发明名称 System and method for using file hashes to track data leakage and document propagation in a network
摘要 The system and method described herein may use file hashes to track data leakage and document propagation in a network. For example, file systems associated with known reference systems and various user devices may be compared to classify the user devices into various groups based on differences between the respective file systems, identify files unique to the various groups, and detect potential data leakage or document propagation if user devices classified in certain groups include any files that are unique to other groups. Additionally, various algorithms may track locations, movements, changes, and other events that relate to normal or typical activity in the network, which may be used to generate statistics that can be compared to subsequent activities that occur in the network to detect potentially anomalous activity that may represent potential data leakage or document propagation.
申请公布号 US9367707(B2) 申请公布日期 2016.06.14
申请号 US201213403108 申请日期 2012.02.23
申请人 TENABLE NETWORK SECURITY, INC. 发明人 Gula Ron;Ranum Marcus
分类号 G06F7/04;G06F17/30;H04N7/16;G06F21/64;G06F12/08 主分类号 G06F7/04
代理机构 Pillsbury Winthrop Shaw Pittman LLP 代理人 Pillsbury Winthrop Shaw Pittman LLP
主权项 1. A system for using file hashes to track data leakage and document propagation in a network, comprising: one or more physical processors programmed to execute computer program instructions which, when executed, cause the physical processors to: obtain a set of hashes that are associated with files of a user device of a set of user devices, and a reference set of hashes that are associated with files of a reference system, wherein the reference system is limited to files authorized to be on all devices of the set of user devices;determine an additional subset of hashes included in the set of hashes and not included in the reference set of hashes based on a comparison between the set of hashes and the reference set of hashes;classify the user device into a group based on the additional subset of hashes comprising a hash that is the same as a hash associated with a file of at least another user device classified into the group;predict that the file associated with the same hash is exclusive for the group to which the user device is classified;scan one or more other user devices not classified into the group to determine what files are on the other user devices;generate an alert indicating unauthorized file access, wherein the alert is generated responsive to the scan indicating that the other user devices contain the file predicted to be exclusive for the group to which the user device is classified; anddeliver the alert to a user.
地址 Columbia MD US