The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 30, 2021

Filed:

Nov. 04, 2019
Applicant:

Netskope, Inc., Santa Clara, CA (US);

Inventors:

Sean Hittel, Calgary, CA;

Krishna Narayanaswamy, Saratoga, CA (US);

Ravindra K. Balupari, San Jose, CA (US);

Ravi Ithal, Fremont, CA (US);

Assignee:

Netskope, Inc., Santa Clara, CA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/56 (2013.01); G06F 21/55 (2013.01); G06F 16/907 (2019.01);
U.S. Cl.
CPC ...
H04L 63/145 (2013.01); G06F 16/907 (2019.01); G06F 21/552 (2013.01); G06F 21/565 (2013.01); H04L 63/1433 (2013.01); G06F 21/566 (2013.01); G06F 2221/2101 (2013.01);
Abstract

The technology disclosed relates to detecting a data attack on a local file system. The detecting includes scanning a list to identify files of the local file system that have been updated within a timeframe, reading payloads of files identified by the scanning, calculating current content properties from the payload of the files, obtaining historical content properties of the files, determining that a malicious activity is in process by analyzing the current content properties and the historical content properties to identify a pattern of changes that exceeds a predetermined change velocity. Further, the detecting includes determining that the malicious activity is in process by analyzing the current content properties and known patterns of malicious metadata to identify a match between the current metadata and the known patterns of malicious metadata, determining a machine/user that initiated the malicious activity, and implementing a response mechanism that restricts file modifications by the machine/user.


Find Patent Forward Citations

Loading…