Secure labeling of network flows
    7.
    发明授权

    公开(公告)号:US10721210B2

    公开(公告)日:2020-07-21

    申请号:US16406318

    申请日:2019-05-08

    申请人: Sophos Limited

    IPC分类号: H04L29/06 H04L9/32

    摘要: An enterprise security system is improved by instrumenting endpoints to explicitly label network flows with cryptographically secure labels that identify an application or other source of each network flow. Cryptographic techniques may be used, for example, to protect the encoded information in the label from interception by third parties or to support cryptographic authentication of a source of each label. A label may provide health, status, or other heartbeat information for the endpoint, and may be used to identify compromised endpoints, to make routing decisions for network traffic (e.g., allowing, blocking, rerouting, etc.), to more generally evaluate the health of an endpoint that is sourcing network traffic, or for any other useful purpose.

    COMPUTER AUGMENTED THREAT EVALUATION
    8.
    发明申请

    公开(公告)号:US20200074078A1

    公开(公告)日:2020-03-05

    申请号:US16128984

    申请日:2018-09-12

    申请人: Sophos Limited

    摘要: An automated system attempts to characterize code as safe or unsafe. For intermediate code samples not placed with sufficient confidence in either category, human-readable analysis is automatically generated to assist a human reviewer in reaching a final disposition. For example, a random forest over human-interpretable features may be created and used to identify suspicious features in a manner that is understandable to, and actionable by, a human reviewer. Similarly, a k-nearest neighbor algorithm may be used to identify similar samples of known safe and unsafe code based on a model for, e.g., a file path, a URL, an executable, and so forth. Similar code may then be displayed (with other information) to a user for evaluation in a user interface. This comparative information can improve the speed and accuracy of human interventions by providing richer context for human review of potential threats.

    DYNAMIC POLICY BASED ON USER EXPERIENCE
    10.
    发明申请

    公开(公告)号:US20190319961A1

    公开(公告)日:2019-10-17

    申请号:US16383407

    申请日:2019-04-12

    申请人: Sophos Limited

    IPC分类号: H04L29/06

    摘要: Entity models are used to evaluate potential risk of entities, either individually or in groups, in order to evaluate suspiciousness within an enterprise network. These individual or aggregated risk assessments can be used to adjust the security policy for compute instances within the enterprise network. A security policy may specify security settings such as network speed, filtering levels, network isolation, levels of privilege, and the like.