The present disclosure relates to a system and method for risk-based observability of a computing platform.
Organizations use comprehensive endpoint security solutions and endpoint protection platforms with automated detection. Threat hunting, threat detection, incident response, and forensic activities are known cybersecurity processes that identify and evaluate data for malicious or suspicious activities that may have previously evaded detection. These threat management activities allow organizations to be proactive in detecting and isolating advanced threats without any advance warning. These solutions work in addition to endpoint security solutions and add advanced technologies to find anomalies, unusual patterns, and other traces of attackers that shouldn't be in systems and files. Endpoint protection platforms leverage data analytics to capture and analyze large volumes of unfiltered endpoint data, and use signature analytics, behavioral analytics and artificial intelligence (AI) to provide high-speed visibility into malicious behaviors that may be initially undetectable.
A large organization may desire to implement endpoint protection systems and threat management activities relative to the data traffic and activity of sub-networks associated with authorized clients. The endpoint protection platforms and threat management applications are vendor-specific and require specified commands, processes and data formatting to implement the desired security solution. As a result, the organization can be presented various network security issues such as (1) choosing between suspicious and/or malicious activity detection and visibility while attempting to handle budget constraints and increasing data sources; (2) dealing with large teams and various data and infrastructure ownership models such as federated networks; (3) dealing with large teams and various data ownership models leading to siloed visibility between architecture and related infrastructure layers across both on-premise and cloud environments; and (4) dealing with disparate activity detection content models and a lack common data standards which creates inequities within the security operations teams and incongruent ability to deploy detection content and data enrichment. These issues can make cybersecurity operations and associated threat management activities cumbersome, inefficient, and costly which leads to vulnerabilities across the entire network.
An exemplary system for risk-based observability of a platform is disclosed, the system comprising: a receiver configured to receive data from plural devices associated with one or more computing environments on a network, the received data having a raw format according to the associated computing environment; a processor configured to: convert the raw format of the received data to a structured format; enhance the converted data by adding contextual information associated with a corresponding one of the plural devices; perform a risk analysis of the enhanced data based on risk content applied to the network; and apply one or more tags to the enhanced data based on results of the risk analysis; perform data analysis on the enhanced data to render synthesized and/or prioritized data for identifying one or more of the plural devices from an aggregate source; and a transmitter configured to send the rendered synthesized and/or prioritized data to one or more destinations on the network based on the one or more applied tags.
An exemplary method for risk-based observability of a platform is disclosed, the method comprising: receiving, by a receiver of a computing device, data from plural devices associated with one or more computing environments on a network, the received data having a raw format according to the associated computing environments; converting, by a processor of the computing device, the raw format of the received data to a structured format; enhancing, by the processor of the computing device, the converted data by adding contextual information associated with a source of the respective data; performing, by the processor of the computing device, a risk analysis on the enhanced data based on risk content applied to the network; applying, by the processor of the computing device, one or more tags to the enhanced data based on results of then risk analysis; performing, by the processor of the computing device, data analysis on the enhanced data to render synthesized and/or prioritized data for identifying one or more of the plural devices from an aggregate source; and sending, by a transmitter of the computing device, the rendered synthesized and/or prioritized data to one or more destinations on the network based on the one or more applied tags.
An exemplary computer readable medium storing program code for performing a method for risk-based observability of a platform, when placed in communicable contact with computing device the program code causing the computing device to perform operations comprising: receiving, by a receiver of a computing device, data from plural devices associated with one or more computing environments on a network, the received data having a raw format according to the associated computing environment; converting, by a processor of the computing device, the raw format of the received data to a structured format; enhancing, by the processor of the computing device, the converted data by adding contextual information associated with a source of the respective data; performing, by the processor of the computing device, a risk analysis on the enhanced data based on one or more risk detection rules applied to the network; applying, by the processor of the computing device, one or more tags to the enhanced data using results of the analysis; performing, by the processor of the computing device, data analysis on the enhanced data to render synthesized and/or prioritized data for identifying one or more of the plural devices from an aggregate source; and sending, by a transmitter of the computing device, the rendered synthesized and/or prioritized data to one or more destinations on the network based on the one or more applied tags.
