risk filter can be applied to communications between an internal IP address (also referred to as a “customer IP address” or an “organization IP address”) and an external IP address.
  • an internal IP address also referred to as a “customer IP address” or an “organization IP address”
  • an external IP address is depicted as an “E” endpoint.
  • Details regarding the flow between these endpoints is typically derived from global netflow (e.g., by collecting, filtering, and examining traffic on the Internet). These details could also be derived from flow coming off the internal network associated with an organization on which the internal IP address resides.
  • a security management platform will typically reside outside of the organization network to gain a better understanding of all flows related to the organization. However, to gain a complete picture of risk, the security management platform may examine all flows related to the organization that traverse the internal network. In such embodiments, the security management platform can compare flows detected in the global netflow to flows detected in the netflow through the perimeter of the organization network.
  • the security management platform may also have details regarding the destinations of communications leaving the organization network (e.g., leaving each internal IP address) and the objects residing outside of the internal network. For example, the security management platform may discover the presence of these via an active sensing procedure in which a signal is directed to each object with the intent of provoking a response from which information about the corresponding object can be learned. Accordingly, the security management platform can understand whether the internal IP address is communicating with an external IP address, what type of computing device is associated with the external IP address, whether the external IP address is associated with a malicious entity, etc.
  • DMZ demilitarized zone
  • a DMZ is a physical or logical subnetwork that contains/exposes an organization's external-facing services to an untrusted network, such as the Internet.
  • Internal network architecture typically cannot be understood from global netflow because it sits behind a firewall.
  • an organization will often be aware of the most vulnerable points in its internal network, so the organization may work with the security management platform to identify whether any of the internal IP addresses at risk fall within the DMZ.
  • a security management platform may notify an organization that a threat exists even through the organization previously discounted the risk because it did not have full information regarding the threat. Because the security management platform can observe both internal and external IP addresses, the security management platform can recommend that the organization inspect those internal IP addresses that may be used to gain unauthorized entry into the internal network.
  • the security management platform may also determine whether any patterns exist by examining the results of analyzing a single internal network corresponding to a single organization or multiple internal networks corresponding to multiple organizations. If the security management platform discovers a pattern where a feature (e.g., presence of a certain vulnerable service, communication with a certain external IP address, etc.) corresponds to a high level of risk, then the security management platform may opt to proactively perform the appropriate remediation action(s) when seeing the feature in the future. Rather than reactively inspecting communications, the security management platform can proactively defend organization networks against known risks.
  • a feature e.g., presence of a certain vulnerable service, communication with a certain external IP address, etc.
  • FIG. 8 depicts several different types of risk filters: (1) communications with critically vulnerable IP addresses; (2) communications with IP addresses having a known bad reputation; (3) communications with new or ephemeral services; and (4) new traffic from non-outbound gateways.
  • risk filters could be used by the security management platform when inspecting an internal network.
  • FIGS. 9-12 depict examples of these different types of risk filters.
  • FIG. 9 illustrates a scenario in which an external IP address is communicating with an internal IP address running a critically vulnerable service (e.g., Telnet).
  • FIG. 10 illustrates a scenario in which an internal IP address is communicating with an external IP address having a known reputation.
  • the external IP address has a reputation of being high risk because it is running a critically vulnerable service (e.g., Telnet) that heightens the risk the external IP address will be used as a proxy.
  • FIG. 11 illustrates a scenario in which an internal IP address is communicating with an external IP address that is running a new or ephemeral service but has not been blacklisted.
  • the security management platform may actively scan the external IP address and examine what response(s), if any, are returned. For example, the security management platform may determine whether an ACK is received in the case of TCP, or may examine data packet size in the case of UDP.
  • FIG. 12 illustrates a scenario in which an internal IP address that was previously silent for an extended duration (e.g., several days, weeks, or months) has begun communicating with an external IP address. This security management platform may generate an alert intended to ensure that the organization is aware the internal IP address has begun communicating, thereby prompting performance of any necessary remediation action(s) (e.g., taking the computing device corresponding to the internal IP address offline).
  • an extended duration e.g., several days, weeks, or months
  • a security management platform can identify the endpoints (e.g., desktop computers and computer servers) that persistently reside on an internal network. Moreover, by examining global netflow, the security management platform can identify the endpoints (e.g., mobile phones and laptop computers) that temporarily reside on the internal network. To gain a better understanding of the internal network as a whole, the security management platform must be able to monitor persistent endpoints and non-persistent endpoints.
  • the security management platform is configured to identify the types of endpoints that are on the internal network. Such action can be performed outside the internal network without having to instrument any endpoints on site. Instead, the security management platform can do this using user agents.
  • Each user agent can include one or more scanners (e.g., scanners 502 a - c of FIG. 5 ) configured to communicate with endpoints.
  • scanners 502 a - c of FIG. 5 configured to communicate with endpoints.
  • the endpoint will provide information to the intended recipient of the Web request. This information can specify, for example, what type of endpoint is involved, what sort of data is involved, what service(s) are running on the endpoint, what type of hardware is included in the endpoint, etc.
  • This information is generally provided so that content returned by the intended recipient is appropriately sized, formatted, etc.
  • user agents are instrumented outside of the internal network, the user agents can determine characteristic(s) of endpoints on the internal network by examining communications originating from or directed to these endpoints. For example, a user agent could determine what types of user-facing computer software are running on the internal network.
  • the security management platform may discover that an endpoint is running the Windows XP® operating system.
  • the security management platform can identify the operating system as no longer supported or allowed by organization policy.
  • the security management platform can look for outdated computing devices. Many organizations disallow particular types of computing devices (e.g., those made in China) because they have been known to exfiltrate information.
  • the security management platform can see which endpoints, if any, are not complying with organization policies.
  • the security management platform can observe flows off the internal network to see if any endpoints are leaking proprietary information to external IP addresses, generating signals that make it possible for external IP addresses to target the endpoints in return, etc.
  • an endpoint on the organization network may have a script that betrays information about items of interest, such as how directory structures are set up. If the security management platform discovers that the script exists, then the security management platform can determine that the endpoint is likely to be targeted by an unauthorized entity (also referred to as an “outside entity”).
  • the outside entity provides a payload that causes the endpoint to run in an undesired manner. For example, the payload may prompt the endpoint to direct communications to an unintended recipient.
  • the security management platform can also look for malware or check for audits (e.g., by examining whether updates have occurred on schedule as expected and/or in accordance with organization policies).
  • the security management platform may also monitor endpoints over time. For example, the security management platform can see where endpoints have been in the past, predict where endpoints will be in the future, etc. Such action can be used to facilitate compliance with organization policies. For example, the security management platform may identify endpoints that have violated geographical restriction policies (e.g., some organizations may not allow mobile phones or laptop computers to be brought into certain countries). Thus, the security management platform can monitor whether endpoints associated with an organization are at risk, as well as whether the endpoints have complied with organization policies.
  • geographical restriction policies e.g., some organizations may not allow mobile phones or laptop computers to be brought into certain countries.
  • the security management platform can track how exposed an organization was during a breach. This can be accomplished by examining the traffic that flowed into and out of the organization network corresponding to the organization before, during, and/or after the breach.
  • the security management platform may have access to the traffic even if it is encrypted while flowing over the boundary of the organization network. Additionally or alternatively, the security management platform may receive unencrypted traffic from ISPs.
  • the security management platform acquires data regarding traffic from multiple sources. For example, the security management platform may acquire encrypted traffic from scanner(s) instrumented along the boundary of an internal network, unencrypted traffic from ISPs, and/or unencrypted traffic from CDNs configured to decrypt communications addressed to them.
  • One benefit of such an approach is that the security management platform can identify what type of endpoints are on the organization network that are not otherwise managed. Generally, the security management platform is less likely to see non-persistent endpoints on a consistent basis, though abnormal communication activities can still be discovered. For example, a laptop computer may not be persistently on the organization network when it is turned on/off, moved between different locations, etc. However, the security management platform could still detect abnormal communication activities (e.g., if the laptop computer begins sending large amounts of data at 3:00 AM when it normally doesn't operate).
  • Communication activities represented by netflow can also be examined to determine what an endpoint is, what computer software is running on an endpoint, etc. Some endpoints may actually specify certain characteristics about themselves in outgoing communications. For example, the security management platform may discover an outdated endpoint that is running the Windows® NT 2000 operating system if there is traffic coming from the outdated endpoint. If traffic is coming from the outdated endpoint, then the outdated endpoint is connected to the open Internet (and thus open to attack by an unauthorized entity).
  • endpoints While multiple endpoints will often reside within the perimeter of an organization network, these endpoints may randomly communicate with external objects that reside outside of the organization network. This is referred to as the “network boundary concept.” If an endpoint is called by an external IP address or visits a malicious website (e.g., a phishing website), the endpoint will not be protected because it is making an outbound connection. Endpoints within the organization network can still be within a boundary of interest because these endpoints are capable of calling external objects. However, the focus may still be on what these endpoints are, rather than what they're doing, because their only conduct is calling external objects, some of which the security management platform may have instrumented. The security management platform may also look at the different kinds of commands produced by these endpoints (e.g., instructions such as PUT for sending data and GET for receiving data).
  • instructions such as PUT for sending data and GET for receiving data
  • an HTTP GET request can include a header (also referred to as the “user-agent header”) in which it is highly recommended to include a description of the source.
  • a header also referred to as the “user-agent header”
  • the header may specify what kind of browser is running on an endpoint, whether a mobile application generated the data packet, etc.
  • the header will include information about the underlying hardware of the endpoint and/or what operating system is running on the endpoint.
  • Some embodiments of the security management platform provide context to streams of information based on its knowledge of objects distributed throughout the entire Internet.
  • a security management platform can add tremendous value by providing more details and context about how objects (e.g., internal or external IP addresses) are communicating, as well as how these objects relate to an organization and the organization's network. By gaining a better understanding of these communication activities, the security management platform can deliver more value of consequence to the organization.
  • the security management platform can indicate how communication activities related to the organization have changed over time (e.g., in volume, which internal IP addresses are involved, which external IP addresses are involved, etc.).
  • the security management platform can discover when an endpoint that was previously unrelated to the organization has joined the organization's network.
  • the security management platform can also examine datasets that help in the creation of a map of organizations' network boundaries. These datasets may be created by organizationally unique user agents that are instrumented in previously unidentified IP address space. In some embodiments, these datasets are used to associate blocks of IP addresses with corresponding organization(s). Similarly, if there is a preponderance of flows between two blocks versus other blocks using a protocol such as VPN, IPSec, Generic Routing Encapsulation (GRE), etc., then the security management platform may infer that these two blocks belong to the same organization.
  • a protocol such as VPN, IPSec, Generic Routing Encapsulation (GRE), etc.
  • Objects observed by the security management platform could also be pulled into different correlations and actions. Said another way, the security management platform can observe a series of objects and then, based on these observations, take appropriate action(s). For example, if the security management platform discovers an outdated endpoint running obsolete or unsupported computer software, the security management platform can alert the corresponding organization that action should be taken to address the security risk. Generally, an individual associated with the organization (e.g., an administrator working on site) will have to find the outdated endpoint and perform the appropriate action(s) (e.g., retire or update the outdated endpoint).
  • Actions may be based primarily on visibility. For example, if an endpoint is manufactured by a company that is included in an approved security baseline, the security management platform may generate an alert and/or create a ticket indicating that the endpoint is a low security threat. The actions could also be based primarily on control. For example, if an endpoint executing an out-of-date version of the Microsoft Windows® operating system is discovered on a given subnetwork, the security management platform may push an alert to an automatic provisioning system that causes the endpoint to be upgraded, scheduled for maintenance, etc. Alternatively, the automatic provisioning system may cause the given subnetwork (e.g., an internal local area network (LAN)) to be temporarily segmented from other networks as a proactive, preventative measure.
  • LAN local area network
  • the security management platform may be configured to infer, from data generated by user agents, what version of an operating system is running on an endpoint, what kind of computer software is installed on the endpoint (e.g., based on the software update agent for different installed computer software), and the version of installed computer software. From this information, the distribution of computer software and different versions can be inferred across an organization, as can the difference (also referred to as the “delta”) between internal network reality and what baseline policies/mandates stipulate.
  • the security management platform may issue an alert if a discrepancy is discovered. For example, an alert could be generated upon discovering that the number of outdated versions of certain computer program exceeds a threshold.
  • the security management platform focuses on generating alerts for certain categories of information. Examples of these categories include:
  • FIGS. 13-14 depicts several examples of reports that may be generated by a security management platform.
  • FIG. 13 depicts a report that includes records that satisfy one or more filters.
  • four different filters have been specified (i.e., ACK, Flows to Customer, All Reasons, and Last 7 Days), and records satisfying all four filters have been grouped by port.
  • Each record may correspond to a different security threat to an internal network the security management platform is responsible for managing.
  • Port 80 is associated with four different records corresponding to communications between distinct pairs of internal and external IP addresses.
  • FIG. 14 illustrates how additional information on a record can be provided if a user (e.g., a network administrator) selects the record.
  • a user e.g., a network administrator
  • the user may select a record to determine what remediation action(s), if any, are recommended by the security management platform.
  • the user may select a record to initiate a remediation action (e.g., revoking credentials, preventing access to the Internet, or updating computer software).
  • FIG. 15 illustrates how each flow involving an internal IP address belonging to an organization can be modeled as a transmission of data packets to, or the receipt of data packets from, an external IP address.
  • IP address 199.29.255.16 belonging to Space Kitty Corp has transmitted two data packets to external IP address 24.31.240.147.
  • Other information relevant to the risk determination may also be posted to the interface for review by the user. Examples of such information include the port number, geographical location, packet size, whether an acknowledgement was received, etc.
  • FIG. 16 illustrates how individual certificates, domains, or notes associated with a record can be readily explored by a user.
  • a report that includes information related to the record may be shown to the user for further review.
  • the report pertains to an external IP address 24.31.240.147 that communicates via port 80.
  • Other information e.g., the Autonomous System Number (ASN), owner, registration date, etc.
  • ASN Autonomous System Number
  • the user may be able to review details regarding a particular certificate, domain, or note by selecting it on the report.
  • FIG. 17 illustrates an example of a tool tip that could be shown within a filter report.
  • a tool tip may be shown if the user hovers over an item for a predetermined duration (e.g., 2 seconds, 3 seconds, 5 seconds) or performs a certain action involving the item (e.g., right clicks or double clicks).
  • Tool tips can relate to a variety of topics. Here, for example, the tool tip explains the term “Traffic from Non-Gateway.” Similar explanations may be available for the other reasons shown in FIG. 17 (e.g., Inbound to Vulnerable IP and IP Reputation), as well as others not shown here.
  • FIGS. 18-19 depict portions of a security guide that summarizes various features of the security management platform. More specifically, the portion of the security guide shown in FIG. 18 describes several different kinds of risk filters. In addition to general information regarding the security management platform, the security guide could also include a glossary of often-used terms, diagram representations of different network configurations, white papers, etc.
  • FIG. 19 includes a series of tags that label different segments of the security guide.
  • a topic header 1902 is docked along the top of the interface when the security guide is viewed on a computing device (e.g., a mobile phone, laptop computer, or desktop computer).
  • the relevant topic header e.g., “Risk Filters”
  • the interface also includes a share button 1904 that, upon selection, allows a user to share the section of the security guide currently being viewed with one or more other users. Section(s) of the security guide can be shared via different forms of electronic communications, including emails, text messages, hyperlinks, etc.
  • the security guide can include descriptions of different types of assets. Each asset type may have paragraphs explaining significance, definition, case studies, how to configure, and/or best practices. Some sections of the security guide may be publicly available, while other sections of the security guide may be private (i.e., unlocked only for customers of the security management platform able to log in with appropriate credentials).
  • the security guide includes a search field 1906 that permits users to readily search the entire security guide by entering one or more terms.
  • a user may also specify that searches should be limited to certain portions of the security guide (e.g., the portion currently being viewed).
  • the security guide may also permit the user to specify filter(s). For example, the user could filter content of the security guide to only show best practices for each asset type.
  • a security management platform can include a threat detection module and a repository.
  • the security management platform may also include an interface configured to receive network traffic data and/or active probe data associated with a computing device. In some embodiments, different interfaces receive these different types of data.
  • the threat detection module can determine whether any correlations exist between the network traffic data and the active probe data, as well as determine whether these correlations indicate that a security event has occurred. In the event that the correlation indicates a security event has occurred, the threat detection module can indicate that the security event is associated with a particular computing device. The threat detection module may know which computing device(s) are involved in a security event from the active probe data.
  • security event generally refers to any event that results in an increased security threat. The communication activities corresponding to the risk filters described above would be deemed security events.
  • examples of security events include the detection of a communication with a new or ephemeral service, detection of a vulnerable computing device residing on an internal network (also referred to as an “internal computing device,” “organization computing device,” or “customer computing device”), detection of a communication from an internal computing device to a computing device that is vulnerable to takeover and resides outside of the internal network (also referred to as an “external computing device”), detection of a communication involving an internal computing device that has not been involved in any communications for a specified time internal (e.g., several days, weeks, or months), etc.
  • a specified time internal e.g., several days, weeks, or months
  • a security management platform can utilize two different types of data to identify security events involving computing devices that are connected to the Internet: (1) active sensing data; and (2) netflow data.
  • Active sensing data includes information that is received from a computing device as a result of a probe of that computing device while the computing device is connected to a computer network (e.g., the Internet).
  • Probes can actively seek information from any IP addresses accessible on the computer network.
  • the repository may include open ports, available services, certificates, computing device information, or any other type of information available from a probe of a computing device over a network.
  • multiple probes of a single computing device are performed at different times over a certain time interval. Such action may allow the security management platform to readily discover changes in security risk over time.
  • multiple probes of different computing devices can be simultaneously performed at a single point in time.
  • Netflow data includes information related to traffic traversing a computer network (e.g., an internal network or the Internet). Examples include the source information and destination information for packet(s), the time of transmission and/or reception of the packet(s), hop data along the path(s) from the source to the destination, etc.
  • Network traffic data could come from a network administrator, an organization, an ISP, a routing device (e.g., switches 104 a , 104 d or routers 104 b , 104 c of FIG. 1 ), a firewall device, a security information and event management (SIEM) system, or any other appropriate collection source or storage for traffic information.
  • SIEM security information and event management
  • a security management platform can identify security threats to a computer network (e.g., an internal network associated with an organization).
  • timing information is used as part of the determination for security events discovered in either data type. For example, a computing device that had not communicated with any other computing devices residing outside of its local network for an extended period of time (e.g., 145 minutes, 7 hours, 30 days, 57 days, etc.) but suddenly begins communicating is typically given a higher risk score because there is a lower probability that the organization responsible for managing the computing device was monitoring the computing device to log/inspect these communications.
  • the identification may trigger filtering of traffic leaving/entering the computing device.
  • the identification may trigger filtering of the traffic leaving/entering the computer network on which the computing device resides. Such action may be necessary to ensure that related security threats affecting other computing devices on the computer network are also properly identified.
  • the identification may also prompt the creation and/or modification of a blacklist, the generation of alerts regarding the communications and relevant computing device(s), the prediction of other computing device(s) that may become engaged in similar activity, etc.
  • FIG. 20 is a block diagram illustrating an example of a security management platform 2000 configured to detect security events by examining netflow data acquired from one or more sources.
  • the security management platform 2000 can also actively probe the IP addresses accessible on a computer network (e.g., the Internet), and then store information regarding any responses received based on the probing.
  • the security management platform 2000 can learn information regarding available services, open ports, software versions, certificates, metadata information, and other relevant information about the computing device corresponding to the IP address. Probes can be performed at different times so that the risk to an IP address (or the risk posed by the IP address) can be established over time by examining stored information related to the IP address.
  • IP addresses may be associated with computing devices (e.g., external system A 2010 and external system B 2012 ), computer networks (e.g., entity A network 2004 , entity B network 2006 , and entity C network 2008 ), and/or ISP fabrics (e.g., ISP 1 fabric 2002 and ISP 2 fabric 2014 ).
  • the security management platform 2000 receives netflow data directly from the source.
  • the security management platform 2000 receives netflow data directly from entity C network 2008 .
  • the security management platform 2000 receives network data indirectly from the source.
  • the security management platform 2000 may receive netflow data associated with entity network A 2004 or external system B 2012 from ISP 1 fabric 2002 .
  • the security management platform 2000 may be configured to monitor the security of IP addresses residing on an internal network (also referred to as an “organization network,” “customer network,” or “entity network”).
  • the security management platform 2000 may communicate with the IP addresses via a first computer network (e.g., ISP 1 fabric 2002 and/or ISP 2 fabric 2014 ) and a second computer network (e.g., entity A network 2004 , entity B network 2006 , and/or entity C network 2008 ).
  • a first computer network e.g., ISP 1 fabric 2002 and/or ISP 2 fabric 2014
  • a second computer network e.g., entity A network 2004 , entity B network 2006 , and/or entity C network 2008 .
  • Netflow data can be used to infer/discover characteristics of the traffic traversing a corresponding computer network.
  • netflow data may indicate the source of the traffic, the destination of the traffic, the time/date associated with transmission of the traffic, hop information (e.g., which route the traffic took from the source to the destination), the number of bytes transmitted, the type of data transmitted, the state of a transmission control protocol's multi-step handshake, etc.
  • Netflow data could be received from an entity network, an external system, an existing database of traffic data, an ISP, and/or some other appropriate source.
  • FIG. 21 is a block diagram illustrating an example of a security management platform 2100 .
  • the security management platform 2100 may be, for example, the security management platform 2000 of FIG. 20 or the security management platform 506 of FIG. 5 .
  • the security management platform 2100 includes a processor 2104 that has an active probe engine 2106 .
  • the active probe engine 2106 can be configured to probe IP addresses by generating signals that are transmitted via the interface 2102 across at least one computer network.
  • the active probe engine 2106 uses commands stored in an active sensing storage 2114 (also referred to as “active probe storage”).
  • Netflow data can also be received by the security management platform 2100 via the interface 2102 .
