The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 13, 2018

Filed:

Mar. 18, 2017
Applicant:

Fortinet, Inc., Sunnyvale, CA (US);

Inventors:

Wei David Wang, North Vancouver, CA;

Dayong Zhou, Burnaby, CA;

Ihab Khalil, Port Coquitlam, CA;

Assignee:

Fortinet, Inc., Sunnyvale, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/55 (2013.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1425 (2013.01); H04L 63/0245 (2013.01); H04L 63/0254 (2013.01); H04L 63/14 (2013.01); H04L 63/145 (2013.01); H04L 63/1416 (2013.01); H04L 63/20 (2013.01);
Abstract

Methods and systems for improved attack context data logging are provided. According to one embodiment, prior to a logging event being triggered (i) it is determined by a network security device whether a received packet is potentially associated with a threat or undesired activity by analyzing the packet; (ii) when the determination is negative, the packet is stored within a circular buffer; and (iii) when the determination is affirmative, (a) the logging event is triggered, (b) pre-attack context information regarding the threat is captured by extracting information from packets within the circular buffer and (c) the pre-attack context information is stored within a log. After the logging event has been triggered and until information regarding a predefined quantity of packets has been logged, post-attack context information regarding the threat is captured by extracting information from subsequently received packets and the post-attack context information is stored within the log.


Find Patent Forward Citations

Loading…