Attack Detection And Prevention Using Global Device Fingerprinting
A device fingerprint and security device technology, applied in the field of computing systems, can solve the problem that the IP address is not the identity of the attacker
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0066] Example 1. A method includes: receiving, by a security device, network traffic from a device directed to one or more computing devices protected by the security device; in response to receiving the network traffic, sending, by the security device to the device, a request for A request for a plurality of data points of the device, wherein the data points include characteristics associated with the device; receiving, by the security device, at least a portion of the requested plurality of data points from the device; receiving, by the security device, the requested The received portion of the plurality of data points is compared with a corresponding set of data points associated with one or more known attacker devices; based on the comparison, determining the number of data points associated with the first known attacker device Whether the first corresponding set satisfies a similarity threshold; and based on the determination, selectively managing additional network traf...
example 2
[0067] Example 2. The method of Example 1, further comprising: prior to sending the request for the plurality of data points, injecting code requesting the plurality of data points into a response received from at least one of the one or more computing devices , wherein the received response is sent by the at least one computing device of the one or more computing devices in response to the network traffic.
example 3
[0068] Example 3. The method of any combination of examples 1-2, further comprising: analyzing the network traffic to extract information related to one or more data points about the device; and extracting, by the security device, information related to the one or more data points The information and the received portion of the requested plurality of data points are used to generate a device fingerprint for the device, wherein the device fingerprint identifies the device.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 