  • the netflow data can then be handled by a traffic handler 2118 , which may be configured to parse, filter, and/or format traffic as necessary to be stored in a netflow storage 2116 .
  • the active sensing storage 2114 and the netflow storage 2116 may be part of storage 2112 .
  • netflow data can be received from one or more sources that are communicatively coupled to the interface 2102 (e.g., an external system, an Internet-connected computing device, an ISP, an existing database, a firewall, a router, a SIEM system, etc.).
  • Security events can be detected by a security event detector 2110 of the processor 2104 . More specifically, the security event detector 2110 can examine correlations between data stored in the active sensing storage 2114 and data stored in the netflow storage 2116 as determined by the correlator 2108 of the processor 2104 . An organization can be alerted of detected security events by notifications transmitted via the interface 2102 . These notifications may prompt the organization to perform some remediation action. Examples of remediation actions include filtering traffic associated with a security event, adding IP address(es) and/or computing device(s) to a blacklist, alerting an administrator about the security event and/or the computing device(s) involved in the security event, etc.
  • the correlator 2108 further examines the data stored in the active sensing storage 2114 and the netflow storage 2116 to assist the security event detector 2110 in predicting what security events are most likely to occur in the future. Predicted security events may prompt performance of any of the remediation actions described above.
  • active probes There are many varieties of active probes, and each variety can be used to collect information about the state of a particular IP address and its corresponding computing device. Active probes may also be used to gain information about the state of all IP addresses and their corresponding computing devices that are connected to a given computer network (e.g., an internal network or the Internet). For example, for a given port, a probe could check whether that port is open across all IP addresses available on the Internet. In other embodiments, a probe may attempt a handshake in accordance with the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) Handshake Protocol on a given port.
  • TLS Transport Layer Security
  • SSL Secure Sockets Layer
  • Probes can also look for the presence of standard services/protocols on standard and non-standard ports associated with those services/protocols, as well as over TCP- and UDP-based connections.
  • the active probe engine 2106 may probe the presence of FTP on ports 21 and 2121, SSH on ports 22 and 2222, Telnet on ports 23 and 2323, SMTP on ports 22, 465, and 587, Domain Name System (DNS) on ports 53 and 5353, HTTP on ports 80 and 8080, POP3 on ports 110 and 993, NTP on port 123, NetBIOS on ports 137, 138, and 139, IMAP on ports 143 and 995, SNMP on ports 161, 162, and 199, LDAP on ports 389 and 636, HTTPS on ports 443 and 8443, SMB on port 445, Kerberos on ports 464, 543, 544, 749, 750, 751, 752, 753, 754, and 760, RPC on port 530, MSSQL on port 1433 and 1434, OracleDB on ports 1521, 2483, and 2484, MySQL on port 3306, RDP on port 3389, SIP on ports 5060 and 5061, PostgreSQL on port 54
  • the active probe engine 2106 can examine whether any of the aforementioned protocols (as well as other protocols not mentioned here) are running on any combination of one or more ports. Each probe can return information about the presence or absence of a given service on a given port, in addition to information about the service itself, such as the software version, manufacturer, etc. This information can be analyzed to assess the vulnerability of the given service to exploitation to an unauthorized entity or a hostile actor.
  • the netflow storage 2116 can include details about all communications involving the IP addresses of interest. These IP address may include those that are statically or dynamically allocated to an organization or an entity of interest to the organization (e.g., a division, subsidiary, or vendor), as well as those that have historically been associated with malicious activity by the implementer of the security management platform 2100 , the organization, an open source database, or any other source. These details can include information about the source or destination of the communications, such as the IP addresses involved, the port number of a source computing device, the ASN used for routing, location information about the source computing device (e.g., the country within which the source computing device resides), etc.
  • These details can also include information about the communication itself, such as the time of transmission/reception, the protocol used, the number of packets, the size of the transmission, information regarding sampling performed by a listening mechanism (e.g., a flow collector or a scanner) that recorded the traffic, etc.
  • a listening mechanism e.g., a flow collector or a scanner
  • the correlator 2108 can use data from the active sensing storage 2114 and the netflow storage 2116 to detect potential security events.
  • security events include communications with new or ephemeral services, communications involving a vulnerable internal computing device (e.g., a computing device managed by an organization that resides within an internal network), communications involving a vulnerable external computing device (e.g., a computing device that resides outside of the internal network), and communications with non-gateway computing devices.
  • IP addresses are often referred to as “organization IP addresses,” “customer IP addresses,” or “internal IP addresses.”
  • the time interval over which prior probe(s) discovered no corresponding service detection can be various lengths (e.g., 5 minutes, 3 hours, 8 days, 3 months, etc.). Moreover, the time between consecutive prior probes may vary. For example, a first prior probe and a second prior probe may be separated by several days, while the second prior probe and a third prior probe may be separated by several weeks.
  • the internal IP address may represent the source as seen in the network traffic datum, or the port associated with the internal IP address may be a high number while the port associated with the external IP address is associated with a common service.
  • Examples of common services include FTP on ports 21 and 2121, SSH on ports 22 and 2222, Telnet on ports 23 and 2323, SMTP on ports 25, 465, and 587, DNS on ports 53 and 5353, HTTP on ports 80 and 8080, POP3 on ports 110 and 993, NTP on port 123, NetBIOS on ports 137, 138, and 139, IMAP on ports 143 and 995, SNMP on ports 161, 162, and 199, LDAP on ports 389 and 636, HTTPS on ports 443 and 8443, SMB on port 445, Kerberos on ports 464, 543, 544, 749, 750, 751, 752, 753, 754, and 760, RPC on port 530, MSSQL on port 1433 and 1434, OracleDB on ports 1521, 2483, and 2484, MySQL on port 3306, RDP on port 3389, SIP on ports 5060 and 5061, PostgreSQL on port 5432, VNC on port 5800, Redis on port
  • the security management platform 2100 can conclude that a communication with a new or ephemeral service occurred with low confidence. However, if the port number is at least 10,000 and all of the above conditions are met, then the security management platform 2100 can conclude that a communication with a new or ephemeral service occurred with high confidence.
  • the three potential conclusions from this correlation are (1) the external IP address is configured to not respond to probes by the active probe engine 2106 ; (2) the external IP address began responding very recently; or (3) the external IP addresses was stood up very briefly to communicate with the internal IP address. Because the latter two potential conclusions are consistent with the attack patterns typically employed by unauthorized entities, each of these could be flagged as a potential security event.
  • Organization communications with a vulnerable computing device can be identified whenever a communication is detected that involves an internal IP address running a non-HTTP, non-HTTPS, or non-DNS service.
  • Examples of such services include FTP on ports 21 and 2121, SSH on port 22 and 2222, Telnet on ports 23 and 2323, NTP on port 123, NetBIOS on ports 137, 138, and 139, SNMP on ports 161, 162, and 199, LDAP on ports 389 and 636, SMB on port 445, Kerberos on ports 464, 543, 544, 749, 750, 751, 752, 753, 754, and 760, RPC on port 530, MSSQL on ports 1433 and 1434, OracleDB on ports 1521, 2483, and 2484, MySQL on port 3306, RDP on port 3389, SIP on ports 5060 and 5061, PostgreSQL on port 5432, VNC on port 5800, Redis on port 6379, MongoDB on port 27017,
  • Organization communications involving a vulnerable computing device can also occur whenever a communication is detected that involves an internal IP address having known vulnerabilities, such as running an end-of-life HTTP or HTTPS service, poor cryptographic health on an HTTPS service such as a self-signed certificate or manufacturer's default certificate, an old DNS service with publicly disclosed vulnerabilities, etc. Any of the aforementioned services running on a computing device can make that computing device vulnerable to compromise by an unauthorized entity. Any communication from a vulnerable external computing device to an internal computing device or from an external computing device to a vulnerable internal computing device may represent a security event.
  • Organization communications with a vulnerable external computing device can be identified whenever a communication involving an internal IP address is detected, where the internal computing device corresponding to the internal IP address is running a common service.
  • common services include FTP on ports 21 and 2121, SSH on port 22 and 2222, Telnet on ports 23 and 2323, SMTP on ports 25, 465, and 587, DNS on ports 53 and 5353, HTTP on port 80, POP3 on ports 110 and 993, NTP on port 123, NetBIOS on ports 137, 138, and 139, IMAP on ports 143 and 995, SNMP on ports 161, 162, and 199, LDAP on ports 389 and 636, HTTPS on port 443, SMB on port 445, Kerberos on ports 464, 543, 544, 749, 750, 751, 752, 753, 754, and 760, RPC on port 530, MSSQL on ports 1433 and 1434, OracleDB on ports 1521, 2483, and 2484, MySQL on port 3306, RDP on
  • the security management platform 2100 may also look for certificates used for public key cryptography returned for a successful SSL/TLS handshake that are self-signed or use deprecated ciphers or signing algorithms. These services are often considered vulnerable for several reasons, so there is an increased probability that an internal computing device running one of these services has been compromised by a malicious actor for use as a proxy for malicious traffic. For this reason, communications between a vulnerable external computing device and an internal IP address has a higher probability of being malicious in nature, and thus can be classified as a security event.
  • Organization communications transmitted from a non-gateway device can be identified whenever a communication is detected involving an internal IP address that has not recently responded to any scans performed by the active probe engine 2106 and has not historically been involved in external communications. Organizations are less likely to monitor traffic for security events on computing devices that do not normally communicate with the Internet, so malicious actors may try to access the internal network using internal IP addresses of this nature. Accordingly, communications involving these internal IP addresses could represent security events.
  • FIG. 22 is a block diagram illustrating an example of an internal network 2200 (also referred to as an “entity network,” “organization network,” or “customer network”).
  • the internal network 2200 may be entity A network 2004 , entity B network 2006 , or entity C network 2008 of FIG. 20 .
  • the internal network 2200 can interface with another computer network (e.g., the Internet) via an edge computing device 2202 (also referred to as an “edge device”). More specifically, all traffic entering/exiting the internal network 2200 may be handled by the edge device 2202 . Traffic coming into the entity network 2200 can also be examined and/or filtered by the edge device 2202 .
  • the edge device 2002 includes a firewall.
  • Incoming traffic can then be passed to a switch 2204 , which routes the traffic within the internal network 2200 to one or more internal systems (e.g., internal computing device 2206 , internal computing device 2208 , internal computing device 2210 , internal computing device 2212 , or internal computing device 2214 ).
  • the internal network 2200 includes more than one edge device.
  • the internal network 2200 may include more than one switch responsible for routing traffic. For traffic exiting the internal network 2200 , traffic originating from an internal system can be routed from the switch 2204 to the edge device 2202 and then to an external computer network (e.g., the Internet). Meanwhile, probes from a security management platform (e.g., security management platform 506 of FIG.
  • a security management platform e.g., security management platform 506 of FIG.
  • traffic within the internal network 2200 is measured by the switch 2204 or the edge device 2202 . In other embodiments, traffic within the internal network 2200 is independently measured by each internal system and then aggregated (e.g., by the switch 2204 or the edge device 2202 ).
  • FIG. 23 is a block diagram illustrating an example of an Internet service provider (ISP) fabric 2300 .
  • the ISP fabric 2300 may be the ISP 1 fabric 2002 or ISP 2 fabric 2014 of FIG. 20 .
  • the ISP fabric 2300 can act as a network by relaying traffic downstream using multiple routers (e.g., router 2302 , router 2304 , router 2306 , router 2308 , router 2310 , router 2312 , or router 2314 ). These routers are responsible for routing traffic received at an ingress point of the ISP fabric 2300 to an appropriate egress point of the ISP fabric 2300 along the way toward a final destination (e.g., recipient device 106 of FIG. 1 ).
  • routers e.g., router 2302 , router 2304 , router 2306 , router 2308 , router 2310 , router 2312 , or router 2314 .
  • At least one of the routers logs flows and reports traffic information (e.g., to a security management platform).
  • traffic information e.g., to a security management platform.
  • a given router may monitor and store information regarding all traffic that passes through the given router. Examples of such information include information related to the source of the traffic, the destination of the traffic, path information, data packet information, number of bytes in the traffic, etc.
  • FIG. 24 depicts a flow diagram of a process 2400 for detecting a security event involving a computing device.
  • the process may be executed by a processor of a security management platform (e.g., processor 2104 of FIG. 21 ).
  • the processor receives active sensing data related to the computing device.
  • the security management platform may actively probe the computing device by sending a signal to a corresponding IP address that is intended to elicit a response.
  • the security management platform may store data indicative of the response in a storage.
  • Probes of the computing device may be periodically performed to detect changes in the state of the computing device based on its history as determined based on the active sensing data.
  • the processor receives netflow data.
  • the netflow data describes traffic traversing a computer network (e.g., an internal network or the Internet).
  • the netflow data is acquired from an organization, while in other embodiments the netflow data is acquired from one or more ISPs.
  • the processor can determine whether correlation(s) exist between the active sensing data and the netflow data. Said another way, the processor may parse the active sensing data and the netflow data to discover risk filters indicative of security threats.
  • the processor can determine whether correlation(s) indicate that a security event occurred. In the event that a determination is made that a security event occurred, then, at step 2405 , the processor can indicate that the security event involving the computing device occurred. For example, the processor may cause a notification to be generated that alerts an administrator associated with the computer network on which the computing device resides to take appropriate action.
  • the processor can indicate that no security event involving the computing device occurred.
  • Other embodiments of the process 2400 may reverse the order of receiving active sensing data and netflow data. Moreover, either type of data could be received on a periodic basis (e.g., hourly, daily, or weekly) or a continual basis.
  • FIG. 25 depicts a flow diagram of a process 2500 for actively probing a computing device that resides on a computer network under examination.
  • the computing device is an internal computing device that resides on an internal network (e.g., an organization intranet), while in other embodiments the computing device is an external network device that resides on some other network (e.g., the Internet).
  • the process may be executed by a processor of a security management platform (e.g., processor 2104 of FIG. 21 ).
  • the processor can select a computing device to be actively probed. For example, if the computing device is an internal computing device that resides on an internal network, then the processor may have selected the computing device from a list of computing devices associated with an organization. In such embodiments, each computing device managed by the organization may be periodically selected for probing. As another example, if the computing device is an external network device that resides on the Internet, then the processor may have randomly selected the computing device, selected the computing device due to its connection to an internal computing device, etc.
  • the processor can probe the computing device by transmitting a query to a corresponding IP address.
  • the query is transmitted to the computing device with the intent that it provokes a response, which can be examined by the security management platform to determine what risk, if any, is posed by the computing device. Additionally or alternatively, the security management platform can determine what risk, if any, is experienced by the computing device itself.
  • the processor can receive a reply to the query from the computing device.
  • the processor stores the query and reply in a storage for further examination. For example, as shown at step 2504 , the processor may store the query and reply in a database record corresponding to the computing device. More specifically, the processor may generate and/or populate a record in a database that include the query, reply, and other information (e.g., date and time of probe).
  • the processor can determine whether any other computing devices exist on the network under examination that require probing. In response to a determination that at least one other computing device needs to be probed, the processor can complete these steps again with respect to another computing device. However, in response to a determination that no other computing devices need to be probed, the processor can examine whether it is time for the computing device to be probed another time, as shown at step 2506 . Thus, the processor can immediately complete these steps again with respect to the same computing device, or the processor can wait until a specified amount of time has elapsed, as shown at step 2507 .
  • these steps are performed in parallel by the processor.
  • the processor could periodically probe the computing device over a specified time interval while simultaneously probing other computing devices on the same or different networks.
  • FIG. 26 depicts a flow diagram of a process 2600 for constructing a list of computing devices similar to a computing device that has experienced, or otherwise been involved in, a security event.
  • Each computing device can be an internal computing device that resides on an internal network (e.g., an organization intranet) or an external computing device that resides on some other network (e.g., the Internet).
  • a security management platform may construct a list of similar external computing devices to more quickly identify potential security risks. Additionally or alternatively, the security management platform may construct a list of similar internal computing devices to identify which computing devices have the highest likelihood of being involved in a future security event.
  • the process may be executed by a processor of a security management platform (e.g., processor 2104 of FIG. 21 ).
  • the processor can select a computing device. Then, at step 2602 , the processor can determine whether the computing device is similar to any computing devices that are associated with security events (also referred to as “risky computing devices” or “vulnerable computing devices”). For example, the processor may compare feature(s) of the computing device with feature(s) of all risky computing devices to determine whether any matches exist. As another example, the processor may compare service(s) executing on the computing device with service(s) executing on all vulnerable computing devices to determine whether any matches exist. In response to a determination that the computing device is not similar to any risky or vulnerable computing devices, the processor can begin the process by selecting another computing device. However, in response to a determination that the computing device is similar to at least one risky or vulnerable computing device, the processor can add the computing device to a set of similar computing devices that includes the at least one risky or vulnerable computing device, as shown at step 2603 .
  • security events also referred to as “risky computing devices” or “vulnerable computing devices”. For example, the processor may compare feature
  • the processor determines whether there are any other computing devices to check. For example, the processor may determine whether any other computing devices exist on a computer network under examination (e.g., the internal network of an organization). If another computing device needs to be checked, the processor can complete these steps again with respect to another computing device. However, if no other computing devices need to be checked, the processor can provide the set of similar computing devices to the security management platform, as shown at step 2605 .
  • the set of similar computing devices can be used to more intelligently identify potential security risks, as well as what remediation action(s), if any, should be taken against these similar computing devices.
  • FIG. 27 depicts a flow diagram of a process 2700 for determining whether a computing device is part of a botnet.
  • the process may partially mirror the process of FIG. 24 .
  • steps 2701 , 2702 , and 2703 of FIG. 27 may be substantially similar to steps 2401 , 2402 , and 2403 of FIG. 24 .
  • the processor can determine whether correlation(s) indicate that a botnet event occurred. Said another way, the processor can determine whether the active sensing data and/or the netflow data indicate that an internal computing device communicated with an external computing device that is likely to be part of a botnet. In the event that a determination is made that a botnet event occurred, then, at step 2705 , the processor can indicate that the computing device is part of a botnet. For example, the processor may cause an alert to be generated that notifies an administrator that the computing device is a botnet device. However, in the event that a determination is made that no botnet event occurred, then, at step 2706 , the processor can indicate that the computing device is not part of a botnet.
  • FIG. 28 depicts a flow diagram of a process 2800 for determining whether a computing device has been involved in a DNS tunneling event.
  • the process may partially mirror the process of FIG. 24 .
  • steps 2801 , 2802 , and 2803 of FIG. 28 may be substantially similar to steps 2401 , 2402 , and 2403 of FIG. 24 .
  • the processor can determine whether correlation(s) indicate that a DNS tunneling event occurred.
  • DNS tunneling is the ability to encode the data of other programs or protocols in DNS queries and responses. Accordingly, in order to determine whether a DNS tunneling event occurred, the processor may examine whether communications to/from the computing device have been encoded. The processor may also perform payload analysis (e.g., by examining the size/length of the queries and responses) and/or traffic analysis (e.g., by examining the volume and frequency of the queries and responses). In the event that a determination is made that a DNS tunneling event occurred, then, at step 2805 , the processor can indicate that the network device is part of a DNS tunneling scheme.
  • the processor may cause an alert to be generated that notifies an administrator that the computing is a DNS device. However, in the event that a determination is made that no DNS tunneling event occurred, then, at step 2806 , the processor can indicate that the computing device is not part of a DNS tunneling scheme.
  • FIG. 29 is a block diagram illustrating an example of a processing system 2900 in which at least some operations described herein can be implemented.
  • some components of the processing system 2900 may be hosted on a computing device that includes a security management platform (e.g., security management platform 506 of FIG. 5 ).
  • some components of the processing system 2900 may be hosted on a computing device that is queried by a security management platform during an active probing session.
  • the processing system 2900 may include one or more central processing units (“processors”) 2902 , main memory 2906 , non-volatile memory 2910 , network adapter 2912 (e.g., network interface), video display 2918 , input/output devices 2920 , control device 2922 (e.g., keyboard and pointing devices), drive unit 2924 including a storage medium 2926 , and signal generation device 2930 that are communicatively connected to a bus 2916 .
  • the bus 2916 is illustrated as an abstraction that represents one or more physical buses and/or point-to-point connections that are connected by appropriate bridges, adapters, or controllers.
  • the bus 2916 can include a system bus, a Peripheral Component Interconnect (PCI) bus or PCI-Express bus, a HyperTransport or industry standard architecture (ISA) bus, a small computer system interface (SCSI) bus, a universal serial bus (USB), IIC (I2C) bus, or an Institute of Electrical and Electronics Engineers (IEEE) standard 1394 bus (also referred to as “Firewire”).
  • PCI Peripheral Component Interconnect
  • ISA HyperTransport or industry standard architecture
  • SCSI small computer system interface
  • USB universal serial bus
  • I2C IIC
  • IEEE Institute of Electrical and Electronics Engineers
  • the processing system 2900 may share a similar computer processor architecture as that of a desktop computer, tablet computer, personal digital assistant (PDA), mobile phone, game console, music player, wearable electronic device (e.g., a watch or fitness tracker), network-connected (“smart”) device (e.g., a television or home assistant device), virtual/augmented reality systems (e.g., a head-mounted display), or another electronic device capable of executing a set of instructions (sequential or otherwise) that specify action(s) to be taken by the processing system 2900 .
  • PDA personal digital assistant
  • mobile phone e.g., a watch or fitness tracker
  • game console e.g., a watch or fitness tracker
  • music player e.g., a watch or fitness tracker
  • network-connected (“smart”) device e.g., a television or home assistant device
  • virtual/augmented reality systems e.g., a head-mounted display
  • another electronic device capable of executing a set of instructions (s
  • main memory 2906 non-volatile memory 2910 , and storage medium 2926 (also called a “machine-readable medium”) are shown to be a single medium, the term “machine-readable medium” and “storage medium” should be taken to include a single medium or multiple media (e.g., a centralized/distributed database and/or associated caches and servers) that store one or more sets of instructions 2928 .
  • the term “machine-readable medium” and “storage medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the processing system 2900 .
  • routines executed to implement the embodiments of the disclosure may be implemented as part of an operating system or a specific application, component, program, object, module, or sequence of instructions (collectively referred to as “computer programs”).
  • the computer programs typically comprise one or more instructions (e.g., instructions 2904 , 2908 , 2928 ) set at various times in various memory and storage devices in a computing device.
  • the instruction(s) When read and executed by the one or more processors 2902 , the instruction(s) cause the processing system 2900 to perform operations to execute elements involving the various aspects of the disclosure.
  • machine-readable storage media such as volatile and non-volatile memory devices 2910 , floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD-ROMS), Digital Versatile Disks (DVDs)), and transmission-type media such as digital and analog communication links.
  • recordable-type media such as volatile and non-volatile memory devices 2910 , floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD-ROMS), Digital Versatile Disks (DVDs)), and transmission-type media such as digital and analog communication links.
  • CD-ROMS Compact Disk Read-Only Memory
  • DVDs Digital Versatile Disks
  • the network adapter 2912 enables the processing system 2900 to mediate data in a network 2914 with an entity that is external to the processing system 2900 through any communication protocol supported by the processing system 2900 and the external entity.
  • the network adapter 2912 can include a network adaptor card, a wireless network interface card, a router, an access point, a wireless router, a switch, a multilayer switch, a protocol converter, a gateway, a bridge, bridge router, a hub, a digital media receiver, and/or a repeater.
  • the network adapter 2912 may include a firewall that governs and/or manages permission to access/proxy data in a computer network, and tracks varying levels of trust between different machines and/or applications.
  • the firewall can be any number of modules having any combination of hardware and/or software components able to enforce a predetermined set of access rights between a particular set of machines and applications, machines and machines, and/or applications and applications (e.g., to regulate the flow of traffic and resource sharing between these entities).
  • the firewall may additionally manage and/or have access to an access control list that details permissions including the access and operation rights of an object by an individual, a machine, and/or an application, and the circumstances under which the permission rights stand.
  • programmable circuitry e.g., one or more microprocessors
  • software and/or firmware special-purpose hardwired (i.e., non-programmable) circuitry, or a combination of such forms.
  • Special-purpose circuitry can be in the form of one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc.
  • ASICs application-specific integrated circuits
  • PLDs programmable logic devices
  • FPGAs field-programmable gate arrays

