Forensic analysis of computing activity

    公开(公告)号:US10516682B2

    公开(公告)日:2019-12-24

    申请号:US15946026

    申请日:2018-04-05

    申请人: Sophos Limited

    摘要: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a security event is detected, an event graph may be generated based on these causal relationships among the computing objects. For a root cause analysis, the event graph may be traversed in a reverse order from the point of an identified security event (e.g., a malware detection event) to preceding computing objects, while applying one or more cause identification rules to identify a root cause of the security event. Once a root cause is identified, the event graph may be traversed forward from the root cause to identify other computing objects that are potentially compromised by the root cause.

    Key management for compromised enterprise endpoints

    公开(公告)号:US10516531B2

    公开(公告)日:2019-12-24

    申请号:US16111322

    申请日:2018-08-24

    申请人: Sophos Limited

    摘要: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.

    ENTERPRISE DOCUMENT CLASSIFICATION
    74.
    发明申请

    公开(公告)号:US20190318109A1

    公开(公告)日:2019-10-17

    申请号:US16165274

    申请日:2018-10-19

    申请人: Sophos Limited

    发明人: Andrew J. Thomas

    摘要: A collection of documents or other files and the like within an enterprise network are labelled according to an enterprise document classification scheme, and then a recognition model such as a neural network or other machine learning model can be used to automatically label other files throughout the enterprise network. In this manner, documents and the like throughout an enterprise can be automatically identified and managed according to features such as confidentiality, sensitivity, security risk, business value, and so forth.

    Threat detection using a time-based cache of reputation information on an enterprise endpoint

    公开(公告)号:US10382459B2

    公开(公告)日:2019-08-13

    申请号:US15969725

    申请日:2018-05-02

    申请人: Sophos Limited

    IPC分类号: H04L29/06

    摘要: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.

    HONEYPOT NETWORK SERVICES
    78.
    发明申请

    公开(公告)号:US20190238589A1

    公开(公告)日:2019-08-01

    申请号:US16381928

    申请日:2019-04-11

    申请人: Sophos Limited

    发明人: Daniel Stutz

    IPC分类号: H04L29/06

    摘要: In general, in one aspect, a system for providing honeypot network services may monitor network activity, and detect network activity indicative of network service discovery by a first device, for example, port scanning. The system may present a temporarily available network service to the first device in response to detecting the activity indicative of port scanning, for example, by redirecting traffic at an unassigned network address to a honeypot network service. The system may monitor communication between the first device and the presented honeypot network service to determine whether the monitored communication is indicative of a threat, and determine that the first device is compromised based on the monitored communication between the first device and the presented honeypot network service. The system may initiate measures to protect the network from the compromised first device.

    USING INDICATIONS OF COMPROMISE FOR REPUTATION BASED NETWORK SECURITY

    公开(公告)号:US20190149580A1

    公开(公告)日:2019-05-16

    申请号:US16249492

    申请日:2019-01-16

    申请人: Sophos Limited

    IPC分类号: H04L29/06 G06F16/28

    摘要: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.

    Honeypot network services
    80.
    发明授权

    公开(公告)号:US10284598B2

    公开(公告)日:2019-05-07

    申请号:US15010783

    申请日:2016-01-29

    申请人: Sophos Limited

    发明人: Daniel Stutz

    IPC分类号: H04L9/00 H04L29/06

    摘要: In general, in one aspect, a system for providing honeypot network services may monitor network activity, and detect network activity indicative of network service discovery by a first device, for example, port scanning. The system may present a temporarily available network service to the first device in response to detecting the activity indicative of port scanning, for example, by redirecting traffic at an unassigned network address to a honeypot network service. The system may monitor communication between the first device and the presented honeypot network service to determine whether the monitored communication is indicative of a threat, and determine that the first device is compromised based on the monitored communication between the first device and the presented honeypot network service. The system may initiate measures to protect the network from the compromised first device.