Exemplary embodiments are best understood from the following detailed description when read in conjunction with the accompanying drawings. Included in the drawings are the following figures:
Further areas of applicability of the present disclosure will become apparent from the detailed description provided hereinafter. It should be understood that the detailed descriptions of exemplary embodiments are intended for illustration purposes only and, therefore, are not intended to necessarily limit the scope of the disclosure.
Exemplary embodiments of the present disclosure are directed to a system and method for risk-based observability of a platform. The network can include plural edge devices, which can manage and correlate data at the edge. The system gathers data on every device on a network and determines a device's importance and/or risk to the network. Data can be analyzed in real-time at the device-level upon entry to the network. The data can be enriched and tagged at the edge, such that only anomalous data is separated, filtered, and compressed before being sent to another location in the network for further evaluation. The system can receive data in various formats, structure the data in an open format that is consistent with an organization's priorities and risks, help identify root cause of threats and/or incidents, and group related alerts that can be addressed by a single action to track them to their origin. The data analysis allows the system to inspect an entire network and/or application stack, understand the impact of the data and any signatures or behavioral anomalies to your organization, and prioritize the anomalies in an order for response. The system serves as a single agnostic detection system that can look for data threat patterns and anomalies across multiple data formats. The exemplary embodiments of the present disclosure support a vendor-agnostic approach for Hunt, Incident Response, and Forensics activities, by consolidating and performing the actions required in a multi-vendor environment under one platform.
The data flow 100 of
As shown in the data flow 100 of
Following enrichment of the data, the processor can perform a risk analysis based on one or more risk content, which can include risk detection rules or risk detection models, such as threat content or analytics, applied to the network. The processor analyzes the data and identifies data traffic that is normal and data traffic that may be anomalous or contain anomalies. One or more tags are applied to the enhanced data based on results of the risk analysis (Stage 4). For example, the tags serve as indicators that identify factors needed for routing the data and further analysis. The processor applies data analysis to render synthesized and/or prioritized data to identify and persist a device/asset inventory from aggregate sources. According to an exemplary embodiment, the prioritized data can include asset or device inventory data, prioritized score data, or any other suitable data as desired. In addition, the processor filters the normal data so that only the anomalous data remains. The anomalous data is compressed and stored in memory of the computing device. A transmitter of the computing device sends the enhanced data to one or more destinations on the network based on the one or more applied tags (Stage 5). According to an exemplary embodiment, the data can be routed to team or group of an organization that can address or resolve threats and/or incidents associated with the anomalous data. These operation provide an an enhanced threat management response process in which a security team can spend less manual time and less cost processing data.
As shown in
As shown in
According to exemplary embodiments of the present disclosure, the one or more input devices 260 can be configured to receive commands and/or allow a user to interact (e.g., input data and/or commands) with the computing device. The one or more input devices 260 can include one or more of a physical or virtual keyboard, a touchpad, a mouse or stylus, microphone, camera or any other suitable input device as desired. The receiver 254 can include a combination of hardware and software components configured to receive streaming data from one or more other computing devices connected to the network and/or at the edge, a data lake, the cloud, or any other suitable component on the network as desired. According to exemplary embodiments, the receiver 254 can include a hardware component such as an antenna, a network interface (e.g., an Ethernet card), a communications port, a PCMCIA slot and card, or any other suitable component or device as desired. The receiver 254 can be connected to other devices via a wired or wireless network or via a wired or wireless direct link or peer-to-peer connection without an intermediate device or access point. The hardware and software components of the receiver 254 can be configured to receive data (e.g., streaming data) according to one or more communication protocols and data formats. The receiver 254 can be configured to communicate over a network, such as enterprise network, which may include a local area network (LAN), a wide area network (WAN), a wireless network (e.g., Wi-Fi), a cellular communication network, a satellite network, the Internet, fiber optic cable, coaxial cable, infrared, radio frequency (RF), another suitable communication medium as desired, or any combination thereof. During a receive operation, the receiver 254 can be configured to identify parts of the received data via a header and parse the data signal and/or data packet into small frames (e.g., bytes, words) or segments for further processing at the processor 256. It should be understood that the receiver 254 can be configured as an independent device or have circuitry and components integrated with a network interface 262.