Abstract

Introduced here are security management platforms configured to discover traffic flows that involve one or more internal Internet Protocol (IP) addresses that reside on an internal network. By monitoring netflow data regarding the traffic traversing the Internet, a security management platform can identify each internal IP address that was involved in a public communication activity over an interval of time. A public communication activity normally involves an exchange of data packets between an internal IP address that resides on the internal network and an external IP address that does not reside on the internal network. Moreover, the security management platform may create a list that includes at least some of the internal IP addresses that have been involved in public communication activities. The list may enable the security management platform to more easily discover security threats that might otherwise go undetected.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. application Ser. No. 15/984,030, titled “Correlation-Driven Threat Assessment and Remediation” and filed on May 18, 2018, which claims priority to U.S. Provisional Application No. 62/508,298, titled “Global Internet Sensor Fusion” and filed on May 18, 2017, and U.S. Provisional Application No. 62/586,669, titled “Correlation Driven Threat Assessment and Remediation” and filed on Nov. 15, 2017. Each of these applications is incorporated by reference herein in its entirety.
  • TECHNICAL FIELD
  • Various embodiments concern devices, computer programs, and associated computer-implemented techniques for identifying, assessing, and monitoring organizational vulnerabilities to security threats.
  • BACKGROUND
  • A computer network (also referred to as a “data network”) is a digital telecommunications network that allows nodes to share resources. In a computer network, computing devices exchange data with one another via connections (also referred to as “data links”). These data links may be established over cable media, such as copper wires or fiber optic cables, or wireless media, such as Wi-Fi or Bluetooth® communication channels.
  • The traffic in a computer network is often analyzed to improve decision making for network operations, security techniques, etc. Traffic may be acquired from a variety of computing devices residing within the computer network to provide extensive visibility of traffic flow. Given the complexity and volume of traffic routed through many infrastructures, a variety of network tools have conventionally been used to identify, analyze, and/or handle security threats to a computer network. Examples of network tools include intrusion detection systems (IDSs) and intrusion prevention systems (IPSs).
  • SUMMARY
  • Introduced here are security management platforms configured to identify, assess, and monitor organizational vulnerability to security threats. By monitoring netflow data regarding the traffic traversing the Internet, a security management platform can identify security threats that would otherwise go undetected. Such action can be performed instead of, or in addition to, monitoring netflow data regarding the traffic traversing a local network (also referred to as an “internal network”) associated with an organization under examination. Thus, rather than monitor the traffic leaving public-facing IP addresses residing on the local network, the security management platform can instead monitor traffic traversing the Internet and then filter the traffic to identify flows originating from the local network, flows destined for the local network, or any combination thereof.
  • When examining the flows, the security management platform can watch for various scenarios that correspond with an increased likelihood that a security threat exists. These scenarios can be referred to as “risk filters.” Together, these risk filters allow the security management platform to identify which public Internet Protocol (IP) addresses on the local network of an organization (also referred to as “internal IP addresses”) are vulnerable to unauthorized access, as well as which IP addresses outside the local network (also referred to as “external IP addresses”) are risky for internal IP addresses to communicate with. When we refer to ‘internal IP addresses’ in this application, we are referring to publicly routable IP addresses that belong to a given organization or customer, not IP addresses in reserved or private ranges, such as those outlined in RFC1918 (IPv4) or RFC4193 (IPv6), that are sometimes colloquially referred to as “internal IP addresses.”
  • Each risk filter is based on the premise that a first IP address is communicating with a second IP address. Generally, the security management platform will examine communications between internal IP addresses and external IP addresses. However, the security management platform could also examine communications between pairs of internal IP addresses and/or pairs of external IP addresses.
  • For a first risk filter, the security management platform can pull active sensing data to see if an external IP address has any vulnerable services running on it. Active sensing data is derived from active probing of the external IP address by the security management platform. More specifically, the security management platform may actively probe the external IP address by sending a query that is intended to elicit a response. Any responses generated in response to the query are described by the active sensing data.
  • For a second risk filter, the security management platform can pull active sensing data to see if a particular service has been observed running on the port associated with the external IP address. Said another way, the security management platform can generate a query intended to act as a real-time confirmation as to whether a particular service is present at the external IP address.
  • For a third risk filter, the security management platform can pull active sensing data to see if an internal IP address has any vulnerable services running on it. The third risk filter is similar to the first risk filter, though the focus is on the internal IP address rather than the external IP address. The security management platform can optionally generate alerts based on whether traffic appears to be inbound or outbound from the internal IP address. Outbound traffic is generally riskier because it implies that an action is being taken by the vulnerable service, thereby indicating potential compromise of the corresponding computing device.
  • For a fourth risk filter, the security management platform can examine historical netflow from all parts of the local network under examination. For example, the security management platform may examine histograms of flow activity to and from each internal IP address, and then generate a threshold based at least in part on the histograms. Generally, the threshold corresponds to the amount of traffic typically traversing the local network. By implementing thresholds, the security management platform can readily discover when an internal IP address is transmitting/receiving much larger traffic volumes than usual. A threshold may be automatically tuned based on other signals, such as the total traffic volume within the internal network, the number of computing devices on the internal network, the time of day, the day of week, etc.
  • For a fifth risk filter, the security management platform can compare the external IP address to a set of “bad” external IP addresses that are known to be risky or vulnerable. The set can come from a variety of sources, including threat intelligence that is publicly posted (e.g., by the Federal Government of the United States) or disclosed by organizations, as well as from other sources such as honeypot servers maintained by the security management platform.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Various features and characteristics of the technology will become more apparent to those skilled in the art from a study of the Detailed Description in conjunction with the drawings. Embodiments of the technology are illustrated by way of example and not limitation in the drawings, in which like references may indicate similar elements.
  • FIG. 1 depicts an example of a network arrangement in which multiple computing devices (also referred to as “nodes”) communicate via a computer network.
  • FIG. 2 illustrates the concept of netflow data through the use of a mailbox metaphor.
  • FIG. 3 is a diagrammatic representation of a local network that illustrates how organizations have conventionally used netflow data.
  • FIG. 4 illustrates how multiple data streams can be fused into a single unified workflow.
  • FIG. 5 illustrates a network environment that includes multiple scanners that are deployed on a computer network.
  • FIG. 6 illustrates a network environment that includes a honeypot server that may be employed as part of a security management platform designed to protect an internal network.
  • FIG. 7 illustrates how risk filters can be applied to communications between an internal IP address (also referred to as a “customer IP address” or an “organization IP address”) and an external IP address.
  • FIG. 8 depicts several different types of risk filters: (1) communications with critically vulnerable IP addresses; (2) communications with IP addresses having a known bad reputation; (3) communications with new or ephemeral services; and (4) new traffic from non-outbound gateways.
  • FIG. 9 illustrates a scenario in which an external IP address is communicating with an internal IP address running a critically vulnerable service (e.g., Telnet).
  • FIG. 10 illustrates a scenario in which an internal IP address is communicating with an external IP address having a known reputation.
  • FIG. 11 illustrates a scenario in which an internal IP address is communicating with an external IP address that is running a new or ephemeral service but has not been blacklisted.
  • FIG. 12 illustrates a scenario in which an internal IP address that was previously silent for an extended duration (e.g., several days, weeks, or months) has begun communicating with an external IP address.
  • FIG. 13 depicts a report that includes records that satisfy one or more filters.
  • FIG. 14, meanwhile, illustrates how additional information on a record can be provided if a user (e.g., a network administrator) selects the record.
  • FIG. 15 illustrates how each flow involving an internal IP address belonging to an organization can be modeled as a transmission of data packets to, or the receipt of data packets from, an external IP address.
  • FIG. 16 illustrates how individual certificates, domains, or notes associated with a record can be readily explored by a user.
  • FIG. 17 illustrates an example of a tool tip that could be shown within a filter report.
  • FIG. 18 depicts portions of a security guide that summarizes various features of the security management platform.
  • FIG. 19 includes a series of tags that label different segments of the security guide.
  • FIG. 20 is a block diagram illustrating an example of a security management platform configured to detect security events by examining netflow data acquired from one or more sources.
  • FIG. 21 is a block diagram illustrating an example of a security management platform.
  • FIG. 22 is a block diagram illustrating an example of an internal network (also referred to as an “entity network,” “organization network,” or “customer network”).
  • FIG. 23 is a block diagram illustrating an example of an Internet service provider (ISP) fabric.
  • FIG. 24 depicts a flow diagram of a process for detecting a security event involving a computing device.
  • FIG. 25 depicts a flow diagram of a process for actively probing a computing device that resides on a computer network under examination.
  • FIG. 26 depicts a flow diagram of a process for constructing a list of computing devices similar to a computing device that has experienced, or otherwise been involved in, a security event.
  • FIG. 27 depicts a flow diagram of a process for determining whether a computing device is part of a botnet.
  • FIG. 28 depicts a flow diagram of a process for determining whether a computing device has been involved in a Domain Name Servers (DNS) tunneling event.
  • FIG. 29 is a block diagram illustrating an example of a processing system in which at least some operations described herein can be implemented.
  • The drawings depict various embodiments for the purpose of illustration only. Those skilled in the art will recognize that alternative embodiments may be employed without departing from the principles of the technology. Accordingly, while specific embodiments are shown in the drawings, the technology is amenable to various modifications.
  • DETAILED DESCRIPTION
  • A computer network is a digital telecommunications network that allows computing devices to share resources. FIG. 1 depicts an example of a network arrangement 100 in which multiple computing devices (also referred to as “nodes”) communicate via a computer network 108. The nodes couple an originating device 102 (e.g., a desktop computer) to a recipient device 106 (e.g., a computer server). Thus, the nodes allow data packets to be transmitted between the originating device 102 and the recipient device 106. Examples of nodes include switches (e.g., switches 104 a, 104 d), routers (e.g., routers 104 b, 104 c), etc.
  • Each node represents a possible entry point into the computer network 108. The entry points could be, and often are, from different points within the computer network 108.
  • The ability to communicate across vast distances via computer networks (e.g., the Internet) has facilitated significant changes in everyday life and commerce. For example, computing devices located in different countries can readily communicate with one another to conduct a business transaction. However, the interconnectivity facilitated by computer networks can also be used maliciously, and the ease of communicating via these computer networks can make it difficult to identify unauthorized activities performed by bad actors.
  • One technique for managing the threat of malicious actions involves actively monitoring traffic flows traversing a computer network. This technique may also be referred to as “netflow monitoring.”
  • FIG. 2 illustrates the concept of netflow data through the use of a mailbox metaphor. When an envelope is dropped in a mailbox, certain information will be apparent to the deliverer (here, United States Postal Service). For example, the deliverer will be able to readily establish who sent the envelope, who the intended recipient is, when the envelope was sent, how heavy the envelope is, the response cadence, etc. However, some information will not be apparent to the deliverer. One example of such information is the contents of the envelope. The deliverer will also be unaware of any envelopes delivered by another deliverer (e.g., FedEx, UPS, or DHL).
  • In the context of data packets, similar information can be derived from netflow data. For example, a mechanism that monitors netflow data can readily establish who sent a data packet (i.e., the source), who will receive the data packet (i.e., the destination), when the data packet was sent, how large the payload is, the response cadence, etc. By examining netflow data, a holistic view of traffic flows traversing a computer network can be established. For example, an administrator may be able to observe where traffic is coming from, where traffic is going to, how much traffic is being generated, etc.
  • FIG. 3 is a diagrammatic representation of a local network 300 that illustrates how organizations have conventionally used netflow data. Generally, an organization will monitor the traffic flows at all public-facing Internet Protocol (IP) addresses the organization owns or controls by putting flow collectors on these perimeter nodes 302 a-c. Such action provides several benefits. First, the flow collectors can readily detect irregular volumes of traffic through these perimeter nodes. Second, the flow collectors can readily stop traffic flows destined for certain recipients (e.g., recipients in foreign countries) before the data packets leave the local network 300.
  • However, these conventional solutions suffer from several drawbacks. First, flow collectors simply cannot always capture all traffic flows entering/exiting the local network 300. For example, due to cost and labor limitations, an organization will typically opt not to monitor computing devices residing within the local network 300 that do not normally communicate. As such, any data packets that go to or come from these computing devices may be missed. Second, because flow collectors only use IP addresses as a unique routing number, higher-level analysis of security threats cannot be performed. Third, flow collectors cannot perform hop analysis beyond the first connection outside of the local network 300 (also referred to as the “first hop”).
  • Introduced here, therefore, are security management platforms configured to identify, assess, and monitor organizational vulnerability to security threats. By monitoring netflow data regarding the traffic traversing a computer network (e.g., the Internet), a security management platform can identify security threats that would otherwise go undetected. For example, a security management platform may be configured to identify security threats to a local network (also referred to as an “internal network”) associated with an organization. However, rather than monitor the traffic leaving public-facing IP addresses residing within the internal network, the security management platform can instead monitor global traffic traversing the Internet and then filter the global traffic to identify traffic originating from the internal network, traffic destined for the internal network, or any combination thereof.
  • Some embodiments of the technology described herein concern scanners (also referred to as “scanning mechanisms”) that can be deployed on one or more computer networks, as well as a repository that includes data returned by these scanner mechanisms. If a security management platform is configured to identify security threats to a local network, then a scanner can be deployed on the local network and/or the Internet. A scanner may comprise a distributed system capable of sending a wide variety of data packets to the public-facing IP addresses of a computer network under examination in an effort to provoke a response. In some embodiments the scanner sends data packets to all public-facing IP addresses of the computer network, while in other embodiments the scanner sends data packets to some public-facing IP addresses of the computer network. These data packets can be sent by the scanner in accordance with Internet Protocol version 4 (IPv4) or Internet Protocol version 6 (IPv6). IPv4 provides 232 (approximately 4.3×109) addresses while IPv6 provides 2128 (approximately 3.4×1038) addresses. Thus, a scanner could be configured to send all sorts of different signals to the computing device(s) that reside in the computer network under examination.
  • Embodiments may be described with reference to particular network configurations, protocols, networks, etc. However, those skilled in the art will recognize that these features are equally applicable to other network configurations, protocol types, network types, etc. For example, while certain embodiments may be described in the context of the Internet, the relevant feature(s) may be used in conjunction with other types of computer networks (e.g., internal networks associated with organizations).
  • Moreover, the technology can be embodied using special-purpose hardware (e.g., circuitry), programmable circuitry appropriately programmed with software and/or firmware, or a combination of special-purpose hardware and programmable circuitry. Accordingly, embodiments may include a machine-readable medium having instructions that may be used to program a computing device to perform a process for collecting netflow data for a computer network, fusing the netflow data together with other information to create a holistic view of the network infrastructure, identifying vulnerabilities in the network infrastructure, assessing threats to the computer network, remediating the threats, etc.
  • Terminology
  • References in this description to “an embodiment” or “one embodiment” means that the particular feature, function, structure, or characteristic being described is included in at least one embodiment. Occurrences of such phrases do not necessarily refer to the same embodiment, nor are they necessarily referring to alternative embodiments that are mutually exclusive of one another.
  • Unless the context clearly requires otherwise, the words “comprise” and “comprising” are to be construed in an inclusive sense rather than an exclusive or exhaustive sense (i.e., in the sense of “including but not limited to”). The terms “connected,” “coupled,” or any variant thereof is intended to include any connection or coupling between two or more elements, either direct or indirect. The coupling/connection can be physical, logical, or a combination thereof. For example, devices may be electrically or communicatively coupled to one another despite not sharing a physical connection.
  • The term “based on” is also to be construed in an inclusive sense rather than an exclusive or exhaustive sense. Thus, unless otherwise noted, the term “based on” is intended to mean “based at least in part on.”
  • The term “module” refers broadly to software components, hardware components, and/or firmware components. Modules are typically functional components that can generate useful data or other output(s) based on specified input(s). A module may be self-contained. A computer program may include one or more modules. Thus, a computer program may include multiple modules responsible for completing different tasks or a single module responsible for completing all tasks.
  • When used in reference to a list of multiple items, the word “or” is intended to cover all of the following interpretations: any of the items in the list, all of the items in the list, and any combination of items in the list.
  • The sequences of steps performed in any of the processes described here are exemplary. However, unless contrary to physical possibility, the steps may be performed in various sequences and combinations. For example, steps could be added to, or removed from, the processes described here. Similarly, steps could be replaced or reordered. Thus, descriptions of any processes are intended to be open-ended.
  • Technology Overview
  • One benefit of the technology described herein is its ability to predictively identify and deny vectors of attack against the digital assets (also referred to as “cyber assets”) of an organization. Data from multiple sources can be intelligently fused together to create a unified workflow. In FIG. 4, for example, three unclassified Internet-scale data streams 402 a-c have been fused into a single unified workflow 404.
  • Thereafter, the unified workflow 404 can be acquired by a threat detection module 406. The threat detection module 406 can collect, structure, index, fuse, and present knowledge gained from the unified workflow 404 to one or more administrators associated with the organization on corresponding computing devices 408 a-b. For example, outputs generated by the threat detection module 406 may be accessible to each administrator via a computer program, such as a web browser, desktop application, mobile application, or over-the-top (OTT) application. In some embodiments, the computer program is available through a software as a service (SaaS) licensing/delivery model.
  • The data streams 402 a-c may include various types of data, including:
      • Network map data that can be periodically scanned and subjected to advanced data analytics. For example, network map data may be retrieved from the Internet on a daily basis, and then scanned to detect the real-time attack surface of public-facing IP addresses, computing devices, and services.
      • Netflow data that characterizes the packet exchange occurring between assets belonging to an organization and external IP addresses residing on the Internet. Different characteristics of the packet exchange can be examined, including the source IP address, the destination IP address, the communication times, the communication port, etc.
      • User agent data that may identify the class and/or version of computer programs on the network map as these computer programs make Hypertext Transfer Protocol (HTTP) or HTTP Secure (HTTPS) requests through certain Internet Service Providers (ISPs) and Content Distribution Networks (CDNs).
  • As noted above, one objective of the technology is to fuse data received from multiple sources into a unified workflow 404. Here, three unclassified Internet-scale data streams 402 a-c are fused together. Each unclassified data stream 402 a-c could correspond, for example, to network map data, netflow data, and user agent data. By examining the unified workflow 404, the threat detection module 406 can predictively identify and deny vectors of attack against cyber assets belonging to an organization.
  • Such an approach represents a major advance in the domain of “attacker's view” cyber analytics. Foreknowledge of likely attack vectors affecting the cyber assets of an organization can be predicated on comprehensive and continual knowledge of public-facing organization assets (e.g., the publicly available computing devices and services running on organization IP ranges, as well as specific contractor IP ranges) and the communications of those public-facing organization assets with external IP addresses, computing devices, and services residing on the Internet. More specifically, the threat detection module 406 can filter the unified workflow 404 to permit high-signal triage of known/emergent vulnerabilities of organization assets.
  • One or more scanners can be configured to generate/retrieve the unclassified data streams 402 a-c. Together, the threat detection module 406 and the scanner(s) may be referred to as a “security management platform.” As further described below, the security management platform may include other components as well. By design, the security management platform may be extensible across the entire Internet. Thus, the security management platform may be configured to continually interrogate Internet-connected computing devices and services to determine the status of each. Moreover, the security management platform can store data associated with these interrogations, and then analyze the data to monitor the status of each Internet-connected computing device and service over long periods of time (e.g., months, years, or indefinitely).
  • Different types of data may prove useful to the security management platform for different reasons. For example, while network map data could be used for vulnerability minimization, additional contextual knowledge may be needed to extrapolate the intent of communications and assess the vulnerabilities of assets functioning as application-layer clients behind hardened edge nodes (e.g., computer servers). Netflow data and user agent data can further enhance the security management platform's abilities in these respects, thereby accelerating cyber network defense.
  • By enriching network map data with netflow data and user agent data, the security management platform can provide network defenders (e.g., third-party services and administrators of organizations) with unprecedented visibility into the nature of communications between cyber assets and the outside world, rather than the content of these communications. Enhanced visibility may be used for critical functions such as identifying indicators of attack, blacklisting adversary infrastructure, forming predictive models of attacker reconnaissance, etc.
  • Threat Assessment and Remediation
  • FIG. 5 illustrates a network environment 500 that includes multiple scanners 502 a-c that are deployed on a computer network 504. The computer network 504 may be, for example, the Internet or a local network associated with an organization (also referred to as an “internal network”).
  • Data received by the scanners 502 a-c can be transmitted to a security management platform 506 that includes a threat detection module 508 and a repository 510. The threat detection module 508 can be configured to examine at least some of the data returned by the scanners 502 a-c, while the repository 510 can be configured to store at least some of the data returned by the scanners 502 a-c. The scanners 502 a-c may also be considered part of the security management platform 506.
  • Each scanner can be configured to send a wide variety of different kinds of data packets to some or all public-facing IP addresses of the computer network 504 under examination. These data packets can be sent by a scanner in accordance with IPv4 and/or IPv6. Thus, a scanner could be configured to send all sorts of different signals to computing device(s) that reside within the computer network 504 under examination.
  • For computing devices that execute computer software that responds to signal(s) generated by a scanner, the security management platform 506 can record any responses that are returned. For example, the security management platform 506 may cause a scanner (e.g., Scanner A 502 a) to send an HTTP GET request to a certain IP address that may ask whether a web page is hosted on the corresponding service and, if so, to return a copy of the main page. Embodiments of the security management platform 506 can perform such actions on a large scale. For example, the scanners 502 a-c could send HTTP GET requests across the entire computer network 504 (e.g., approximately 4.3 billion times across the entire IPv4 space). These requests can be submitted using a variety of different payloads for a variety of different protocols since there are many different services that can respond to such requests.
  • Unlike the case with different kinds of web servers, there are a variety of services that run on computing devices around the world. Examples of these services include the File Transfer Protocol (FTP) protocol and the Secure Shell (SSH) protocol, each of which allows non HTTP and HTTPS computing devices to be indexed. There are also a whole host of enterprise systems that respond to different protocols, for example telnet, SNMP, RDP, SMB, NetBIOS, MSSQL, and MySQL.
  • The security management platform 506 can take information learned from any returned responses and, together with data from other sources, fuse the information together to create a view of how infrastructure on the Internet is linked to different organizations. Such action enables the security management platform to better understand the status or vulnerability of each organization based on its corresponding infrastructure. In some cases, there is a lot of nuance in detecting vulnerabilities of an infrastructure. For example, observing a login prompt over a Telnet service on a specific IP belonging to a given organization indicates a vulnerability in the infrastructure for that organization, as any user attempting to sign in to the service must send credentials in clear text, enabling a network attacker to see those credentials and use them for potentially nefarious purposes. In other cases, a vulnerability may be identified merely because the infrastructure is not designed to face the public (i.e., is not designed with security in mind), and therefore can be easily exploited. For example, some protocols for industrial control systems (e.g., BACnet or Modbus) are on the Internet that, in many cases, actually predate most of the Internet. These protocols are not designed with network security in mind. Instead, these protocols provide easy, raw access to the underlying control system without requiring any authentication. Therefore, these protocols are, by their nature in terms of the protocols themselves as well as the computer software responsible for implementation, inherently insecure if made publicly accessible on the Internet, and thus can become vulnerable to all sorts of malfeasance by bad actors.
  • Some embodiments of the security management platform 506 are configured to find parts of infrastructure for organizations and their digital assets. Such action allows identification of digital assets that are not only risky, but also digital assets that an organization is not aware of. Thus, the security management platform 506 can provide a unified review of traffic traversing the computer network 504 to identify all items in a certain asset category that belong to an organization, and then provide a rank order of these items based on status and/or risk in a generalized sense.
  • The security management platform 506 may accomplish this using primary signals that include a variety of different public registration databases, as well as analytics and/or public signals available on the Internet. In some embodiments, the security management platform 506 includes a control module (not shown) that supports a visibility product (also referred to as a “visibility service”). The visibility product can tell an organization things that it doesn't know with regard to vulnerabilities, alert the organization in real time as these vulnerabilities are discovered, etc.
  • The process by which these vulnerabilities are corrected is also important. Some embodiments of the security management platform 506 include connectors (not shown) that close a control loop to provide faster responses and near real-time value delivery if there is something in an organization's local network that is a risk, such as a virus, corrupted file, or raw access point. Generally, these connectors close the control loop automatically or near automatically. However, these connectors may also be configured to only close the control loop upon receiving manual input from an administrator. The administrator may be associated with the organization or a third-party security service responsible for managing the security management platform 506. Accordingly, embodiments of the security management platform 506 can concern improving visibility into a computer network and addressing how actions can be taken to control discovered vulnerabilities. For example, if a vulnerability is automatically discovered in a computing device that resides on a local network, a policy may say that the computing device should be shut down.
  • Consider an organization that has digital assets (e.g., certificates and domain names) sitting on IP addresses that reside on an organization network. This may be referred to as the organization's network boundary. Because the security management platform 506 can see the entire Internet, the security management platform 506 can associate each digital asset with each external digital asset out on the Internet that is somehow associated with the organization.
  • Such action enables the security management platform 506 to generate a holistic picture of the organization's digital assets from the outside looking in. This picture often encompasses items that the organization never knew about. For example, digital assets may enter the organization's network boundary that the organization is completely unaware of and/or that are not under the organization's control. Digital assets may also leave the organization's network boundary because of some action performed by the organization. By monitoring digital assets associated with the organization, changes in the network boundary can be readily identified. Changes that have a particular consequence for the organization may be flagged in some manner (e.g., an alert may be posted to an interface for review by an administrator). Moreover, changes may drive a feedback loop that causes some remediation action (whose occurrence may be verified) to be performed. The remediation action may cause the organization's network boundary to shrink or otherwise be improved in some way.
  • Thus, embodiments of the security management platform 506 can not only see the organization's network boundary, but also what is moving through the organization's network boundary by combining knowledge derived from databases of network traffic information with knowledge regarding the owners of the source, destination, and/or path that the network traffic takes. These observations of network traffic passing through a given organization's network boundary can be called “flux.” The network boundary may be defined in such a manner to give the organization information about how the network boundary changes, as well as to see the flux through the network boundary. The security management platform 506 may also associate the flux with consequences (e.g., the flux is talking to a command-and-control system of a botnet, the flux is talking to some computing device within the network boundary that shouldn't be communicating, etc.).
