Hierarchical statistical model of internet reputation

a reputation score and hierarchy technology, applied in the field of computer security, can solve the problems of inability to assign a reputation score to an entity that is not known, and the current approach relying on black-and-white lists of known identifiers suffers from a grave weakness

Active Publication Date: 2011-03-03
SOPHOS
View PDF2 Cites 152 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005]In embodiments, the present invention may provide for a hierarchical modeling processing facility to build a hierarchical reputation model of Internet entities that allows for the automated clustering of “neighborhoods” of related systems, and thus the reputation assessment even of brand new hosts within a neighborhood. The reputation of such a neighborhood, with an accompanying confidence level, may be derived statistically from measurements of observed behavior of the systems within it. This may in turn be used to produce an action to provide additional security to users.

Problems solved by technology

Most current approaches relying on black- and white-lists of known identifiers suffer from a grave weakness: they are unable to assign a reputation score to an entity not already encountered—such as the many thousands of new bots that are brought online daily.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical statistical model of internet reputation
  • Hierarchical statistical model of internet reputation
  • Hierarchical statistical model of internet reputation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017]FIG. 1 depicts a block diagram of a threat management facility providing protection to an enterprise against a plurality of threats. An aspect of the present invention relates to corporate policy management and implementation through a unified threat management facility 100. As will be explained in more detail below, a threat management facility 100 may be used to protect computer assets from many threats, both computer-generated threats and user-generated threats. The threat management facility 100 may be multi-dimensional in that it may be designed to protect corporate assets from a variety of threats and it may be adapted to learn about threats in one dimension (e.g. worm detection) and apply the knowledge in another dimension (e.g. spam detection). Policy management is one of the dimensions for which the threat management facility can provide a control capability. A corporation or other entity may institute a policy that prevents certain people (e.g. employees, groups of e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In embodiments of the present invention improved capabilities are described for predicting the reputation of a communication identifier, such as a web address, a domain name, an IP address, host name, email address, IM address, telephone number, VoIP telephony address, and the like. In embodiments, the present invention may receive a communication from a first communication identifier, parse the first communication identifier into its components, and assign the components to a hierarchical tree structure, where the hierarchical tree structure maintains the hierarchical relationship between the components of the communication identifier. The present invention may monitor and keep count of a number of communications from the first communication identifier, wherein the number of communications may be kept for both malicious and / or unwanted communications and non-malicious and / or unwanted communications. Attributes may then be provided to the number of communications for each appropriate component of the hierarchical tree, and a statistical measure may be calculated as related to the number of communications for each component of the hierarchical tree. The present invention may then receive a communication from a second communication identifier, where the second communication identifier may be previously unknown and have a common component with the hierarchical tree. The statistical measure of the common component may then be assigned to the second communication identifier, and utilizing the statistical measure assigned to the second communication identifier, may provide a prediction of reputation of the second communication identifier.

Description

BACKGROUND[0001]1. Field[0002]The present invention is related to computer security, and more specifically to reputation of Internet entities.[0003]1. Description of the Related Art[0004]Assessing the reputation (“trustworthiness”) of Internet entities via identifiers such as IP addresses and hostnames is a fundamental network security task. Most current approaches relying on black- and white-lists of known identifiers suffer from a grave weakness: they are unable to assign a reputation score to an entity not already encountered—such as the many thousands of new bots that are brought online daily. Therefore there exists a need for improved reputation assessment, where a reputation score may be assigned to new entities as they are encountered for the first time.SUMMARY[0005]In embodiments, the present invention may provide for a hierarchical modeling processing facility to build a hierarchical reputation model of Internet entities that allows for the automated clustering of “neighbor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F17/30
CPCG06Q10/107H04L63/105H04L51/12H04L12/585H04L51/212
Inventor THOMAS, ROSS G.
Owner SOPHOS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products