The processor 256 can be a special purpose or a general purpose processing device encoded with program code or software for performing the exemplary functions and/or features disclosed herein. According to exemplary embodiments of the present disclosure, the processor 256 can include a central processing unit (CPU). The processor 256 can be connected to the communications infrastructure 264 including a bus, message queue, or network, multi-core message-passing scheme, for communicating with other components of the computing device 250, such as the memory 252, the one or more input devices 260, the network interface 262, and the I/O interface 266. The processor 256 can include one or more processing devices such as a microprocessor, microcomputer, programmable logic unit or any other suitable hardware processing devices as desired.
The I/O interface 266 can be configured to receive the signal from the processing device 256 and generate an output suitable for a peripheral device via a direct wired or wireless link. The I/O interface 266 can include a combination of hardware and software for example, a processor, circuit card, or any other suitable hardware device encoded with program code, software, and/or firmware for communicating with a peripheral device such as a display device, printer, audio output device, or other suitable electronic device or output type as desired. The I/O interface 266 can also be configured to connect and/or communicate with or in combination with other hardware components provide the functionality of various types of integrated and/or peripheral input devices described herein.
The transmitter 258 can be configured to receive data from the processor 256 and/or memory 252 and assemble the data into a data signal and/or data packets according to the specified communication protocol and data format of a peripheral device or remote device to which the data is to be sent. The transmitter 258 can include any one or more of hardware and software components for generating and communicating the data signal over the internal communication infrastructure 264 and/or via a direct wired or wireless link to a peripheral or remote device. The transmitter 258 can be configured to transmit information according to one or more communication protocols and data formats as discussed in connection with the receiver 254. According to an exemplary embodiment, the receiver 254 and the transmitter 258 can be integrated into a single device and/or housing, or configured as separate and independent devices. According to another exemplary embodiment, the receiver 254 and the transmitter 258 can be configured shared circuitry and components and can be further integrated with the network interface 262.
According to exemplary embodiments described herein, the combination of the memory 252 and the processor 256 can store and/or execute computer program code for performing the specialized functions described herein. It should be understood that the program code could be stored on a non-transitory computer readable medium, such as the memory devices for the computing device 250, which may be memory semiconductors (e.g., DRAMs, etc.) or other tangible and non-transitory means for providing software to the computing device 250. For example, via any known or suitable service or platform, the program code can be deployed (e.g., streamed and/or downloaded) remotely from computing devices located on a local-area or wide-area network and/or in a cloud-computing arrangement or environment, with a source-controlled (e.g., git, gitops, etc.) and container orchestration process. The computer programs (e.g., computer control logic) or software may be stored in memory 252 resident on/in the computing device 250. Such computer programs or software, when executed, may enable the computing device 250 to implement the present methods and exemplary embodiments discussed herein. Accordingly, such computer programs may represent controllers of the computing device 250. Where the present disclosure is implemented using software, the software may be stored in a computer program product or non-transitory computer readable medium and loaded into the computing device 250 using any one or combination of a removable storage drive, an interface for internal or external communication, and a hard disk drive, where applicable.
In the context of exemplary embodiments of the present disclosure, a processor can include one or more modules or engines configured to perform the functions of the exemplary embodiments described herein. Each of the modules or engines may be implemented using hardware and, in some instances, may also utilize software, such as corresponding to program code and/or programs stored in memory. In such instances, program code may be interpreted or compiled by the respective processor(s) (e.g., by a compiling module or engine) prior to execution. For example, the program code may be source code written in a programming language that is translated into a lower level language, such as assembly language or machine code, for execution by the one or more processors and/or any additional hardware components. The process of compiling may include the use of lexical analysis, preprocessing, parsing, semantic analysis, syntax-directed translation, code generation, code optimization, and any other techniques that may be suitable for translation of program code into a lower level language suitable for controlling the computing device 250 and/or the components of the enterprise network 204 to perform the functions disclosed herein. It will be apparent to persons having skill in the relevant art that such processes result in the computing device 250 and/or the components of the enterprise network 204 being specially configured computing devices uniquely programmed to perform the functions of the exemplary embodiments described herein.
As shown in
As shown in
It will be appreciated by those skilled in the art that the present invention can be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The presently disclosed embodiments are therefore considered in all respects to be illustrative and not restrictive. The scope of the invention is indicated by the appended claims rather than the foregoing description and all changes that come within the meaning and range and equivalence thereof are intended to be embraced therein.
Number | Date | Country | |
---|---|---|---|
63398611 | Aug 2022 | US |