  • In some embodiments, the security management platform 506 cooperates via partnerships with Internet service providers (ISPs) and other network service providers that record data/metadata regarding what is passing over their services. Additionally or alternatively, the security management platform 506 may partner with organizations that record data/metadata regarding what is passing across their monitored network boundary. Accordingly, the security management platform 506 may observe IP addresses that are “talking” to other IP addresses. The security management platform 506 may also receive information such as the ports and protocols these IP addresses are using, whether communication is occurring in accordance with Transmission Control Protocol (TCP) or User Datagram Protocol (UDP), whether the communication is a virtual private network (VPN) transaction using a protocol such as Internet Protocol security (IPSec), etc. Accordingly, a massive amount of data may be received by the security management platform 506 (e.g., on the order of about a petabyte per day). Because it is typically too expensive to process all of this data, the security management platform 506 can intelligently determine which data to process so that security-related actions are more relevant.
  • In some embodiments, the security management platform 506 defines network boundaries for certain organizations (e.g., current and/or prospective customers of a security service facilitated by the security management platform 506). In such embodiments, the security management platform 506 can draw down netflow and query the netflow for different time ranges (e.g., the last week, month, etc.). Such action enables the security management platform 506 to understand who these IP addresses are talking to, and then correlate those IP addresses with what the security management platform 506 already knows about them. Because the security management platform 506 is not instrumented only to on the perimeter of the network but rather the global internet, analysis isn't limited to a single hop, unlike conventional netflow security products. Moreover, the security management platform 506 can not only see traffic that is coming in and out of an internal network associated with an organization, but also traffic between IP addresses for which neither are part of the organization's network.
  • As a result, if traffic is routed through one or more proxy nodes, the security management platform 506 can follow the traffic past those proxy node(s) to identify the actual source. For example, if IP address 1.1.1.1 (owned by an organization) talks to IP address 2.2.2.2 and then IP address 2.2.2.2 talks to IP address 3.3.3.3, the security management platform 506 may infer that these two separate communications were actually a single communication between IP address 1.1.1.1 and IP address 3.3.3.3, even though no direct communication occurred between these nodes, and no system looking only at traffic from the organizations network boundary could infer the connection with 3.3.3.3. Said another way, the security management platform 506 may infer that IP address 2.2.2.2 was simply acting as a proxy (also referred to as a “routing conduit”). In some embodiments, the security management platform 506 is configured to perform such analysis to detect any number of hops between any number of intermediate routing conduits (e.g., if IP address 3.3.3.3 talks to IP address 4.4.4.4, IP address 4.4.4.4 talks to IP address 5.5.5.5, and so on). Thus, the security management platform 506 can observe more than conventional netflow security products by performing “n”-hop analysis.
  • The technology introduced here can be designed to correlate information about the services running on IP addresses with information about the nature/behavior of activities and communications between IP addresses. For example, a security management platform 506 can collect different types of data on the Internet, regardless of whether it is at the IP address level, certificate level, or domain name level. For IP addresses in particular, the security management platform 506 can collect quite a bit of information that can subsequently be associated with the appropriate IP address(es). For example, the security management platform 506 may query an IP address to discover what service(s) are running on the corresponding computing device and on what port(s) those service(s) are available. Moreover, the security management platform 506 may discover what service(s) used to be running on the computing device and on what port(s) those service(s) were available. Often, the security management platform 506 will also have a sense of who owns and/or is responsible for managing an IP address under review. In general, the security management platform 506 can use its sense of how IP addresses are used on the Internet for routing to a unique address much like an individual could send an envelope via the post office.
  • The security management platform 506 can then evaluate the risk of a communication entering or exiting an internal network based on which internal IP address is involved (i.e., who the communication is talking to on the internal network), as well as which external IP address is involved (i.e., who the communication is talking to on an external network, such as the Internet). For example, the security management platform 506 may determine whether the external IP address looks particularly vulnerable to takeover, is running a vulnerable service, appears to have a good way for a bad actor to take over for use as a proxy to talk to the internal network, etc.
  • One example of a correlation is when an internal IP address (also referred to as an “organization IP address” or a “customer IP address”) is communicating with an external IP address on which there is a critically vulnerable service running. Items such as Telnet, MySQL, self-signed certifications on an HTTPS service, etc., allow the security management platform 506 to get a sense of not only which external IP address(es) an internal IP address is talking to, but also why these external IP address(es) might be at risk. The security management platform 506 may also determine why the external IP address(es) might be vulnerable to use as a proxy in an attack against an internal network that includes the internal IP address.
  • The security management platform 506 can also do interesting things with new or ephemeral services. These are services are defined as those that are recently stood up at a given IP address, and stood up for a short period of time. An example would be an SSH server present on IP 2.2.2.2 for only 6 hours on one day, and never seen again at that IP. These services are of interest as there is rarely a legitimate use for such services to be communicating with a network, and malicious actors frequently stand up attack infrastructure on previously unused IPs to conducts attacks on networks by evading blacklists. these services, the security management platform 506 can observe that an IP address residing on a network is talking to IP address 1.2.3.4. In this case, assume that the communication with external IP address 1.2.3.4 is on port 80, though it could be any port with a standard protocol. If the security management platform 506 observes an incoming communication on port 80 from external IP address 1.2.3.4 and an outgoing response when no service is determined to be running on port 80 from information derived from active scans of the network, the security management platform 506 may classify this as alarming behavior. The security management platform 506 may also have an excellent infrastructure that is very hard to block, so the security management platform 506 can confidently infer that if no service is determined to be running based on the active scans, that service is in fact not running on the network under consideration (e.g., an internal network or the Internet).
  • When the security management platform 506 sees a service responding on a given port on a given IP address outside of the network that wasn't there during the last scan (e.g., from the previous day or week), then the security management platform 506 may associate the service with a potentially bad actor. For example, the potentially bad actor may have stood up the service for a malicious reason (e.g., to gain unauthorized access to digital assets in the network). The potentially malicious actor may have also stood up the service for a limited timeframe (e.g., an hour). However, if the security management platform 506 scans the network under consideration at a consistent frequency (e.g., every 2 hours, 6 hours, 12 hours, or 24 hours), then the security management platform 506 is likely to detect potential threats before any harm is caused by them. While the security management platform 506 may not immediately catch all potential threats, the security management platform 506 will typically detect when new or ephemeral services are stood up with significant success. Moreover, if a potentially bad actor tries to be clever by standing an ephemeral service up quickly and then taking it down for an attack, the security management platform 506 can see these communications and alert the appropriate individual(s).
  • A third correlation looks at the services running on the IP address belonging to the organization involved in a communication with an external IP address. If there is something that the security management platform 506 has alerted on in the past at an internal IP address that is high risk (e.g., an exposed database service or industrial control system protocol), communicating with an external IP address is an extremely high-risk behavior. In such instances, the security management platform 506 may prompt an individual associated with the network (e.g., a network administrator) to determine whether the internal IP address should be accessible on the network. Moreover, if the security management platform 506 sees the internal IP address talking to the outside world (i.e., to one or more external IP addresses residing outside the network), the security management platform 506 can alert the individual.
  • A fourth correlation doesn't necessary correlate active sensing data with global netflow data. Instead, the security management platform 506 can take advantage of the fact that even when organizations believe they are perfectly instrumented with collecting flows off their corresponding internal networks, there seem to be things that the security management platform 506 is able to observe that these organizations cannot. The security management platform 506 is often able to see the most alarming flows, such as instances where large data packets are being sent back and forth in a manner indicative of data exfiltration. In theory, these organizations think that they have flow collectors instrumented on these internal IP addresses. However, some organizations' IP addresses are consistently missed or not put in properly to their enterprise network monitoring systems. The security management platform 506 can see these flows when it examines communications traversing the Internet rather than instruments flow collector(s) along the perimeter of an organization's internal network. For this correlation, the security management platform 506 can look for internal IP addresses that have been silent for an extended duration (e.g., several days, weeks, or months). If an internal IP address goes from silent to communicating with an external IP address, the security management platform 506 can generate an alert that indicates the organization's IP address should undergo additional examination. Generally, such action is not reported to the Internet. There is also a high probability that no instrumentation exists on the internal IP address because the organization may not have been expecting it to communicate. Thus, when the internal IP address does begin outward communication, the security management platform 506 can alert an individual associated with the organization so that appropriate action can be taken if the organization is aware that such communication is occurring. Such communication can be indicative of an unauthorized entity attempting to evade security measures implemented by the organization.
  • A fifth correlation can look for multiple-hop communication patterns between a list of “bad” external IP addresses (e.g., those corresponding to known malware command-and-control servers) and internal IP addresses. Bad external IP addresses can be derived from a variety of public and private sources. Internal IP addresses, meanwhile, are those IP addresses that reside within a network under consideration. Generally, the network under consideration will be an enterprise network or set of enterprise networks that is associated with an organization. However, the security management platform 506 could also examine IP addresses accessible on the Internet, in which case the security management platform 506 may analyze communications between pairs of IP addresses. Given a list of bad external IP addresses, the security management platform 506 can look for other external IP addresses that are in direct communication with these bad external IP addresses. These other external IP addresses can be referred to as “Set P.” The security management platform 506 can then look for communications between internal IP addresses and Set P. If any communications are discovered, the security management platform 506 can generate an alert. Next, the security management platform 506 can look for any IP address that has communicated with both an intermediary IP address in Set P and an internal IP address. Any discovered flows involving these intermediary IP addresses can be flagged for further review because these intermediary IP addresses could be acting as proxies for an attack initiated by an IP address in Set P. Such a technique can be readily extended to multiple hops.
  • Each correlation can be done on a per-flow basis. Therefore, given a flow from an internal IP address to an external IP address, the security management platform 506 can discover whether any of these correlations exist.
  • Many of the actions represented by the aforementioned correlations are indicative of either malicious attacks on an organization's network or data exfiltration attempts. One thing that may be an indicator of data exfiltration attempts is the size of the data packets involved in a communication. In general, the larger the data packets, the higher the risk that the communication is part of a data exfiltration attempt. The security management platform 506 may also discover that medium-sized data packets are being sent to multiple IP addresses that are owned by the same entity. Thus, when the total payload is aggregated, the collective data conveyed by the data packets is massive. Because the security management platform 506 is able to access and/or derive information about the owner of each IP address involved in a communication, the security management platform 506 can monitor both possibilities.
  • Some embodiments of the security management platform 506 are configured for botnet tracking and/or dynamic blacklisting. A botnet is a string of Internet-connected computing devices, each of which is running one or more bots configured to collectively perform a task. For example, botnets are often used to perform distributed denial-of-service (DDoS) attacks, steal data, send spam, and allow unauthorized entities to access a targeted computing device and its network connection. In some embodiments, the five correlations described above are set up to be responsive rather than proactive. However, the security management platform 506 could also examine these risk filters as data is received from organizations (also referred to as “customers”). If a particular risk is nearly always considered bad, then the security management platform 506 may begin to be proactive with respect to the particular risk. For example, the security management platform 506 may push an appropriate instrument to the firewall on the perimeter of a network under consideration that prevents transmission of a certain type of traffic responsive to a determination that the certain type of traffic represents a significant risk to the network.
  • Some embodiments of the security management platform 506 are configured to approach dynamic blacklisting by tracking botnets through global netflow. The term “global netflow” generally refers to all traffic flows traversing the Internet. This can be done on an IP address level or another level (e.g., a port level). For example, the security management platform 506 may, in real time, monitor kinetic control nodes and their communication with bots to discover which bots are part of which botnets. These mappings can be made available to organizations so that if an organization begins to see a large influx of traffic from any of these bots, the organization can shut down the appropriate IP addresses before other IP addresses are hit. For example, thousands of bots may be part of a botnet, and five of these bots may start to send heavy amounts of traffic as part of a DDoS attack on an organization's internal network. At that point, the security management platform 506 may preemptively blacklist the other 995 bots, which could also send large volumes of traffic as part of the DDoS attack if the responsible entity rotates which hosts are responsible for sending traffic.
  • FIG. 6 illustrates a network environment 600 that includes a honeypot server 612 that may be employed as part of a security management platform designed to protect an internal network 610. A honeypot server 612 (also referred to as a “honeypot”) is a security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems residing on the internal network 610. Generally, the honeypot server 612 includes data that appears to be a legitimate part of the internal network 610 that contains information/resources of value to attackers, but the honeypot server 612 is actually isolated and monitored so that attackers can be blocked.
  • More specifically, an attacker may attempt to breach an organization's network 610 by communicating with an internal IP address via an external IP address that resides elsewhere on the Internet 602. Communications are generally received by a firewall 604, which represents the outer perimeter of the organization network 610. The firewall 604 can be communicatively coupled to a router 606, which may be communicatively coupled to the honeypot server 612 and a hub 608 connected to the internal network 610. The firewall 604 can be configured to deflect an incoming scanning attack 614 to the honeypot server 612. Such action prevents the scanning attack 614 from breaching the organization network 610 and discovering digital assets of value.
  • Botnets tend to scan for vulnerable IP addresses. Accordingly, the security management platforms described herein may periodically perform random scans throughout the Internet. In such embodiments, honeypot servers can be placed on IP addresses throughout the Internet, and the security management platform can simply wait for individuals to scan these IP addresses by pulling netflow off the IP addresses. Said another way, the security management platform may parse global netflow to identify traffic involving the IP addresses corresponding to the honeypot servers. These IP addresses may belong to organizations that knowingly agree to such action, as well as entities (e.g., third-party security services) that the organizations interact with. Often, the security management platform is looking for a sense of similarity where it can find commands coming from command-and-control infrastructure to the object responsible for scanning at least one IP address associated with a honeypot server. Example inquiries include discovering who instructed the botnet to scan the at least one IP address, when the scan occurred, who else the botnet is talking to, etc. When a bot scans a honeypot server, the security management platform can immediately pull netflow corresponding to the bot (e.g., by identifying Internet communications involving the IP address of the bot).
  • Such action allows the security management platform to see every other object the bot is talking to. The vast majority of these objects are usually other IP addresses that are being scanned.
  • The security management platform may try to find those key communications between a bot and a command-and-control center, which could correspond to a single IP address or multiple IP addresses. The command-and-control center will often be distributed. The security management platform can discover these characteristics of a botnet, as well as validate which computing device(s) the botnet is talking to at any given point in time. While some noise must be consistently removed, the security management platform can look for patterns of similarity between the way these potential new bots are scanning IP addresses associated with an organization and the way confirmed bots previously scanned these and other IP addresses. Several different pattern features can be examined, including the timing of scans, the external port(s) being scanned, what is being scanned, how these bots are behaving, etc. Any sort of similarity may increase confidence that a botnet (and, in some cases, a known botnet) is responsible.
  • By tracking communications over time, the security management platform can monitor which bot(s) are communicating with the command-and-control infrastructure. This allows the security management platform to build a dynamic blacklist of bots that are associated with the command-and-control infrastructure. More specifically, the security management platform can maintain a list of command-and-control nodes and/or a list of bots. These lists may be associated with different confidence levels (e.g., the security management platform may have high confidence in the accuracy of the list of command-and-control nodes and lower confidence in the accuracy of the list of bots). Thus, for all IP addresses owned by one or more organizations, the security management platform can find interceptions for every command-and-control infrastructure being monitored. The organization(s) may represent some or all of the organizations whose internal networks are being monitored by the security management platform. If the security management platform discovers that an external IP address associated with a command-and-control node and an IP address associated with an organization are communicating with the same object, the security management platform may alert the organization.
  • There are also other ways to acquire IP addresses that are associated with command-and-control centers. One key feature present in some embodiments is integration, where there are other lists that have been populated by individuals who have indicated that an IP address might be associated with a command-and-control center but the IP address does not usually talk to internal networks directly. Rather, the IP address may communicate with an organization's network through one or more compromised hosts. Attackers will typically be completely unaware that the security management platform has this type of visibility into communications. As a result, if the security management platform has a list of IP addresses associated with a command-and-control center, the security management platform can readily determine if an organization is talking to object that is likely compromised and is itself communicating with an attacker. The security management platform can also chain multiple instances together for a higher-order analysis of communications (e.g., of second hop, third hop, etc.).
  • Some embodiments of the security management platform also include a risk filter. For example, the Federal Government of the United States recently released a list of Hidden Cobra IP addresses that are associated with North Korea. All of these IP addresses can be put into a risk filter. Then, if the security management platform sees an organization talking to an external IP address on the list, the security management platform can estimate a sense of risk with the external IP address. The security management platform may alert the organization if the sense of risk exceeds a certain threshold.
  • In a botnet attack, a command-and-control center generally relays orders to multiple bots that specify how these bots should scan IP address(es) of interest. For example, the command-and-control center may order a first bot and a second bot to scan a given IP address at some future point in time. The first and second bots may remain silent until then. Before these bots attack (e.g., via some sort of denial-of-service (DoS) attack), the commend-and-control center sends instructions to each bot indicating that it is time to attack. By looking at communications between the command-and-control center and the multiple bots, the security management platform can observe different elements of this approach. For example, the security management platform may detect that an external IP address will be part of an attack before the attack actually occurs and automatically blacklist the external IP address.
  • Some remediation actions may be manually performed. For example, an individual (e.g., a network administrator) may manually cause certificates on an internal network to be upgraded. Some actions performed by the security management platform may be manually prompted while others are automatically initiated (e.g., a provisioning module may periodically update infrastructure by distributing certificates across an organization's network). For example, an object could be reimaged if the flow directed to/from the corresponding IP address was suspicious. As another example, a local network could be segmented from the Internet based on risk. Similarly, a subset of a local network could be segmented from other parts of the local based on risk.
  • The risk of an IP address could also be pushed organization-wide across a firewall to make sure that no computing devices managed by the organization are able to communicate with the IP address. In some embodiments, a log of IP address(es) associated with high risk is maintained by the security management platform. Some of these actions can be facilitated by an automation orchestration framework that works with the security management platform to address threats across an entire organization.
  • Part of the feedback loop employed by the security management platform could be implemented via a ticketing system. The ticketing system can be configured to generate an action ticket that is picked up and used by the security management platform to improve future actions. Alternatively, the action ticket may spawn some other action that ultimately results in feedback indicating that the original action is closed. Thus, these action tickets could be used to validate, for example, that a change actually occurred. Some embodiments of the security management platform also provide continuous monitoring on an ongoing basis and generate alerts upon observing a progression in consistent changes. Some remedial actions might be entirely internal (i.e., performed only on the IP addresses and/or computing devices residing on an organization's network). Some remedial actions might involve interactions with other organizations (e.g., when a domain name is changed, an IP address is updated, etc.). Said another way, some remedial actions may require that the security management platform interact with a third party or facilitate an interaction between an organization and a third party. Thereafter, the security management platform can validate the feedback loop.
  • Accordingly, the first step may be for a security management platform to identify vulnerabilities in an internal network. Then, once the vulnerabilities have been identified, the security management platform can take the action(s) necessary to remediate these threats. Any number of actions could be performed. For example, the security management platform may automatically generate a blacklist by capturing a log of risky IP addresses. The blacklist could then be applied in accordance with a specific policy inside the organization. Thus, the security management platform may observe communications in real time, and these observations can drive the creation and/or augmentation of a blacklist.
  • In general, the security management platform will send out a signal to one or more IP addresses. The security management platform can then examine any responses that are received from these IP address(es). Each response will typically include data and metadata that allows the security management platform to infer information about the source (e.g., the corresponding computing device), computer software running on the source, organizational associations, vulnerabilities, and/or misconfigurations. This information can then be fused together with additional data to gain a better understanding of the communications involving these IP address(es).
  • In conventional flow analysis, a security product would monitor netflow across the perimeter of an internal network associated with an organization and draw simple conclusions regarding security of the organization. For example, if data packets were transmitted to an IP address located in China or Russia, then a security product is likely to determine that a high security risk exists. However, such action is not enough to discover more advanced security threats. By focusing on the features and/or conduct of IP addresses involved in communication, a security management platform can address the drawbacks of conventional security products. More specifically, the security management platforms described herein can examine large amounts of fine-grain details regarding communications traversing a network (e.g., a local network or the Internet), and then perform remediation action(s), as necessary, in real time as security threats are identified. The security management platform can also fuse data from different sources together in a manner that allows corrective actions to be more rapidly taken (e.g., before the security threat matures into an issue).
  • In some embodiments, the security management platform can discover the assets (e.g., IP addresses) belonging to an organization across the entire Internet. After these assets have been identified, the security management platform can look for flows emanating from (or directed to) the assets on the boundary on a network associated with the organization. Said another way, the security management platform can examine traffic entering the Internet from the organization's network, or vice versa, even if the network has not been explicitly instrumented by the organization, and even if the organization itself was not aware or tracking that network in their other enterprise systems. The security management platform may do this by actively scanning IP addresses accessible on the Internet. In some embodiments, the security management platform also has access to information that allows it to join these communications (e.g., by sending signals to the IP addresses and parsing responses received in return).
  • Referring again to FIG. 2, if a security entity would like to know which envelopes to inspect at a post office, it is difficult to arrive at such a determination with only an address. However, the determination can be made much easier if the security entity knows who sent the envelope (i.e., the sender), who will receive the envelope (i.e., the recipient), whether an organization is associated with the address, etc. This information allows the security entity to gain a better sense of who is shipping what to whom. Similarly, the security management platform can examine the IP address at which a communication is received, as well as additional information about any other IP addresses involved in the exchange of data packets. As noted above, the security management platform can also establish the bounds of an internal network with high confidence.
  • If an organization receives an envelope that misses the inspection process (e.g., by being dropped off somewhere other than the mailroom), the organization may be completely unaware that the envelope exists. However, the post office will know that the envelope exists because the post office is responsible for conveying the envelope from its source to its destination. The security management platform can act in a similar fashion with respect to communications traversing the Internet. In general, most organizations use instruments on IP addresses along the perimeter of their internal networks. Such a design is good at several things, including detecting irregular volumes of traffic and stopping direct flows to certain locations (e.g., foreign countries). However, this design will often miss some communications. Because the security management platform observes traffic on the Internet, the security management platform is able to see all communications to/from an organization, regardless of whether the organization is aware of these communications.
  • In determining whether it is risky for an internal IP address to communicate with an external IP address, the security management platform can consider three items: (1) details on flow; (2) details on the internal IP address; and (3) details on the external IP address. If the security management platform determines that communication poses a risk to the internal network on which the internal IP address resides, then the security management platform can communicate the risk to the organization associated with organization network. The communication may provide context regarding the internal IP address and/or external IP address, a sense of appropriate remediation action(s), etc.
  • Information regarding the internal IP address and/or the external IP address can be derived by a global scanning infrastructure that includes one or more scanners (e.g., scanners 502 a-c of FIG. 5). The global scanning infrastructure can examine the type of computing device corresponding to each IP address, who the computing device belongs to, other risk factors, etc. For example, if the security management platform discovers that the internal IP address corresponds to a Telnet computer server, then the security management platform can enrich the corresponding information by specifying that the internal IP address should not be publicly exposed on the Internet. Such action may be referred to as “tagging” data to specify additional details that are useful in determining risk. Some of these additional details can be discerned by simply knowing the internal IP address. The security management platform can integrate these additional details with information gleaned by active scans and other databases, and then apply analytics to determine how strong the association is in a statistical sense.
  • As noted above, organizations may occasionally be unable to see all of their flows. Surfacing this information enables these organizations to make decisions regarding what action(s), if any, should be performed based on which flows represent the greatest risks. Historical data (e.g., data examined over the last several months or years) for a given internal network or a given IP address could also be used to determine whether the frequency of security risks is increasing/decreasing, whether security risks are affecting the same IP addresses or different IP addresses, etc.
  • Risk Filters
  • In terms of the five risk filters described above, each risk filter requires that a first IP address be communicating with a second IP address. Generally, this occurs in the form of an internal IP address that is communicating with an external IP address. In general, internal IP addresses are those IP addresses residing within the boundary of an organization network associated with an organization, while external IP addresses are those IP addresses residing outside of the boundary of the internal network. Rather than examine flows traversing an internal network, the security management platform can filter global netflow (e.g., all Internet traffic) down to flows that involve internal IP addresses. That is, the security management platform can filter the global network down to flows that have an internal IP address as either the source or destination.
  • For the first risk filter, the security management platform can pull active sensing data to see if the external IP address has any exceptionally vulnerable services running on it. This can include a set of insecure-by-design protocols, as well as easily and/or commonly exploited services. Examples of vulnerable services include:
      • Industrial control systems such as BACNet, Modbus, DNS3, Vxworks, Niagara Fox, and EthernetIP;
      • Database services such as MSSQL, MySQL, Postgres, Redis, and MongoDB;
      • Audio/video (A/V) protocols such as Session Initiated Protocol (SIP) and Real Time Streaming Protocol (RTSP);
      • Network protocols such as Telnet, NetBIOS, Simple Network Management Protocol (SNMP), Virtual Network Computing (VNC), Remote Desktop Protocol (RDP), and Server Message Block (SMB); and
      • Old web server protocols such as File Transfer Protocol (FTP) and Secure Shell (SSH), as well as computing devices with default web server configurations from a variety of manufacturers.
  • For the second risk filter, the security management platform can pull active sensing data to see if an active service or an open port has been observed running on the port associated with the external IP address of a given flow record. The second risk filter may be tunable, with a parameter specifying how far into the past the security management platform looks (e.g., 1 hour, 1 day, 6 days, 2 months, etc.) for services that have responded to active sensing. The security management platform can optionally determine to perform an active scan of the external IP address on the corresponding port found in the flow record to get a higher assurance. Said another way, the security management platform can send a signal intended to provoke a response to the external IP address as a real-time confirmation as to whether a service is present at the external IP address.
  • For the third risk filter, the security management platform can take the same set of vulnerable services as described above with respect to the first risk filter and apply these to the internal IP address of the flow record rather than the external IP address. The security management platform can optionally generate alerts based on whether traffic appears to be inbound or outbound from the internal IP address. Outbound traffic is generally riskier because it implies that an action is being taken by the vulnerable service, thereby indicating potential compromise of the corresponding computing device. The security management platform can also generate alerts based on whether communication appears to be bidirectional (e.g., the security management platform can check for the presence of an acknowledgment (ACK) in the case of TCP, or multiple bidirectional flow records in the case of UDP). Bidirectional communication is generally riskier than unidirectional communication where the security management platform only observes synchronize messages (SYNs).
  • For the fourth risk filter, the security management platform can examine historical netflow from all parts of an organization's network. For example, the security management platform can look at a variety of histograms of flow activity to and from each internal IP address and block of internal IP addresses (e.g., those corresponding to certain divisions within the organization). The security management platform may have tunable triggers for data volume and communication frequency, among other features. These tunable triggers allow the security management platform to readily set thresholds that allow organizations to be alerted if, for example, a block including 24 internal IP addresses has had no communications for the past 30 days and then suddenly begins sending 50 megabytes (MB) of outbound traffic per day. In some embodiments, thresholds are fixed. For example, a threshold may be manually set at 25 MB, 50 MB, 100 MB, etc. In other embodiments, thresholds are variable. For example, a threshold may be configured to automatically tune itself over time based on other signals, such as the total traffic volume within the internal network, the number of computing devices on the internal network, the time of day, the day of week, etc.
  • For the fifth risk filter, Set P of known “bad” external IP addresses can come from a variety of sources, including threat intelligence that is publicly posted (e.g., by the Federal Government of the United States) or disclosed by organizations, as well as from other sources such as honeypot servers maintained by the security management platform. Once Set P is known, the security management platform can filter global netflow and generate alerts for those flow records corresponding to communications directly between these “bad” external IP addresses and internal IP addresses belonging to an organization under examination. The security management platform may also filter global netflow and generate alerts for those external IP addresses that communicate with both “bad” external IP addresses and internal IP addresses. In some embodiments, Set P is associated with a specific time window (e.g., those external IP addresses in the set may only be deemed “bad” for a certain period of time). Those skilled in the art will recognize that “bad” external IP addresses may not necessarily be associated with botnets. Moreover, the “bad” external IP addresses may be organization-specific. For example, for a financial company based in the United States, the “bad” external IP addresses could include any IP addresses associated with foreign corporations designated by the Office of Foreign Assets Control (OFAC). As another example, for computing devices operated by the Federal Government of the United States, the “bad” external IP addresses could include any IP addresses associated with Kaspersky Labs. Thus, Set P could vary on a per-organization bases.
  • Each of these risk filters can use netflow regardless of its source. For example, in some embodiments netflow is received directly from ISPs, while in other embodiments netflow is received directly from the organizations themselves. For example, netflow may include traffic collected by flow collector(s) arranged along the perimeter of an internal network by the organization. The technology can operate the same even if organizations provide their own flows in addition to flows provided by the ISPs. In such embodiments, the security management platform can simply treat the excess traffic as additional netflow to be considered (e.g., the security management platform may not assign a higher priority to flows from a particular source).
  • As shown in FIG. 7, each risk filter can be applied to communications between an internal IP address (also referred to as a “customer IP address” or an “organization IP address”) and an external IP address. Here, the internal IP address is depicted as a “C” endpoint while the external IP address is depicted as an “E” endpoint.
  • Details regarding the flow between these endpoints is typically derived from global netflow (e.g., by collecting, filtering, and examining traffic on the Internet). These details could also be derived from flow coming off the internal network associated with an organization on which the internal IP address resides. As noted above, a security management platform will typically reside outside of the organization network to gain a better understanding of all flows related to the organization. However, to gain a complete picture of risk, the security management platform may examine all flows related to the organization that traverse the internal network. In such embodiments, the security management platform can compare flows detected in the global netflow to flows detected in the netflow through the perimeter of the organization network.
  • Because the security management platform scans global netflow, the security management platform may also have details regarding the destinations of communications leaving the organization network (e.g., leaving each internal IP address) and the objects residing outside of the internal network. For example, the security management platform may discover the presence of these via an active sensing procedure in which a signal is directed to each object with the intent of provoking a response from which information about the corresponding object can be learned. Accordingly, the security management platform can understand whether the internal IP address is communicating with an external IP address, what type of computing device is associated with the external IP address, whether the external IP address is associated with a malicious entity, etc.
  • There are generally two different sources of information that may be of interest inside an organization under review:
      • Flow information that specifies details regarding the actual target inside the organization; and
      • Provisioning information that specifies what type of computing device (e.g., desktop computer, computer server, payment processing system, etc.) is responsible for communicating via the internal IP address.
  • Organizations are often particularly interested in being alerted to flows involving an internal IP address that is part of their demilitarized zone (DMZ), and thus represents a vulnerable point in the internal network. In security, a DMZ is a physical or logical subnetwork that contains/exposes an organization's external-facing services to an untrusted network, such as the Internet. Internal network architecture typically cannot be understood from global netflow because it sits behind a firewall. However, an organization will often be aware of the most vulnerable points in its internal network, so the organization may work with the security management platform to identify whether any of the internal IP addresses at risk fall within the DMZ.
  • One benefit of the security management platforms described herein is their ability to go from a reactive threat strategy to a proactive threat strategy, or vice versa. For example, a security management platform may notify an organization that a threat exists even through the organization previously discounted the risk because it did not have full information regarding the threat. Because the security management platform can observe both internal and external IP addresses, the security management platform can recommend that the organization inspect those internal IP addresses that may be used to gain unauthorized entry into the internal network.
  • The security management platform may also determine whether any patterns exist by examining the results of analyzing a single internal network corresponding to a single organization or multiple internal networks corresponding to multiple organizations. If the security management platform discovers a pattern where a feature (e.g., presence of a certain vulnerable service, communication with a certain external IP address, etc.) corresponds to a high level of risk, then the security management platform may opt to proactively perform the appropriate remediation action(s) when seeing the feature in the future. Rather than reactively inspecting communications, the security management platform can proactively defend organization networks against known risks.
  • FIG. 8 depicts several different types of risk filters: (1) communications with critically vulnerable IP addresses; (2) communications with IP addresses having a known bad reputation; (3) communications with new or ephemeral services; and (4) new traffic from non-outbound gateways. Those skilled in the art will recognize that any number of these risk filters could be used by the security management platform when inspecting an internal network.
  • FIGS. 9-12 depict examples of these different types of risk filters. FIG. 9 illustrates a scenario in which an external IP address is communicating with an internal IP address running a critically vulnerable service (e.g., Telnet). FIG. 10 illustrates a scenario in which an internal IP address is communicating with an external IP address having a known reputation. Here, for example, the external IP address has a reputation of being high risk because it is running a critically vulnerable service (e.g., Telnet) that heightens the risk the external IP address will be used as a proxy. FIG. 11 illustrates a scenario in which an internal IP address is communicating with an external IP address that is running a new or ephemeral service but has not been blacklisted. In such scenarios, the security management platform may actively scan the external IP address and examine what response(s), if any, are returned. For example, the security management platform may determine whether an ACK is received in the case of TCP, or may examine data packet size in the case of UDP. FIG. 12 illustrates a scenario in which an internal IP address that was previously silent for an extended duration (e.g., several days, weeks, or months) has begun communicating with an external IP address. This security management platform may generate an alert intended to ensure that the organization is aware the internal IP address has begun communicating, thereby prompting performance of any necessary remediation action(s) (e.g., taking the computing device corresponding to the internal IP address offline).
  • User Agent-Based Threat Correlation
  • By working with an organization, a security management platform can identify the endpoints (e.g., desktop computers and computer servers) that persistently reside on an internal network. Moreover, by examining global netflow, the security management platform can identify the endpoints (e.g., mobile phones and laptop computers) that temporarily reside on the internal network. To gain a better understanding of the internal network as a whole, the security management platform must be able to monitor persistent endpoints and non-persistent endpoints.
  • In some embodiments, the security management platform is configured to identify the types of endpoints that are on the internal network. Such action can be performed outside the internal network without having to instrument any endpoints on site. Instead, the security management platform can do this using user agents. Each user agent can include one or more scanners (e.g., scanners 502 a-c of FIG. 5) configured to communicate with endpoints. When an endpoint makes a Web request, the endpoint will provide information to the intended recipient of the Web request. This information can specify, for example, what type of endpoint is involved, what sort of data is involved, what service(s) are running on the endpoint, what type of hardware is included in the endpoint, etc. This information is generally provided so that content returned by the intended recipient is appropriately sized, formatted, etc. While user agents are instrumented outside of the internal network, the user agents can determine characteristic(s) of endpoints on the internal network by examining communications originating from or directed to these endpoints. For example, a user agent could determine what types of user-facing computer software are running on the internal network.
  • Different actions may be taken based on what is discovered with respect to the endpoints on the internal network. For example, the security management platform may discover that an endpoint is running the Windows XP® operating system. In such a scenario, the security management platform can identify the operating system as no longer supported or allowed by organization policy. Similarly, the security management platform can look for outdated computing devices. Many organizations disallow particular types of computing devices (e.g., those made in China) because they have been known to exfiltrate information. By examining the information learned by user agent(s), the security management platform can see which endpoints, if any, are not complying with organization policies. Moreover, the security management platform can observe flows off the internal network to see if any endpoints are leaking proprietary information to external IP addresses, generating signals that make it possible for external IP addresses to target the endpoints in return, etc.
  • For example, an endpoint on the organization network may have a script that betrays information about items of interest, such as how directory structures are set up. If the security management platform discovers that the script exists, then the security management platform can determine that the endpoint is likely to be targeted by an unauthorized entity (also referred to as an “outside entity”). In some embodiments, the outside entity provides a payload that causes the endpoint to run in an undesired manner. For example, the payload may prompt the endpoint to direct communications to an unintended recipient. The security management platform can also look for malware or check for audits (e.g., by examining whether updates have occurred on schedule as expected and/or in accordance with organization policies).
  • The security management platform may also monitor endpoints over time. For example, the security management platform can see where endpoints have been in the past, predict where endpoints will be in the future, etc. Such action can be used to facilitate compliance with organization policies. For example, the security management platform may identify endpoints that have violated geographical restriction policies (e.g., some organizations may not allow mobile phones or laptop computers to be brought into certain countries). Thus, the security management platform can monitor whether endpoints associated with an organization are at risk, as well as whether the endpoints have complied with organization policies.
  • As more organizations suffer breaches, the security management platform can track how exposed an organization was during a breach. This can be accomplished by examining the traffic that flowed into and out of the organization network corresponding to the organization before, during, and/or after the breach. The security management platform may have access to the traffic even if it is encrypted while flowing over the boundary of the organization network. Additionally or alternatively, the security management platform may receive unencrypted traffic from ISPs.
  • In some embodiments, the security management platform acquires data regarding traffic from multiple sources. For example, the security management platform may acquire encrypted traffic from scanner(s) instrumented along the boundary of an internal network, unencrypted traffic from ISPs, and/or unencrypted traffic from CDNs configured to decrypt communications addressed to them. One benefit of such an approach is that the security management platform can identify what type of endpoints are on the organization network that are not otherwise managed. Generally, the security management platform is less likely to see non-persistent endpoints on a consistent basis, though abnormal communication activities can still be discovered. For example, a laptop computer may not be persistently on the organization network when it is turned on/off, moved between different locations, etc. However, the security management platform could still detect abnormal communication activities (e.g., if the laptop computer begins sending large amounts of data at 3:00 AM when it normally doesn't operate).
  • Communication activities represented by netflow can also be examined to determine what an endpoint is, what computer software is running on an endpoint, etc. Some endpoints may actually specify certain characteristics about themselves in outgoing communications. For example, the security management platform may discover an outdated endpoint that is running the Windows® NT 2000 operating system if there is traffic coming from the outdated endpoint. If traffic is coming from the outdated endpoint, then the outdated endpoint is connected to the open Internet (and thus open to attack by an unauthorized entity).
  • While multiple endpoints will often reside within the perimeter of an organization network, these endpoints may randomly communicate with external objects that reside outside of the organization network. This is referred to as the “network boundary concept.” If an endpoint is called by an external IP address or visits a malicious website (e.g., a phishing website), the endpoint will not be protected because it is making an outbound connection. Endpoints within the organization network can still be within a boundary of interest because these endpoints are capable of calling external objects. However, the focus may still be on what these endpoints are, rather than what they're doing, because their only conduct is calling external objects, some of which the security management platform may have instrumented. The security management platform may also look at the different kinds of commands produced by these endpoints (e.g., instructions such as PUT for sending data and GET for receiving data).
  • Some embodiments of the security management platform are configured to monitor the content of data packets included in communication activities. For example, an HTTP GET request can include a header (also referred to as the “user-agent header”) in which it is highly recommended to include a description of the source. Several different standards exist that specify what kind of information should be included in the header. For example, the header may specify what kind of browser is running on an endpoint, whether a mobile application generated the data packet, etc. Often, the header will include information about the underlying hardware of the endpoint and/or what operating system is running on the endpoint.
  • Some embodiments of the security management platform provide context to streams of information based on its knowledge of objects distributed throughout the entire Internet. A security management platform can add tremendous value by providing more details and context about how objects (e.g., internal or external IP addresses) are communicating, as well as how these objects relate to an organization and the organization's network. By gaining a better understanding of these communication activities, the security management platform can deliver more value of consequence to the organization. For example, the security management platform can indicate how communication activities related to the organization have changed over time (e.g., in volume, which internal IP addresses are involved, which external IP addresses are involved, etc.). As another example, the security management platform can discover when an endpoint that was previously unrelated to the organization has joined the organization's network.
  • The security management platform can also examine datasets that help in the creation of a map of organizations' network boundaries. These datasets may be created by organizationally unique user agents that are instrumented in previously unidentified IP address space. In some embodiments, these datasets are used to associate blocks of IP addresses with corresponding organization(s). Similarly, if there is a preponderance of flows between two blocks versus other blocks using a protocol such as VPN, IPSec, Generic Routing Encapsulation (GRE), etc., then the security management platform may infer that these two blocks belong to the same organization.
  • Objects observed by the security management platform could also be pulled into different correlations and actions. Said another way, the security management platform can observe a series of objects and then, based on these observations, take appropriate action(s). For example, if the security management platform discovers an outdated endpoint running obsolete or unsupported computer software, the security management platform can alert the corresponding organization that action should be taken to address the security risk. Generally, an individual associated with the organization (e.g., an administrator working on site) will have to find the outdated endpoint and perform the appropriate action(s) (e.g., retire or update the outdated endpoint).
  • Actions may be based primarily on visibility. For example, if an endpoint is manufactured by a company that is included in an approved security baseline, the security management platform may generate an alert and/or create a ticket indicating that the endpoint is a low security threat. The actions could also be based primarily on control. For example, if an endpoint executing an out-of-date version of the Microsoft Windows® operating system is discovered on a given subnetwork, the security management platform may push an alert to an automatic provisioning system that causes the endpoint to be upgraded, scheduled for maintenance, etc. Alternatively, the automatic provisioning system may cause the given subnetwork (e.g., an internal local area network (LAN)) to be temporarily segmented from other networks as a proactive, preventative measure.
  • As noted above, the security management platform may be configured to infer, from data generated by user agents, what version of an operating system is running on an endpoint, what kind of computer software is installed on the endpoint (e.g., based on the software update agent for different installed computer software), and the version of installed computer software. From this information, the distribution of computer software and different versions can be inferred across an organization, as can the difference (also referred to as the “delta”) between internal network reality and what baseline policies/mandates stipulate. The security management platform may issue an alert if a discrepancy is discovered. For example, an alert could be generated upon discovering that the number of outdated versions of certain computer program exceeds a threshold.
  • In general, the security management platform focuses on generating alerts for certain categories of information. Examples of these categories include:
      • Out-of-date computer software (e.g., how many instances of the Windows XP® operating system are still present on an internal network, how many instances of Internet Explorer® 6 are still present on an internal network that are at risk of easy exploitation by a watering hole attack, etc.);
      • Vulnerable or banned computing devices (e.g., Chinese-manufactured computing devices made by Huawei Technologies Co., ZTE Corporation, and Xiaomi Inc. are banned from internal networks related to the Federal Government of the United States and many companies);
      • Vulnerable computer software (e.g., many mobile applications are known to beacon information about the mobile phones on which they are installed in violation of corporate data policies);
      • Malware beacons (e.g., known user agent signatures can be compared against known malware samples given by a threat intelligence feed or derived through a reverse engineering effort to determine whether any matches exist); and
      • Uniquely identified communications (e.g., are there user agent strings present on an internal network that are unique to the corresponding organization and could these user agent strings be used by an unauthorized entity to identify connections that the internal services are making with the Internet).
    Risk Filter Reports
  • FIGS. 13-14 depicts several examples of reports that may be generated by a security management platform. FIG. 13 depicts a report that includes records that satisfy one or more filters. Here, four different filters have been specified (i.e., ACK, Flows to Customer, All Reasons, and Last 7 Days), and records satisfying all four filters have been grouped by port. Each record may correspond to a different security threat to an internal network the security management platform is responsible for managing. For example, Port 80 is associated with four different records corresponding to communications between distinct pairs of internal and external IP addresses. FIG. 14, meanwhile, illustrates how additional information on a record can be provided if a user (e.g., a network administrator) selects the record. For example, the user may select a record to determine what remediation action(s), if any, are recommended by the security management platform. Similarly, the user may select a record to initiate a remediation action (e.g., revoking credentials, preventing access to the Internet, or updating computer software).
  • FIG. 15 illustrates how each flow involving an internal IP address belonging to an organization can be modeled as a transmission of data packets to, or the receipt of data packets from, an external IP address. Here, for example, IP address 199.29.255.16 belonging to Space Kitty Corp has transmitted two data packets to external IP address 24.31.240.147. Other information relevant to the risk determination may also be posted to the interface for review by the user. Examples of such information include the port number, geographical location, packet size, whether an acknowledgement was received, etc.
  • FIG. 16 illustrates how individual certificates, domains, or notes associated with a record can be readily explored by a user. Upon selecting a record, a report that includes information related to the record may be shown to the user for further review. Here, for example, the report pertains to an external IP address 24.31.240.147 that communicates via port 80. Other information (e.g., the Autonomous System Number (ASN), owner, registration date, etc.) may also be shown. The user may be able to review details regarding a particular certificate, domain, or note by selecting it on the report.
  • FIG. 17 illustrates an example of a tool tip that could be shown within a filter report. A tool tip may be shown if the user hovers over an item for a predetermined duration (e.g., 2 seconds, 3 seconds, 5 seconds) or performs a certain action involving the item (e.g., right clicks or double clicks). Tool tips can relate to a variety of topics. Here, for example, the tool tip explains the term “Traffic from Non-Gateway.” Similar explanations may be available for the other reasons shown in FIG. 17 (e.g., Inbound to Vulnerable IP and IP Reputation), as well as others not shown here.
  • FIGS. 18-19 depict portions of a security guide that summarizes various features of the security management platform. More specifically, the portion of the security guide shown in FIG. 18 describes several different kinds of risk filters. In addition to general information regarding the security management platform, the security guide could also include a glossary of often-used terms, diagram representations of different network configurations, white papers, etc.
  • FIG. 19 includes a series of tags that label different segments of the security guide. Generally, a topic header 1902 is docked along the top of the interface when the security guide is viewed on a computing device (e.g., a mobile phone, laptop computer, or desktop computer). Thus, as a user browses information related to, for example, risk filters, the relevant topic header (e.g., “Risk Filters”) may be docked along the top of the interface. When the user begins browsing information related to a different topic, a new topic header can replace the existing topic header. In some embodiments, the interface also includes a share button 1904 that, upon selection, allows a user to share the section of the security guide currently being viewed with one or more other users. Section(s) of the security guide can be shared via different forms of electronic communications, including emails, text messages, hyperlinks, etc.
  • As noted above, the security guide can include descriptions of different types of assets. Each asset type may have paragraphs explaining significance, definition, case studies, how to configure, and/or best practices. Some sections of the security guide may be publicly available, while other sections of the security guide may be private (i.e., unlocked only for customers of the security management platform able to log in with appropriate credentials).
  • In some embodiments, the security guide includes a search field 1906 that permits users to readily search the entire security guide by entering one or more terms. A user may also specify that searches should be limited to certain portions of the security guide (e.g., the portion currently being viewed). The security guide may also permit the user to specify filter(s). For example, the user could filter content of the security guide to only show best practices for each asset type.
  • Security Management Platforms
  • Security management platforms (also referred to as “security event detection systems”) able to examine traffic traversing one or more networks to detect security threats are described herein. As shown in FIG. 5, a security management platform can include a threat detection module and a repository. The security management platform may also include an interface configured to receive network traffic data and/or active probe data associated with a computing device. In some embodiments, different interfaces receive these different types of data.
  • By parsing these data, the threat detection module can determine whether any correlations exist between the network traffic data and the active probe data, as well as determine whether these correlations indicate that a security event has occurred. In the event that the correlation indicates a security event has occurred, the threat detection module can indicate that the security event is associated with a particular computing device. The threat detection module may know which computing device(s) are involved in a security event from the active probe data. The term “security event” generally refers to any event that results in an increased security threat. The communication activities corresponding to the risk filters described above would be deemed security events. Thus, examples of security events include the detection of a communication with a new or ephemeral service, detection of a vulnerable computing device residing on an internal network (also referred to as an “internal computing device,” “organization computing device,” or “customer computing device”), detection of a communication from an internal computing device to a computing device that is vulnerable to takeover and resides outside of the internal network (also referred to as an “external computing device”), detection of a communication involving an internal computing device that has not been involved in any communications for a specified time internal (e.g., several days, weeks, or months), etc.
  • More generally, a security management platform can utilize two different types of data to identify security events involving computing devices that are connected to the Internet: (1) active sensing data; and (2) netflow data.
  • Active sensing data includes information that is received from a computing device as a result of a probe of that computing device while the computing device is connected to a computer network (e.g., the Internet). Probes can actively seek information from any IP addresses accessible on the computer network. The repository may include open ports, available services, certificates, computing device information, or any other type of information available from a probe of a computing device over a network. In some embodiments, multiple probes of a single computing device are performed at different times over a certain time interval. Such action may allow the security management platform to readily discover changes in security risk over time. Moreover, multiple probes of different computing devices can be simultaneously performed at a single point in time.
  • Netflow data includes information related to traffic traversing a computer network (e.g., an internal network or the Internet). Examples include the source information and destination information for packet(s), the time of transmission and/or reception of the packet(s), hop data along the path(s) from the source to the destination, etc. Network traffic data could come from a network administrator, an organization, an ISP, a routing device (e.g., switches 104 a, 104 d or routers 104 b, 104 c of FIG. 1), a firewall device, a security information and event management (SIEM) system, or any other appropriate collection source or storage for traffic information.
  • By examining the correlation between these two data types, a security management platform can identify security threats to a computer network (e.g., an internal network associated with an organization). In some cases, timing information is used as part of the determination for security events discovered in either data type. For example, a computing device that had not communicated with any other computing devices residing outside of its local network for an extended period of time (e.g., 145 minutes, 7 hours, 30 days, 57 days, etc.) but suddenly begins communicating is typically given a higher risk score because there is a lower probability that the organization responsible for managing the computing device was monitoring the computing device to log/inspect these communications. Once a security event has been identified, the identification may trigger filtering of traffic leaving/entering the computing device. Alternatively, the identification may trigger filtering of the traffic leaving/entering the computer network on which the computing device resides. Such action may be necessary to ensure that related security threats affecting other computing devices on the computer network are also properly identified. The identification may also prompt the creation and/or modification of a blacklist, the generation of alerts regarding the communications and relevant computing device(s), the prediction of other computing device(s) that may become engaged in similar activity, etc.
  • FIG. 20 is a block diagram illustrating an example of a security management platform 2000 configured to detect security events by examining netflow data acquired from one or more sources. As noted above, the security management platform 2000 can also actively probe the IP addresses accessible on a computer network (e.g., the Internet), and then store information regarding any responses received based on the probing. When an IP address is probed, the security management platform 2000 can learn information regarding available services, open ports, software versions, certificates, metadata information, and other relevant information about the computing device corresponding to the IP address. Probes can be performed at different times so that the risk to an IP address (or the risk posed by the IP address) can be established over time by examining stored information related to the IP address.
  • IP addresses may be associated with computing devices (e.g., external system A 2010 and external system B 2012), computer networks (e.g., entity A network 2004, entity B network 2006, and entity C network 2008), and/or ISP fabrics (e.g., ISP 1 fabric 2002 and ISP 2 fabric 2014). In some embodiments, the security management platform 2000 receives netflow data directly from the source. Here, for example, the security management platform 2000 receives netflow data directly from entity C network 2008. In other embodiments, the security management platform 2000 receives network data indirectly from the source. Here, for example, the security management platform 2000 may receive netflow data associated with entity network A 2004 or external system B 2012 from ISP 1 fabric 2002.
  • As noted above, the security management platform 2000 may be configured to monitor the security of IP addresses residing on an internal network (also referred to as an “organization network,” “customer network,” or “entity network”). In such embodiments, the security management platform 2000 may communicate with the IP addresses via a first computer network (e.g., ISP 1 fabric 2002 and/or ISP 2 fabric 2014) and a second computer network (e.g., entity A network 2004, entity B network 2006, and/or entity C network 2008).
  • Netflow data can be used to infer/discover characteristics of the traffic traversing a corresponding computer network. Thus, netflow data may indicate the source of the traffic, the destination of the traffic, the time/date associated with transmission of the traffic, hop information (e.g., which route the traffic took from the source to the destination), the number of bytes transmitted, the type of data transmitted, the state of a transmission control protocol's multi-step handshake, etc. Netflow data could be received from an entity network, an external system, an existing database of traffic data, an ISP, and/or some other appropriate source.
  • FIG. 21 is a block diagram illustrating an example of a security management platform 2100. The security management platform 2100 may be, for example, the security management platform 2000 of FIG. 20 or the security management platform 506 of FIG. 5. Here, the security management platform 2100 includes a processor 2104 that has an active probe engine 2106. The active probe engine 2106 can be configured to probe IP addresses by generating signals that are transmitted via the interface 2102 across at least one computer network. In some embodiments, the active probe engine 2106 uses commands stored in an active sensing storage 2114 (also referred to as “active probe storage”).
  • Netflow data can also be received by the security management platform 2100 via the interface 2102. The netflow data can then be handled by a traffic handler 2118, which may be configured to parse, filter, and/or format traffic as necessary to be stored in a netflow storage 2116. The active sensing storage 2114 and the netflow storage 2116 may be part of storage 2112. As noted above, netflow data can be received from one or more sources that are communicatively coupled to the interface 2102 (e.g., an external system, an Internet-connected computing device, an ISP, an existing database, a firewall, a router, a SIEM system, etc.).
  • Security events can be detected by a security event detector 2110 of the processor 2104. More specifically, the security event detector 2110 can examine correlations between data stored in the active sensing storage 2114 and data stored in the netflow storage 2116 as determined by the correlator 2108 of the processor 2104. An organization can be alerted of detected security events by notifications transmitted via the interface 2102. These notifications may prompt the organization to perform some remediation action. Examples of remediation actions include filtering traffic associated with a security event, adding IP address(es) and/or computing device(s) to a blacklist, alerting an administrator about the security event and/or the computing device(s) involved in the security event, etc. In some embodiments, the correlator 2108 further examines the data stored in the active sensing storage 2114 and the netflow storage 2116 to assist the security event detector 2110 in predicting what security events are most likely to occur in the future. Predicted security events may prompt performance of any of the remediation actions described above.
  • There are many varieties of active probes, and each variety can be used to collect information about the state of a particular IP address and its corresponding computing device. Active probes may also be used to gain information about the state of all IP addresses and their corresponding computing devices that are connected to a given computer network (e.g., an internal network or the Internet). For example, for a given port, a probe could check whether that port is open across all IP addresses available on the Internet. In other embodiments, a probe may attempt a handshake in accordance with the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) Handshake Protocol on a given port. Such action could check for the presence of deprecated protocols allowed in the exchange (e.g., SSL Version 3), as well as analyze characteristics of any certificate(s) that are returned (e.g., short key lengths or self-signed certificates). Probes can also look for the presence of standard services/protocols on standard and non-standard ports associated with those services/protocols, as well as over TCP- and UDP-based connections. For example, the active probe engine 2106 may probe the presence of FTP on ports 21 and 2121, SSH on ports 22 and 2222, Telnet on ports 23 and 2323, SMTP on ports 22, 465, and 587, Domain Name System (DNS) on ports 53 and 5353, HTTP on ports 80 and 8080, POP3 on ports 110 and 993, NTP on port 123, NetBIOS on ports 137, 138, and 139, IMAP on ports 143 and 995, SNMP on ports 161, 162, and 199, LDAP on ports 389 and 636, HTTPS on ports 443 and 8443, SMB on port 445, Kerberos on ports 464, 543, 544, 749, 750, 751, 752, 753, 754, and 760, RPC on port 530, MSSQL on port 1433 and 1434, OracleDB on ports 1521, 2483, and 2484, MySQL on port 3306, RDP on port 3389, SIP on ports 5060 and 5061, PostgreSQL on port 5432, VNC on port 5800, Redis on port 6379, MongoDB on port 27017, UPnP on port 1900, etc. The active probe engine 2106 can examine whether any of the aforementioned protocols (as well as other protocols not mentioned here) are running on any combination of one or more ports. Each probe can return information about the presence or absence of a given service on a given port, in addition to information about the service itself, such as the software version, manufacturer, etc. This information can be analyzed to assess the vulnerability of the given service to exploitation to an unauthorized entity or a hostile actor.
  • The netflow storage 2116 can include details about all communications involving the IP addresses of interest. These IP address may include those that are statically or dynamically allocated to an organization or an entity of interest to the organization (e.g., a division, subsidiary, or vendor), as well as those that have historically been associated with malicious activity by the implementer of the security management platform 2100, the organization, an open source database, or any other source. These details can include information about the source or destination of the communications, such as the IP addresses involved, the port number of a source computing device, the ASN used for routing, location information about the source computing device (e.g., the country within which the source computing device resides), etc. These details can also include information about the communication itself, such as the time of transmission/reception, the protocol used, the number of packets, the size of the transmission, information regarding sampling performed by a listening mechanism (e.g., a flow collector or a scanner) that recorded the traffic, etc.
  • As noted above, the correlator 2108 can use data from the active sensing storage 2114 and the netflow storage 2116 to detect potential security events. Examples of security events include communications with new or ephemeral services, communications involving a vulnerable internal computing device (e.g., a computing device managed by an organization that resides within an internal network), communications involving a vulnerable external computing device (e.g., a computing device that resides outside of the internal network), and communications with non-gateway computing devices.
  • Organization communications with new or ephemeral services can be detected whenever an IP address that is statically or dynamically allocated to, or otherwise owned, managed, or operated by or on behalf of, an organization, a subsidiary of the organization, a vendor of the organization, or of general interest to the organization, communicates with a service that was not detected by the active probe engine 2106 despite recent historical probe(s) of the IP address. These IP addresses are often referred to as “organization IP addresses,” “customer IP addresses,” or “internal IP addresses.” The time interval over which prior probe(s) discovered no corresponding service detection can be various lengths (e.g., 5 minutes, 3 hours, 8 days, 3 months, etc.). Moreover, the time between consecutive prior probes may vary. For example, a first prior probe and a second prior probe may be separated by several days, while the second prior probe and a third prior probe may be separated by several weeks.
  • Generally, risk to an organization network is greatly heightened if an inbound communication to an internal IP address is accompanied by a corresponding outbound communication from the internal IP address. In such instances, the internal IP address may represent the source as seen in the network traffic datum, or the port associated with the internal IP address may be a high number while the port associated with the external IP address is associated with a common service. Examples of common services include FTP on ports 21 and 2121, SSH on ports 22 and 2222, Telnet on ports 23 and 2323, SMTP on ports 25, 465, and 587, DNS on ports 53 and 5353, HTTP on ports 80 and 8080, POP3 on ports 110 and 993, NTP on port 123, NetBIOS on ports 137, 138, and 139, IMAP on ports 143 and 995, SNMP on ports 161, 162, and 199, LDAP on ports 389 and 636, HTTPS on ports 443 and 8443, SMB on port 445, Kerberos on ports 464, 543, 544, 749, 750, 751, 752, 753, 754, and 760, RPC on port 530, MSSQL on port 1433 and 1434, OracleDB on ports 1521, 2483, and 2484, MySQL on port 3306, RDP on port 3389, SIP on ports 5060 and 5061, PostgreSQL on port 5432, VNC on port 5800, Redis on port 6379, MongoDB on port 27017, UPnP on port 1900, any of the aforementioned protocols running on another port, or any other service running on another port.
  • If the port number is at least 1024 and all of the above conditions are met, then the security management platform 2100 can conclude that a communication with a new or ephemeral service occurred with low confidence. However, if the port number is at least 10,000 and all of the above conditions are met, then the security management platform 2100 can conclude that a communication with a new or ephemeral service occurred with high confidence. The three potential conclusions from this correlation are (1) the external IP address is configured to not respond to probes by the active probe engine 2106; (2) the external IP address began responding very recently; or (3) the external IP addresses was stood up very briefly to communicate with the internal IP address. Because the latter two potential conclusions are consistent with the attack patterns typically employed by unauthorized entities, each of these could be flagged as a potential security event.
  • Organization communications with a vulnerable computing device can be identified whenever a communication is detected that involves an internal IP address running a non-HTTP, non-HTTPS, or non-DNS service. Examples of such services include FTP on ports 21 and 2121, SSH on port 22 and 2222, Telnet on ports 23 and 2323, NTP on port 123, NetBIOS on ports 137, 138, and 139, SNMP on ports 161, 162, and 199, LDAP on ports 389 and 636, SMB on port 445, Kerberos on ports 464, 543, 544, 749, 750, 751, 752, 753, 754, and 760, RPC on port 530, MSSQL on ports 1433 and 1434, OracleDB on ports 1521, 2483, and 2484, MySQL on port 3306, RDP on port 3389, SIP on ports 5060 and 5061, PostgreSQL on port 5432, VNC on port 5800, Redis on port 6379, MongoDB on port 27017, UPnP on port 1900, any of the aforementioned protocols running on another port, and any other non-HTTP, non-HTTPS, or non-DNS service that is not designed to be accessible on the public Internet by its authors (and thus has less security hardening put in during the programming of the service). Organization communications involving a vulnerable computing device can also occur whenever a communication is detected that involves an internal IP address having known vulnerabilities, such as running an end-of-life HTTP or HTTPS service, poor cryptographic health on an HTTPS service such as a self-signed certificate or manufacturer's default certificate, an old DNS service with publicly disclosed vulnerabilities, etc. Any of the aforementioned services running on a computing device can make that computing device vulnerable to compromise by an unauthorized entity. Any communication from a vulnerable external computing device to an internal computing device or from an external computing device to a vulnerable internal computing device may represent a security event.
  • Organization communications with a vulnerable external computing device can be identified whenever a communication involving an internal IP address is detected, where the internal computing device corresponding to the internal IP address is running a common service. Examples of common services include FTP on ports 21 and 2121, SSH on port 22 and 2222, Telnet on ports 23 and 2323, SMTP on ports 25, 465, and 587, DNS on ports 53 and 5353, HTTP on port 80, POP3 on ports 110 and 993, NTP on port 123, NetBIOS on ports 137, 138, and 139, IMAP on ports 143 and 995, SNMP on ports 161, 162, and 199, LDAP on ports 389 and 636, HTTPS on port 443, SMB on port 445, Kerberos on ports 464, 543, 544, 749, 750, 751, 752, 753, 754, and 760, RPC on port 530, MSSQL on ports 1433 and 1434, OracleDB on ports 1521, 2483, and 2484, MySQL on port 3306, RDP on port 3389, SIP on ports 5060 and 5061, PostgreSQL on port 5432, VNC on port 5800, Redis on port 6379, MongoDB on port 27017, UPnP on port 1900, or any other ports associated with commonly used protocols/services on the Internet. The security management platform 2100 may also look for certificates used for public key cryptography returned for a successful SSL/TLS handshake that are self-signed or use deprecated ciphers or signing algorithms. These services are often considered vulnerable for several reasons, so there is an increased probability that an internal computing device running one of these services has been compromised by a malicious actor for use as a proxy for malicious traffic. For this reason, communications between a vulnerable external computing device and an internal IP address has a higher probability of being malicious in nature, and thus can be classified as a security event.
  • Organization communications transmitted from a non-gateway device can be identified whenever a communication is detected involving an internal IP address that has not recently responded to any scans performed by the active probe engine 2106 and has not historically been involved in external communications. Organizations are less likely to monitor traffic for security events on computing devices that do not normally communicate with the Internet, so malicious actors may try to access the internal network using internal IP addresses of this nature. Accordingly, communications involving these internal IP addresses could represent security events.
  • FIG. 22 is a block diagram illustrating an example of an internal network 2200 (also referred to as an “entity network,” “organization network,” or “customer network”). The internal network 2200 may be entity A network 2004, entity B network 2006, or entity C network 2008 of FIG. 20. The internal network 2200 can interface with another computer network (e.g., the Internet) via an edge computing device 2202 (also referred to as an “edge device”). More specifically, all traffic entering/exiting the internal network 2200 may be handled by the edge device 2202. Traffic coming into the entity network 2200 can also be examined and/or filtered by the edge device 2202. In some embodiments, the edge device 2002 includes a firewall.
  • Incoming traffic can then be passed to a switch 2204, which routes the traffic within the internal network 2200 to one or more internal systems (e.g., internal computing device 2206, internal computing device 2208, internal computing device 2210, internal computing device 2212, or internal computing device 2214). In some embodiments, the internal network 2200 includes more than one edge device. Similarly, the internal network 2200 may include more than one switch responsible for routing traffic. For traffic exiting the internal network 2200, traffic originating from an internal system can be routed from the switch 2204 to the edge device 2202 and then to an external computer network (e.g., the Internet). Meanwhile, probes from a security management platform (e.g., security management platform 506 of FIG. 5) can come into the internal network 2200 at the edge device 2202, and then replies to these probes can be returned by exiting the internal network 2200 at the edge device 2202. In some embodiments, traffic within the internal network 2200 is measured by the switch 2204 or the edge device 2202. In other embodiments, traffic within the internal network 2200 is independently measured by each internal system and then aggregated (e.g., by the switch 2204 or the edge device 2202).
  • FIG. 23 is a block diagram illustrating an example of an Internet service provider (ISP) fabric 2300. The ISP fabric 2300 may be the ISP 1 fabric 2002 or ISP 2 fabric 2014 of FIG. 20. The ISP fabric 2300 can act as a network by relaying traffic downstream using multiple routers (e.g., router 2302, router 2304, router 2306, router 2308, router 2310, router 2312, or router 2314). These routers are responsible for routing traffic received at an ingress point of the ISP fabric 2300 to an appropriate egress point of the ISP fabric 2300 along the way toward a final destination (e.g., recipient device 106 of FIG. 1). In some embodiments, at least one of the routers logs flows and reports traffic information (e.g., to a security management platform). For example, a given router may monitor and store information regarding all traffic that passes through the given router. Examples of such information include information related to the source of the traffic, the destination of the traffic, path information, data packet information, number of bytes in the traffic, etc.
  • FIG. 24 depicts a flow diagram of a process 2400 for detecting a security event involving a computing device. The process may be executed by a processor of a security management platform (e.g., processor 2104 of FIG. 21). At step 2401, the processor receives active sensing data related to the computing device. For example, the security management platform may actively probe the computing device by sending a signal to a corresponding IP address that is intended to elicit a response. Upon receiving a response to the probe, the security management platform may store data indicative of the response in a storage. Probes of the computing device may be periodically performed to detect changes in the state of the computing device based on its history as determined based on the active sensing data. At step 2402, the processor receives netflow data. The netflow data describes traffic traversing a computer network (e.g., an internal network or the Internet). Thus, in some embodiments the netflow data is acquired from an organization, while in other embodiments the netflow data is acquired from one or more ISPs.
  • At step 2403, the processor can determine whether correlation(s) exist between the active sensing data and the netflow data. Said another way, the processor may parse the active sensing data and the netflow data to discover risk filters indicative of security threats. At step 2404, the processor can determine whether correlation(s) indicate that a security event occurred. In the event that a determination is made that a security event occurred, then, at step 2405, the processor can indicate that the security event involving the computing device occurred. For example, the processor may cause a notification to be generated that alerts an administrator associated with the computer network on which the computing device resides to take appropriate action. However, in the event that a determination is made that no security event occurred, then, at step 2406, the processor can indicate that no security event involving the computing device occurred. Other embodiments of the process 2400 may reverse the order of receiving active sensing data and netflow data. Moreover, either type of data could be received on a periodic basis (e.g., hourly, daily, or weekly) or a continual basis.
  • FIG. 25 depicts a flow diagram of a process 2500 for actively probing a computing device that resides on a computer network under examination. In some embodiments the computing device is an internal computing device that resides on an internal network (e.g., an organization intranet), while in other embodiments the computing device is an external network device that resides on some other network (e.g., the Internet). The process may be executed by a processor of a security management platform (e.g., processor 2104 of FIG. 21).
  • At step 2501, the processor can select a computing device to be actively probed. For example, if the computing device is an internal computing device that resides on an internal network, then the processor may have selected the computing device from a list of computing devices associated with an organization. In such embodiments, each computing device managed by the organization may be periodically selected for probing. As another example, if the computing device is an external network device that resides on the Internet, then the processor may have randomly selected the computing device, selected the computing device due to its connection to an internal computing device, etc.
  • At step 2502, the processor can probe the computing device by transmitting a query to a corresponding IP address. The query is transmitted to the computing device with the intent that it provokes a response, which can be examined by the security management platform to determine what risk, if any, is posed by the computing device. Additionally or alternatively, the security management platform can determine what risk, if any, is experienced by the computing device itself. At step 2503, the processor can receive a reply to the query from the computing device. In some embodiments, the processor stores the query and reply in a storage for further examination. For example, as shown at step 2504, the processor may store the query and reply in a database record corresponding to the computing device. More specifically, the processor may generate and/or populate a record in a database that include the query, reply, and other information (e.g., date and time of probe).
  • At step 2505, the processor can determine whether any other computing devices exist on the network under examination that require probing. In response to a determination that at least one other computing device needs to be probed, the processor can complete these steps again with respect to another computing device. However, in response to a determination that no other computing devices need to be probed, the processor can examine whether it is time for the computing device to be probed another time, as shown at step 2506. Thus, the processor can immediately complete these steps again with respect to the same computing device, or the processor can wait until a specified amount of time has elapsed, as shown at step 2507.
  • In some embodiments, these steps are performed in parallel by the processor. For example, the processor could periodically probe the computing device over a specified time interval while simultaneously probing other computing devices on the same or different networks.
  • FIG. 26 depicts a flow diagram of a process 2600 for constructing a list of computing devices similar to a computing device that has experienced, or otherwise been involved in, a security event. Each computing device can be an internal computing device that resides on an internal network (e.g., an organization intranet) or an external computing device that resides on some other network (e.g., the Internet). A security management platform may construct a list of similar external computing devices to more quickly identify potential security risks. Additionally or alternatively, the security management platform may construct a list of similar internal computing devices to identify which computing devices have the highest likelihood of being involved in a future security event. The process may be executed by a processor of a security management platform (e.g., processor 2104 of FIG. 21).
  • At step 2601, the processor can select a computing device. Then, at step 2602, the processor can determine whether the computing device is similar to any computing devices that are associated with security events (also referred to as “risky computing devices” or “vulnerable computing devices”). For example, the processor may compare feature(s) of the computing device with feature(s) of all risky computing devices to determine whether any matches exist. As another example, the processor may compare service(s) executing on the computing device with service(s) executing on all vulnerable computing devices to determine whether any matches exist. In response to a determination that the computing device is not similar to any risky or vulnerable computing devices, the processor can begin the process by selecting another computing device. However, in response to a determination that the computing device is similar to at least one risky or vulnerable computing device, the processor can add the computing device to a set of similar computing devices that includes the at least one risky or vulnerable computing device, as shown at step 2603.
  • At step 2604, the processor determines whether there are any other computing devices to check. For example, the processor may determine whether any other computing devices exist on a computer network under examination (e.g., the internal network of an organization). If another computing device needs to be checked, the processor can complete these steps again with respect to another computing device. However, if no other computing devices need to be checked, the processor can provide the set of similar computing devices to the security management platform, as shown at step 2605. The set of similar computing devices can be used to more intelligently identify potential security risks, as well as what remediation action(s), if any, should be taken against these similar computing devices.
  • FIG. 27 depicts a flow diagram of a process 2700 for determining whether a computing device is part of a botnet. The process may partially mirror the process of FIG. 24. Thus, steps 2701, 2702, and 2703 of FIG. 27 may be substantially similar to steps 2401, 2402, and 2403 of FIG. 24.
  • At step 2704, the processor can determine whether correlation(s) indicate that a botnet event occurred. Said another way, the processor can determine whether the active sensing data and/or the netflow data indicate that an internal computing device communicated with an external computing device that is likely to be part of a botnet. In the event that a determination is made that a botnet event occurred, then, at step 2705, the processor can indicate that the computing device is part of a botnet. For example, the processor may cause an alert to be generated that notifies an administrator that the computing device is a botnet device. However, in the event that a determination is made that no botnet event occurred, then, at step 2706, the processor can indicate that the computing device is not part of a botnet.
  • FIG. 28 depicts a flow diagram of a process 2800 for determining whether a computing device has been involved in a DNS tunneling event. The process may partially mirror the process of FIG. 24. Thus, steps 2801, 2802, and 2803 of FIG. 28 may be substantially similar to steps 2401, 2402, and 2403 of FIG. 24.
  • At step 2804, the processor can determine whether correlation(s) indicate that a DNS tunneling event occurred. DNS tunneling is the ability to encode the data of other programs or protocols in DNS queries and responses. Accordingly, in order to determine whether a DNS tunneling event occurred, the processor may examine whether communications to/from the computing device have been encoded. The processor may also perform payload analysis (e.g., by examining the size/length of the queries and responses) and/or traffic analysis (e.g., by examining the volume and frequency of the queries and responses). In the event that a determination is made that a DNS tunneling event occurred, then, at step 2805, the processor can indicate that the network device is part of a DNS tunneling scheme. For example, the processor may cause an alert to be generated that notifies an administrator that the computing is a DNS device. However, in the event that a determination is made that no DNS tunneling event occurred, then, at step 2806, the processor can indicate that the computing device is not part of a DNS tunneling scheme.
  • Processing System
  • FIG. 29 is a block diagram illustrating an example of a processing system 2900 in which at least some operations described herein can be implemented. For example, some components of the processing system 2900 may be hosted on a computing device that includes a security management platform (e.g., security management platform 506 of FIG. 5). As another example, some components of the processing system 2900 may be hosted on a computing device that is queried by a security management platform during an active probing session.
  • The processing system 2900 may include one or more central processing units (“processors”) 2902, main memory 2906, non-volatile memory 2910, network adapter 2912 (e.g., network interface), video display 2918, input/output devices 2920, control device 2922 (e.g., keyboard and pointing devices), drive unit 2924 including a storage medium 2926, and signal generation device 2930 that are communicatively connected to a bus 2916. The bus 2916 is illustrated as an abstraction that represents one or more physical buses and/or point-to-point connections that are connected by appropriate bridges, adapters, or controllers. The bus 2916, therefore, can include a system bus, a Peripheral Component Interconnect (PCI) bus or PCI-Express bus, a HyperTransport or industry standard architecture (ISA) bus, a small computer system interface (SCSI) bus, a universal serial bus (USB), IIC (I2C) bus, or an Institute of Electrical and Electronics Engineers (IEEE) standard 1394 bus (also referred to as “Firewire”).
  • The processing system 2900 may share a similar computer processor architecture as that of a desktop computer, tablet computer, personal digital assistant (PDA), mobile phone, game console, music player, wearable electronic device (e.g., a watch or fitness tracker), network-connected (“smart”) device (e.g., a television or home assistant device), virtual/augmented reality systems (e.g., a head-mounted display), or another electronic device capable of executing a set of instructions (sequential or otherwise) that specify action(s) to be taken by the processing system 2900.
  • While the main memory 2906, non-volatile memory 2910, and storage medium 2926 (also called a “machine-readable medium”) are shown to be a single medium, the term “machine-readable medium” and “storage medium” should be taken to include a single medium or multiple media (e.g., a centralized/distributed database and/or associated caches and servers) that store one or more sets of instructions 2928. The term “machine-readable medium” and “storage medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the processing system 2900.
  • In general, the routines executed to implement the embodiments of the disclosure may be implemented as part of an operating system or a specific application, component, program, object, module, or sequence of instructions (collectively referred to as “computer programs”). The computer programs typically comprise one or more instructions (e.g., instructions 2904, 2908, 2928) set at various times in various memory and storage devices in a computing device. When read and executed by the one or more processors 2902, the instruction(s) cause the processing system 2900 to perform operations to execute elements involving the various aspects of the disclosure.
  • Moreover, while embodiments have been described in the context of fully functioning computing devices, those skilled in the art will appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms. The disclosure applies regardless of the particular type of machine or computer-readable media used to actually effect the distribution.
  • Further examples of machine-readable storage media, machine-readable media, or computer-readable media include recordable-type media such as volatile and non-volatile memory devices 2910, floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD-ROMS), Digital Versatile Disks (DVDs)), and transmission-type media such as digital and analog communication links.
  • The network adapter 2912 enables the processing system 2900 to mediate data in a network 2914 with an entity that is external to the processing system 2900 through any communication protocol supported by the processing system 2900 and the external entity. The network adapter 2912 can include a network adaptor card, a wireless network interface card, a router, an access point, a wireless router, a switch, a multilayer switch, a protocol converter, a gateway, a bridge, bridge router, a hub, a digital media receiver, and/or a repeater.
  • The network adapter 2912 may include a firewall that governs and/or manages permission to access/proxy data in a computer network, and tracks varying levels of trust between different machines and/or applications. The firewall can be any number of modules having any combination of hardware and/or software components able to enforce a predetermined set of access rights between a particular set of machines and applications, machines and machines, and/or applications and applications (e.g., to regulate the flow of traffic and resource sharing between these entities). The firewall may additionally manage and/or have access to an access control list that details permissions including the access and operation rights of an object by an individual, a machine, and/or an application, and the circumstances under which the permission rights stand.
  • The techniques introduced here can be implemented by programmable circuitry (e.g., one or more microprocessors), software and/or firmware, special-purpose hardwired (i.e., non-programmable) circuitry, or a combination of such forms. Special-purpose circuitry can be in the form of one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc.
  • Remarks
  • The foregoing description of various embodiments of the claimed subject matter has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the claimed subject matter to the precise forms disclosed. Many modifications and variations will be apparent to one skilled in the art. Embodiments were chosen and described in order to best describe the principles of the invention and its practical applications, thereby enabling those skilled in the relevant art to understand the claimed subject matter, the various embodiments, and the various modifications that are suited to the particular uses contemplated.
  • Although the Detailed Description describes certain embodiments and the best mode contemplated, the technology can be practiced in many ways no matter how detailed the Detailed Description appears. Embodiments may vary considerably in their implementation details, while still being encompassed by the specification. Particular terminology used when describing certain features or aspects of various embodiments should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the technology with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the technology to the specific embodiments disclosed in the specification, unless those terms are explicitly defined herein. Accordingly, the actual scope of the technology encompasses not only the disclosed embodiments, but also all equivalent ways of practicing or implementing the embodiments.
  • The language used in the specification has been principally selected for readability and instructional purposes. It may not have been selected to delineate or circumscribe the subject matter. It is therefore intended that the scope of the technology be limited not by this Detailed Description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of various embodiments is intended to be illustrative, but not limiting, of the scope of the technology as set forth in the following claims.

Claims (20)

What is claimed is:
1. A computer-implemented method for discovering traffic flows that involve one or more internal Internet Protocol (IP) addresses that reside on an internal network associated with an organization, the method comprising:
acquiring global netflow that includes all traffic having a certain characteristic that traversed the Internet during a certain time interval;
filtering the global netflow to obtain first data indicative of local netflow,
wherein the local netflow includes all traffic having the certain characteristic that crossed a perimeter of the internal network during the certain time interval;
parsing the first data to identify each internal IP address that was involved in a public communication activity during the certain time interval,
wherein the public communication activity involves an exchange of a data packet between an internal IP address that resides on the internal network and an external IP address that does not reside on the internal network; and
creating, based on said parsing, a first list that includes all internal IP addresses that were involved in public communication activities during the certain time interval.
2. The computer-implemented method of claim 1, further comprising:
acquiring second data indicative of the local netflow from one or more flow collectors instrumented along the perimeter of the internal network; and
combining the first data and the second data into a single dataset to be parsed.
3. The computer-implemented method of claim 1, wherein the local netflow includes data packets transmitted by external IP addresses to internal IP addresses, data packets transmitted by internal IP addresses to external IP addresses, or any combination thereof.
4. The computer-implemented method of claim 1, further comprising:
acquiring a second list that includes all internal IP addresses that are presently being monitored by the organization;
comparing the first list to the second list to identify any discrepancies; and
determining, based on said comparing, that at least one internal IP address included in the first is not included in the second list.
5. The computer-implemented method of claim 4, further comprising:
generating a notification that identifies the at least one internal IP address; and
transmitting the notification to a computing device associated with an administrator responsible for managing the internal network.
6. The computer-implemented method of claim 1, wherein the global netflow is acquired from one or more Internet service Providers (ISPs), one or more content delivery networks (CDNs), or any combination thereof.
7. The computer-implemented method of claim 1, further comprising:
retrieving map data from the Internet on a periodic basis; and
generating a model of the internal network based on the map data.
8. The computer-implemented of claim 7, further comprising:
probing each internal IP address included in the first list by transmitting a query designed to elicit a response; and
creating probe data from any responses received from the internal IP addresses included in the first list,
wherein the probe data specifies a class, a type, or a version of at least some computer programs residing on the internal network.
9. A non-transitory computer-readable medium with instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
acquiring, by a security management platform, multiple unclassified data streams from at least two different sources,
wherein each unclassified data stream of the multiple unclassified data streams includes information regarding traffic that traversed a perimeter of an internal network associated with an organization;
fusing, by the security management platform, the multiple unclassified data streams together to form a unified workflow;
identifying, by the security management platform, a vector of attack against a cyber asset residing on the internal network by examining the unified workflow; and
causing a remediation action to be performed to deny the vector of attack.
10. The non-transitory computer-readable medium of claim 9, wherein said causing comprises:
generating, by the security management platform, a notification that identifies the remediation action; and
transmitting, by the security management platform, the notification to a computing device associated with an administrator responsible for managing the internal network.
11. The non-transitory computer-readable medium of claim 9, wherein the multiple unclassified data streams include:
map data characterizing an attack surface of IP addresses, computing devices, or services that reside on the internal network,
netflow data characterizing communication activities involving exchanges of data packets across the perimeter of the internal network, and
probe data characterizing a class, a type, or a version of at least one computer program that resides on the internal network.
12. The non-transitory computer-readable medium of claim 9, wherein the operations further comprise:
probing, by the security management platform, each internal IP address that resides on the internal network by transmitting a query designed to elicit a response; and
determining, by the security management platform, a status of each Internet-connected computing device that resides on the internal network by examining any responses received from the corresponding internal IP address.
13. The non-transitory computer-readable medium of claim 12, wherein said probing is performed on a periodic basis so that the status of each Internet-connected computing device can be monitored over a certain time interval.
14. The non-transitory computer-readable medium of claim 13, wherein the time interval is a day, a month, a year, or an indefinite period of time.
15. The non-transitory computer-readable medium of claim 12, wherein the operations further comprise:
storing, by the security management platform, data indicative of all responses for further analysis.
16. An electronic device comprising:
a memory that includes instructions for discovering internal Internet Protocol (IP) addresses that communicate with external IP addresses via the Internet,
wherein the instructions, when executed by a processor, cause the processor to:
acquire global netflow that includes all traffic having a certain characteristic that traversed the Internet during a certain time interval;
filter the global netflow to obtain local netflow corresponding to an internal network on which the internal IP addresses resided during at least a portion of the certain time interval,
wherein the local netflow includes all traffic having the certain characteristic that crossed a perimeter of the internal network during the certain time interval;
parse the local netflow to identify each internal IP address that was involved in a public communication activity during the certain time interval;
create a first list that includes all internal IP addresses that were involved in public communication activities during the certain time interval;
compare the first list to a second list that includes all internal IP addresses that are presently being monitored; and
determine a risk posed by the public communication activities.
17. The electronic device of claim 16, wherein the instructions further cause the processor to:
determine that at least one internal IP address included in the first list is not included in the second list.
18. The electronic device of claim 17, wherein the instructions further cause the processor to:
generate a notification that identifies the at least one internal IP address; and
transmit the notification to a computing device associated with an administrator responsible for managing the internal network.
19. The electronic device of claim 16, wherein the instructions further cause the processor to:
retrieve the second list from a storage maintained by an organization associated with the internal network.
20. The electronic device of claim 16, wherein the global netflow is acquired from one or more scanning mechanisms deployed on the Internet.
US16/166,906 2017-05-18 2018-10-22 Discovering internet protocol (ip) addresses involved in flows traversing the internet Abandoned US20190058723A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/166,906 US20190058723A1 (en) 2017-05-18 2018-10-22 Discovering internet protocol (ip) addresses involved in flows traversing the internet

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201762508298P 2017-05-18 2017-05-18
US201762586669P 2017-11-15 2017-11-15
US15/984,030 US10965707B2 (en) 2017-05-18 2018-05-18 Correlation-driven threat assessment and remediation
US16/166,906 US20190058723A1 (en) 2017-05-18 2018-10-22 Discovering internet protocol (ip) addresses involved in flows traversing the internet

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/984,030 Continuation US10965707B2 (en) 2017-05-18 2018-05-18 Correlation-driven threat assessment and remediation

Publications (1)

Publication Number Publication Date
US20190058723A1 true US20190058723A1 (en) 2019-02-21

Family

ID=64272735

Family Applications (5)

Application Number Title Priority Date Filing Date
US15/984,030 Active 2039-05-24 US10965707B2 (en) 2017-05-18 2018-05-18 Correlation-driven threat assessment and remediation
US16/167,029 Abandoned US20190058725A1 (en) 2017-05-18 2018-10-22 Security management platforms for assessing threats to an internal network
US16/166,972 Active 2038-10-23 US11374957B2 (en) 2017-05-18 2018-10-22 Determining risk associated with internet protocol (IP) addresses involved in internet communications
US16/166,906 Abandoned US20190058723A1 (en) 2017-05-18 2018-10-22 Discovering internet protocol (ip) addresses involved in flows traversing the internet
US17/216,623 Pending US20210288993A1 (en) 2017-05-18 2021-03-29 Correlation-driven threat assessment and remediation

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US15/984,030 Active 2039-05-24 US10965707B2 (en) 2017-05-18 2018-05-18 Correlation-driven threat assessment and remediation
US16/167,029 Abandoned US20190058725A1 (en) 2017-05-18 2018-10-22 Security management platforms for assessing threats to an internal network
US16/166,972 Active 2038-10-23 US11374957B2 (en) 2017-05-18 2018-10-22 Determining risk associated with internet protocol (IP) addresses involved in internet communications

Family Applications After (1)

Application Number Title Priority Date Filing Date
US17/216,623 Pending US20210288993A1 (en) 2017-05-18 2021-03-29 Correlation-driven threat assessment and remediation

Country Status (7)

Country Link
US (5) US10965707B2 (en)
EP (1) EP3625681A1 (en)
JP (1) JP7250703B2 (en)
KR (1) KR20200007931A (en)
AU (1) AU2018269049A1 (en)
CA (1) CA3059788A1 (en)
WO (1) WO2018213778A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190377654A1 (en) * 2018-06-12 2019-12-12 Bank Of Montreal Systems and methods for generating a snapshot view of network infrastructure
US11374957B2 (en) 2017-05-18 2022-06-28 Palo Alto Networks, Inc. Determining risk associated with internet protocol (IP) addresses involved in internet communications
US11516138B2 (en) 2020-04-27 2022-11-29 International Business Machines Corporation Determining network flow direction
US20230199019A1 (en) * 2021-01-04 2023-06-22 Microsoft Technology Licensing, Llc Internet-facing device identification

Families Citing this family (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10805331B2 (en) 2010-09-24 2020-10-13 BitSight Technologies, Inc. Information technology security assessment system
US9438615B2 (en) 2013-09-09 2016-09-06 BitSight Technologies, Inc. Security risk management
US11405410B2 (en) * 2014-02-24 2022-08-02 Cyphort Inc. System and method for detecting lateral movement and data exfiltration
US11182720B2 (en) 2016-02-16 2021-11-23 BitSight Technologies, Inc. Relationships among technology assets and services and the entities responsible for them
US10574678B2 (en) * 2016-12-13 2020-02-25 Forescout Technologies, Inc. Name translation monitoring
US10476673B2 (en) 2017-03-22 2019-11-12 Extrahop Networks, Inc. Managing session secrets for continuous packet capture systems
US10425380B2 (en) 2017-06-22 2019-09-24 BitSight Technologies, Inc. Methods for mapping IP addresses and domains to organizations using user activity data
US10841329B2 (en) * 2017-08-23 2020-11-17 International Business Machines Corporation Cognitive security for workflows
US9967292B1 (en) 2017-10-25 2018-05-08 Extrahop Networks, Inc. Inline secret sharing
US10389574B1 (en) 2018-02-07 2019-08-20 Extrahop Networks, Inc. Ranking alerts based on network monitoring
US10270794B1 (en) 2018-02-09 2019-04-23 Extrahop Networks, Inc. Detection of denial of service attacks
US10257219B1 (en) 2018-03-12 2019-04-09 BitSight Technologies, Inc. Correlated risk in cybersecurity
US10812520B2 (en) 2018-04-17 2020-10-20 BitSight Technologies, Inc. Systems and methods for external detection of misconfigured systems
US10868759B2 (en) * 2018-05-03 2020-12-15 Selligent, S.A. System and method for virtual machine port translation and dynamic routing
US11709946B2 (en) 2018-06-06 2023-07-25 Reliaquest Holdings, Llc Threat mitigation system and method
US10848512B2 (en) 2018-06-06 2020-11-24 Reliaquest Holdings, Llc Threat mitigation system and method
EP3588897B1 (en) * 2018-06-30 2020-04-22 Ovh Method and system for defending an infrastructure against a distributed denial of service attack
US10411978B1 (en) 2018-08-09 2019-09-10 Extrahop Networks, Inc. Correlating causes and effects associated with network activity
FR3086821A1 (en) * 2018-09-28 2020-04-03 Orange COLLABORATION AND REQUEST FOR COLLABORATION BETWEEN PROTECTION SERVICES ASSOCIATED WITH AT LEAST ONE DOMAIN, CORRESPONDING AGENTS AND COMPUTER PROGRAM.
US11200323B2 (en) 2018-10-17 2021-12-14 BitSight Technologies, Inc. Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios
US10521583B1 (en) 2018-10-25 2019-12-31 BitSight Technologies, Inc. Systems and methods for remote detection of software through browser webinjects
US10298611B1 (en) * 2018-12-10 2019-05-21 Securitymetrics, Inc. Network vulnerability assessment
US11563640B2 (en) * 2018-12-13 2023-01-24 At&T Intellectual Property I, L.P. Network data extraction parser-model in SDN
US11811813B2 (en) * 2018-12-28 2023-11-07 Trane International Inc. Network security management for a building automation system
US10901375B2 (en) * 2019-01-31 2021-01-26 Morgan Stanley Services Group Inc. Chaotic system anomaly response by artificial intelligence
CN110233821B (en) * 2019-04-29 2021-10-29 北京邮电大学 Detection and safety scanning system and method for network space of intelligent equipment
US10757117B1 (en) * 2019-05-03 2020-08-25 Greynoise Intelligence Inc. Contextual analyses of network traffic
US10965702B2 (en) * 2019-05-28 2021-03-30 Extrahop Networks, Inc. Detecting injection attacks using passive network monitoring
USD926809S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926810S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926200S1 (en) 2019-06-06 2021-07-27 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
US11533328B2 (en) * 2019-06-06 2022-12-20 Paypal, Inc. Systems and methods for analyzing vulnerabilities of networked systems
USD926811S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926782S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
US10726136B1 (en) 2019-07-17 2020-07-28 BitSight Technologies, Inc. Systems and methods for generating security improvement plans for entities
US11388072B2 (en) 2019-08-05 2022-07-12 Extrahop Networks, Inc. Correlating network traffic that crosses opaque endpoints
US10742530B1 (en) 2019-08-05 2020-08-11 Extrahop Networks, Inc. Correlating network traffic that crosses opaque endpoints
US11409697B2 (en) * 2019-08-18 2022-08-09 Capitis Solutions Inc. Efficient configuration compliance verification of resources in a target environment of a computing system
JP7311354B2 (en) * 2019-08-21 2023-07-19 株式会社日立製作所 NETWORK MONITORING DEVICE, NETWORK MONITORING METHOD, AND NETWORK MONITORING PROGRAM
US11956265B2 (en) 2019-08-23 2024-04-09 BitSight Technologies, Inc. Systems and methods for inferring entity relationships via network communications of users or user devices
CN110505307B (en) * 2019-08-30 2022-04-26 公安部交通管理科学研究所 Method and system for exchanging traffic flow data between networks
US10742677B1 (en) 2019-09-04 2020-08-11 Extrahop Networks, Inc. Automatic determination of user roles and asset types based on network monitoring
US10848382B1 (en) 2019-09-26 2020-11-24 BitSight Technologies, Inc. Systems and methods for network asset discovery and association thereof with entities
US11032244B2 (en) 2019-09-30 2021-06-08 BitSight Technologies, Inc. Systems and methods for determining asset importance in security risk management
CN110958225B (en) * 2019-11-08 2022-02-15 杭州安恒信息技术股份有限公司 Method for identifying website fingerprint based on flow
US10791140B1 (en) 2020-01-29 2020-09-29 BitSight Technologies, Inc. Systems and methods for assessing cybersecurity state of entities based on computer network characterization
US10893067B1 (en) 2020-01-31 2021-01-12 BitSight Technologies, Inc. Systems and methods for rapidly generating security ratings
US10764298B1 (en) 2020-02-26 2020-09-01 BitSight Technologies, Inc. Systems and methods for improving a security profile of an entity based on peer security profiles
KR102267101B1 (en) * 2020-04-02 2021-06-18 한충희 Security control system for responding overseas cyber threat and method thereof
CN111509863B (en) * 2020-05-26 2022-03-04 广东电网有限责任公司 Mobile substation monitoring alarm system and method
US11023585B1 (en) 2020-05-27 2021-06-01 BitSight Technologies, Inc. Systems and methods for managing cybersecurity alerts
US20220067153A1 (en) * 2020-09-03 2022-03-03 The Government Of The United States, As Represented By The Secretary Of The Army Artificial Intelligence Embedded and Secured Augmented Reality
US11310256B2 (en) 2020-09-23 2022-04-19 Extrahop Networks, Inc. Monitoring encrypted network traffic
US11463466B2 (en) 2020-09-23 2022-10-04 Extrahop Networks, Inc. Monitoring encrypted network traffic
US11496522B2 (en) 2020-09-28 2022-11-08 T-Mobile Usa, Inc. Digital on-demand coupons for security service of communications system
US11546368B2 (en) * 2020-09-28 2023-01-03 T-Mobile Usa, Inc. Network security system including a multi-dimensional domain name system to protect against cybersecurity threats
US11368493B2 (en) * 2020-10-02 2022-06-21 Johnson Controls Tyco IP Holdings LLP System for and method of detecting communication security in building automation and control networks
US11552872B2 (en) * 2020-11-23 2023-01-10 Verizon Patent And Licensing Inc. Systems and methods for automated remote network performance monitoring
US11122073B1 (en) 2020-12-11 2021-09-14 BitSight Technologies, Inc. Systems and methods for cybersecurity risk mitigation and management
US11792211B2 (en) 2021-01-07 2023-10-17 Bank Of America Corporation System for detecting and remediating computing system breaches using computing network traffic monitoring
US11349861B1 (en) 2021-06-18 2022-05-31 Extrahop Networks, Inc. Identifying network entities based on beaconing activity
US11783001B2 (en) 2021-07-08 2023-10-10 Bank Of America Corporation System and method for splitting a video stream using breakpoints based on recognizing workflow patterns
US11876775B2 (en) * 2021-08-30 2024-01-16 Arbor Networks, Inc. System and method for monitoring communication traffic associated with dynamic internet services via DNS monitoring
US11296967B1 (en) 2021-09-23 2022-04-05 Extrahop Networks, Inc. Combining passive network analysis and active probing
CN114422490A (en) * 2021-11-16 2022-04-29 云南电网有限责任公司信息中心 Numerical control drainage method and system based on openness
US11928221B2 (en) 2021-11-29 2024-03-12 Bank Of America Corporation Source code clustering for automatically identifying false positives generated through static application security testing
US11941115B2 (en) 2021-11-29 2024-03-26 Bank Of America Corporation Automatic vulnerability detection based on clustering of applications with similar structures and data flows
US20230224275A1 (en) * 2022-01-12 2023-07-13 Bank Of America Corporation Preemptive threat detection for an information system
US11762755B2 (en) * 2022-01-28 2023-09-19 Jpmorgan Chase Bank, N.A. Systems and methods for non-human account tracking
KR102636138B1 (en) * 2022-02-28 2024-03-12 주식회사 에이아이스페라 Method, apparatus and computer program of controling security through database server identification based on network traffic
US11843606B2 (en) 2022-03-30 2023-12-12 Extrahop Networks, Inc. Detecting abnormal data access based on data similarity

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2337903B (en) * 1998-05-28 2000-06-07 3Com Corp Methods and apparatus for collecting storing processing and using network traffic data
US8010469B2 (en) * 2000-09-25 2011-08-30 Crossbeam Systems, Inc. Systems and methods for processing data flows
US20020072942A1 (en) 2000-12-07 2002-06-13 Kuykendall James B. System and method for push-model fund transfers
US7370356B1 (en) * 2002-01-23 2008-05-06 Symantec Corporation Distributed network monitoring system and method
JP3794491B2 (en) 2002-08-20 2006-07-05 日本電気株式会社 Attack defense system and attack defense method
US7356584B2 (en) * 2003-03-03 2008-04-08 Microsoft Corporation Optimization of service provider load balancing
US7979694B2 (en) * 2003-03-03 2011-07-12 Cisco Technology, Inc. Using TCP to authenticate IP source addresses
US8510300B2 (en) 2004-07-02 2013-08-13 Goldman, Sachs & Co. Systems and methods for managing information associated with legal, compliance and regulatory risk
US8032594B2 (en) 2004-11-10 2011-10-04 Digital Envoy, Inc. Email anti-phishing inspector
US8918883B1 (en) 2005-06-15 2014-12-23 Tripwire, Inc. Prioritizing network security vulnerabilities using accessibility
WO2007002838A2 (en) * 2005-06-29 2007-01-04 Trustees Of Boston University Whole-network anomaly diagnosis
US8516104B1 (en) * 2005-12-22 2013-08-20 At&T Intellectual Property Ii, L.P. Method and apparatus for detecting anomalies in aggregated traffic volume data
JP4558668B2 (en) * 2006-03-06 2010-10-06 株式会社Kddi研究所 Log analysis device, log analysis program, and recording medium
US9003292B2 (en) * 2006-07-06 2015-04-07 LiveAction, Inc. System and method for network topology and flow visualization
US7801130B2 (en) * 2007-01-31 2010-09-21 At&T Intellectual Property I, L.P. Methods, systems and computer program products for integrating network traffic
US8413238B1 (en) * 2008-07-21 2013-04-02 Zscaler, Inc. Monitoring darknet access to identify malicious activity
US8341748B2 (en) * 2008-12-18 2012-12-25 Caterpillar Inc. Method and system to detect breaks in a border of a computer network
US8180916B1 (en) * 2009-07-17 2012-05-15 Narus, Inc. System and method for identifying network applications based on packet content signatures
US8468606B2 (en) * 2009-12-08 2013-06-18 Verizon Patent And Licensing Inc. Security handling based on risk management
US8549650B2 (en) * 2010-05-06 2013-10-01 Tenable Network Security, Inc. System and method for three-dimensional visualization of vulnerability and asset data
US8595843B1 (en) * 2010-08-12 2013-11-26 Amazon Technologies, Inc. Techniques for identifying sources of unauthorized code
EP2606627B1 (en) * 2010-08-19 2019-03-27 Thomson Licensing Personalization of information content by monitoring network traffic
US8561187B1 (en) 2010-09-30 2013-10-15 Webroot Inc. System and method for prosecuting dangerous IP addresses on the internet
US8874763B2 (en) * 2010-11-05 2014-10-28 At&T Intellectual Property I, L.P. Methods, devices and computer program products for actionable alerting of malevolent network addresses based on generalized traffic anomaly analysis of IP address aggregates
US9455872B2 (en) * 2010-12-31 2016-09-27 Open Invention Network, Llc Method and apparatus of discovering and monitoring network devices
US8762298B1 (en) 2011-01-05 2014-06-24 Narus, Inc. Machine learning based botnet detection using real-time connectivity graph based traffic features
US8934352B2 (en) * 2011-08-30 2015-01-13 At&T Intellectual Property I, L.P. Hierarchical anomaly localization and prioritization
US9392010B2 (en) * 2011-11-07 2016-07-12 Netflow Logic Corporation Streaming method and system for processing network metadata
US9749338B2 (en) 2011-12-19 2017-08-29 Verizon Patent And Licensing Inc. System security monitoring
US8803884B2 (en) * 2012-02-24 2014-08-12 Florida Institute for Human and Machine Cognition Event data visualization tool
US9356942B1 (en) * 2012-03-05 2016-05-31 Neustar, Inc. Method and system for detecting network compromise
IL219361A (en) * 2012-04-23 2017-09-28 Verint Systems Ltd Systems and methods for combined physical and cyber data security
US9043920B2 (en) 2012-06-27 2015-05-26 Tenable Network Security, Inc. System and method for identifying exploitable weak points in a network
US9088606B2 (en) * 2012-07-05 2015-07-21 Tenable Network Security, Inc. System and method for strategic anti-malware monitoring
US9258321B2 (en) 2012-08-23 2016-02-09 Raytheon Foreground Security, Inc. Automated internet threat detection and mitigation system and associated methods
US9569232B1 (en) * 2013-02-19 2017-02-14 Amazon Technologies, Inc. Network traffic data in virtualized environments
US9268967B2 (en) * 2013-03-13 2016-02-23 Lawrence Livermore National Security, Llc Internet protocol network mapper
WO2014138817A1 (en) * 2013-03-15 2014-09-18 Micropace Pty Limited System and method for monitoring user activity on a plurality of networked computing devices
US9787546B2 (en) * 2013-08-07 2017-10-10 Harris Corporation Network management system generating virtual network map and related methods
US20150121456A1 (en) 2013-10-25 2015-04-30 International Business Machines Corporation Exploiting trust level lifecycle events for master data to publish security events updating identity management
US9769204B2 (en) * 2014-05-07 2017-09-19 Attivo Networks Inc. Distributed system for Bot detection
US10212176B2 (en) 2014-06-23 2019-02-19 Hewlett Packard Enterprise Development Lp Entity group behavior profiling
US9202249B1 (en) * 2014-07-03 2015-12-01 Palantir Technologies Inc. Data item clustering and analysis
JP6325993B2 (en) * 2015-02-04 2018-05-16 日本電信電話株式会社 Service monitoring apparatus and service monitoring method
US10567396B2 (en) * 2015-12-15 2020-02-18 Webroot Inc. Real-time scanning of IP addresses
US10999307B2 (en) 2016-05-19 2021-05-04 Infinite Group, Inc. Network assessment systems and methods thereof
CA3059788A1 (en) 2017-05-18 2018-11-22 Expanse, Inc. Correlation-driven threat assessment and remediation

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11374957B2 (en) 2017-05-18 2022-06-28 Palo Alto Networks, Inc. Determining risk associated with internet protocol (IP) addresses involved in internet communications
US20190377654A1 (en) * 2018-06-12 2019-12-12 Bank Of Montreal Systems and methods for generating a snapshot view of network infrastructure
US11516138B2 (en) 2020-04-27 2022-11-29 International Business Machines Corporation Determining network flow direction
US20230199019A1 (en) * 2021-01-04 2023-06-22 Microsoft Technology Licensing, Llc Internet-facing device identification

Also Published As

Publication number Publication date
US20190058725A1 (en) 2019-02-21
JP2020521383A (en) 2020-07-16
KR20200007931A (en) 2020-01-22
US11374957B2 (en) 2022-06-28
AU2018269049A1 (en) 2019-11-21
US10965707B2 (en) 2021-03-30
WO2018213778A1 (en) 2018-11-22
US20190058724A1 (en) 2019-02-21
CA3059788A1 (en) 2018-11-22
US20180337941A1 (en) 2018-11-22
JP7250703B2 (en) 2023-04-03
EP3625681A1 (en) 2020-03-25
US20210288993A1 (en) 2021-09-16

Similar Documents

Publication Publication Date Title
US11374957B2 (en) Determining risk associated with internet protocol (IP) addresses involved in internet communications
US11463457B2 (en) Artificial intelligence (AI) based cyber threat analyst to support a cyber security appliance
US9860265B2 (en) System and method for identifying exploitable weak points in a network
US20220224716A1 (en) User agent inference and active endpoint fingerprinting for encrypted connections
US8561187B1 (en) System and method for prosecuting dangerous IP addresses on the internet
US9118702B2 (en) System and method for generating and refining cyber threat intelligence data
US20060026682A1 (en) System and method of characterizing and managing electronic traffic
Kondo et al. Name anomaly detection for ICN
CA3108494C (en) System and method for generating and refining cyber threat intelligence data
Deri et al. Using cyberscore for network traffic monitoring
Ahmed Monitoring security of enterprise hosts via DNS data analysis
McMillan CompTIA Cybersecurity Analyst (CySA+) Cert Guide
Almazarqi Profiling IoT botnet activity
Sqalli et al. Classifying malicious activities in Honeynets using entropy and volume‐based thresholds
Siddiqui et al. Survey on Unified Threat Management (UTM) Systems for Home Networks
Babu Network Traffic Analysis and Anomaly Detection: A Comparative Case Study
Akinrolabu Towards optimising the detection of sophisticated attacks in Security Operation Centres (SOCs)
WO2023187309A1 (en) Scored threat signature analysis
Lamb et al. Remote Operations and Monitoring: Attack Surfaces
KÁCHA CESNET-CERTS Computer Security Incident Response Team CESNET Zikova 4, Prague

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: EXPANSE, INC., CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:QADIUM, INC.;REEL/FRAME:049314/0179

Effective date: 20181022

AS Assignment

Owner name: QADIUM, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KRANING, MATTHEW;HEON, GREGORY;TOMAN, PAMELA;REEL/FRAME:049408/0177

Effective date: 20180521

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

AS Assignment

Owner name: EXPANSE, LLC., DELAWARE

Free format text: CHANGE OF NAME;ASSIGNOR:EXPANSE, INC.;REEL/FRAME:056355/0769

Effective date: 20201116

AS Assignment

Owner name: PALO ALTO NETWORKS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXPANSE, LLC;REEL/FRAME:056379/0222

Effective date: 20210517

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION