Back

Remedial Action Request Architecture


Drawings

Brief Description:

Figure 1 shows an embodiment of a remedial action architecture for a client facility, a gateway facility, and external computer devices

Detailed Description:

Referring to Figure 1, a remedial action request architecture that may include a client computing facility 102 and a gateway facility 104 is shown. In an embodiment, a client computing facility 102 may be any type of computing device that may reside on a network 106 and may include the capability of requesting access to other internal or external client computing facilities. The client computing facility 102 may be any type of computing device that may include a desktop computer, a laptop computer, a tablet computer, a handheld computer, a smart phone computing device, or the like. The client computing facility 102 resident network 106 may be any type of network 106 that may include a LAN, WAN, Peer-to-Peer network, intranet, internet, or the like and the network access requests may be to other client computing facilities 102 within the network 106 or to an external network; the external network may include a LAN, WAN, Peer-to-Peer network, intranet, internet, or the like. The network 106 may be a wired network, wireless network, a combination of wired and wireless network, or the like. In an embodiment, the network access request may be to a URL, an FTP access, a peer-to-peer access request, a request within the network 106, a request to another network 106, or the like. 

A gateway facility 104, may be any network computing device that may controlaccess of client computing facilities from one network to another network or within a network. Access control of the network 106 may include controlling network 106access request from client computing facilities 102 from within the network 106 to computing facilities external to the network 106, controlling access request from external computing facilities external to the network 106 to client computing facilities, or the like. The gateway may include at least one protocol to determine if the network 106access request is to be allowed such as using a block list, a black list, an allow list, a white list, a rules data base, a policy database, or the like. Based on the protocol, the gateway facility 104 may allow or block a network access request from an internal client computing facility 102, an external computing facility, or the like. When a request is blocked by the gateway facility 104, information regarding the block may be transmitted to a client computing facility 102. In an embodiment, the information may be a data file, a command file, a combination of a data file and command file, or the like. The data file may contain a number of commands, definitions, or instructions to be parsed and acted upon, or the like. In an embodiment the data file may include address information on the requested network site, an application requesting the requested network site interaction, a file requesting the requested network site interaction, a rule that blocked the requested network site interaction, or the like.

A security facility 108 may be a software application that may provide malicious code and malicious application protection to the client computing facility 102. The security facility may have the ability to scan the client computing facility 102 files for malicious code, remove or quarantinecertain applications and files, prevent certain actions, perform remedial actions (e.g. as described herein) and perform other security measures. In embodiments, scanning the client computing facility 102 may include scanning some or all of the files stored to the client computing facility 102 on a periodic basis, may scan applications once the application has been requested to execute, may scan files as the files are transmitted to or from the client computing facility 102, or the like. The scanning of the applications and files may be to detect known malicious code or known malicious applications. In an embodiment, new malicious code and malicious applications may be continually developed and distributed and updates to the known malicious code file may be provided on a periodic basis, on a demand basis, on an alert basis, or the like. 

A network control facility 110 may provide the network access capability to the client computing facility 102; the network access may be to other client computing facilities 102 within the network 106, the network access may be to other computer facilities external to the client computing facility 102 network 106, or the like. The network control facility 110 may be a software application (e.g. a web browser), hardware (e.g. a network access device), a firmware application, a combination of software, hardware, and firmware, or the like. In an embodiment, the network control facility 110 may interface with the security facility 108, any associated malicious code files, and a policy facility 118 to determine network 106access rights and permissions. Additionally, once the client computing facility 102 network control facility 110 determines and provides network 106access, the gateway facility 104 may make a determination of what connectivity may be made to other client computing facilities and networks

In an embodiment, an application 112 may be any software file that may be executed on the client computing facility 102. The application 112 may be an application 112 that is executed at a user request to perform some work on the client computing facility 102, an application 112 that requests network access to another computing facility either within the same network 106 as the client computing facility 102 or external to the client computing facility 102, or the like. In embodiments, the application access request may be user requested, may be auto-requested, or the like. Depending on policies for network access requests, a user network access request may be allowed or denied. If an access request is denied, the user may or may not be notified, the access request denial may just fail to connect to the desired network location. In embodiments, the auto-requested network request may be a result of a legitimate application 112 requesting information from another client computing facility 102 or network, a malicious application requesting network access, or the like. The malicious application network access may be an attempt to corrupt the client computer facility 102, an attempt to corrupt the gateway facility 104, an attempt to corrupt the network 106 on which the client computing facility 102 resides, an attempt to accessexternal networks or computer facilities, or the like. 

An IDE 114 may be a virus identity file that may include definitions of known or potential malicious code. The IDE 114 may provide information that may identify malicious code within files, applications, or the like. The IDE 114 may be accessed by the security facility 108 when scanning files or applications 112 within the client computing facility 102 for the determination of malicious code that may be within the file or application 112. In an embodiment, when the information regarding a blocked access is received from the gateway facility 104, the security facility 108 may access the IDE 114 to parse the data file and determine an action to be taken on an application requesting access to a denied network location. The IDE 114 may contain a number of commands, definitions, or instructions, to be parsed and acted upon, or the like. In embodiments, the client computing facility 102 may be updated with new IDE 114 files periodically to provide the client computing facility 102 with the most recent malicious code definitions; the updating may be performed on a set time period, may be updated on demand from the client computing facility 102, may be updated on demand from the network 106, may be updated on a received malicious code alert, or the like. In an embodiment, the client computing facility 102 may request an update to the IDE 114 files from an update facility within the network 106, may request updated IDE 114 files from a computing facility external to the network 106, updated IDE 114 files may be provided to the client computing facility 102 from within the network 106, IDE 114 files may be provided to the client computing facility 102 from an external computing facility from an external network, or the like. 

In an embodiment, the policy facility 118 may be a set of rules or policies that may indicate network access permissions for a client computing facility 102. The policy facility 118 may include a database, a text file, a combination of databases and text files, or the like. In an embodiment, the policy database may be a block list, a black list, an allowed list, a white list, or the like that may provide a list of network locations that may or may not be accessed by the client computing facility 102. The policy facility 118 may include rules that may be interpreted with respect to the network access request to determine if the request should be allowed. The rules may provide a generic rule for the type of access that may be granted; the rules may be related to the policies of an enterprise for access rights for the enterprise’sclient computer facilities 102. For example, there may be a rule that does not permit access to sporting websites. When a website is requested by the client computing facility 102, the security facility 108 may access the rules within the policy facility 118 to determine if the requested access is related to a sporting website. In an embodiment, the security facility 108 may analyze the requested website to determine if the website matches with any of the policy facility 118rules

In an embodiment, a remedial action facility 120 may be an application that may respond to information from the gateway facility 104 when a client computing facility 102 network access request has been denied. In an embodiment, when the data file is received from the gateway facility 104, the remedial action facility 120 may parse the data file, interpret the various aspects of the data file, and act on the parsed datafile information to determine actions to be taken on an application requesting access to a denied network location. In an embodiment, when the data file may be received from the gateway facility 104, the remedial action facility 120 may access the IDE to parse the data file and determine an action to be taken on an application requesting access to a denied network location. In an embodiment, the information received from the gateway facility 104 may be a command or a command file. The remedial action facility 120 may carry out any commands that are received or parsed from a data file from the gateway facility 120 without performing any interpretation of the commands. In an embodiment, the remedial action facility may interact with the received information and may perform various actions on an application requesting access to a denied network location. The action may be one or more of continuing to block all requests to a denied network location, a malicious code scan on the application, a malicious code scan on the client computer facility 102, quarantine of the application, terminating the application, isolation of the application, isolation of the client computer facility 102 to a location within the network that restricts network access, blocking a network access port from a client computer facility 102, reporting the application to a system administrator, or the like. 

In an embodiment, a network access control 122 may be responsible for determining if a client computing facility 102 application should be granted access to a requested network location. The network location may be on the same network 106 as the gateway facility 104 or may be on another network. In an embodiment, the network access control 122 may verify access rights for client computing facilities from within the network 106 or may verify access rights of computer facilities from external networks. When network access for a client computing facility 102 is denied, the network access control 122 may send an information file to the client computing facility 102, the information file may contain data or commands that may provide instructions for the remedial action facility 120. The information sent by the network access control 122 may be a data file. The data file may contain a number of commands, definitions, instructions, commands to be parsed and acted upon by the remedial action facility, or the like. The information sent by the network access control 122 may be a command or command file that the remedial action facility may access and take action upon

In an embodiment, the network access rules 124 may provide an information store to be accessed by the network access control 122. The network access rules 124 may include databases such as a block list, a black list, an allowed list, a white list, an unacceptable network site database, an acceptable network site database, a network site reputation database, or the like of network access locations that may or may not be accessed by the client computing facility 102. Additionally, the network access rules may incorporate rule evaluation, the rule evaluation may parse network access requests and apply the parsed information to network access rules. The network access rules may a generic set of rules that may be in support of an enterprise’snetwork access policies such as denying access to certain types of websites, controlling instant messenger access, or the like. The rule evaluation may include regular expression rule evaluation, virus description language (VDL) evaluation, or other rule evaluation method for interpreting the network access request and comparing the interpretation to the established rules for network 106access. In an embodiment, the network access rules 124 may receive a rules evaluation request from the network access control 122 and may return the rules evaluation to the network access control 122

Referring again to Figure 1, protecting the client computing facility 102 from threats caused by malicious code and malicious applications may include more than one level. In an embodiment, malicious code may imbed itself into applications that may already be stored on the client computing facility 102, such as within a document application or document file. The threats may be received from other client computing facilities 102 on the same network as files are shared, received from external networks as the client computing facility 102 connects with other networks, or the like. 

For protecting the individual client computing facility 102 the security facility may interact with the IDE file114 and policy facility 118 as files are received at the client computing facility 102. The security facility 108 may attempt to determine if the incoming file may include malicious code or if the file is a malicious application by comparing the contents of the file with the IDE 114file information. For malicious code and malicious applications that are previously defined within the IDE file this may provide adequate protection for the client computer facility 102 by cleaning the incoming file, denying the incoming file from being stored on the client computing facility 102, or the like. 

In a similar manner, both the IDE file114 and policy facility 118 may be used to scan an outgoing file and verify that the outgoing file is permitted to be transmitted per the enterprise rules and policies. By checking outgoing files, the security facility may be able discover malicious code infected files that were not detected as incoming files as a result of the client computing facility having been updated with either new IDE 114 files or policy facility 118information. The IDE file114 may discover the malicious code infectedfile by having received updates of developing malicious code from the system administrator, updates from an IDE provider, or the like. The policy facility 118 may discover the malicious code infectedfile by having received new updates from the system administrator, from a rules provider, or the like. 

Once a client computing facility 102 has become infected with malicious code or a malicious application, the user of the client computing facility 102 may be unaware that the application is attempting to connect to another network location in an attempt to receive additional malicious code. Additionally, the malicious code or malicious application may have deactivated some or all of the security facility 108 leaving the client computing facility 102 with the inability to determine that a malicious file is attempting to access another network. Once infected, the user may not be aware that the client computing facility 102 application 112 is attempting to connect with another network

Once a client computing facility 102 has become infected with malicious code, the malicious code may use the application 112 and network control facility 110 to attempt to connect to a network location where additional malicious code and/or malicious applications may be downloaded to the client computing facility 102. If the malicious code is not yet defined in the IDE file114 or if at least part of the security facility 108 has been disabled, the malicious code may be successful in using the application 112 and network control facility 110 to request a network access from the gateway facility 104

The client computing facility 102 network access request may be received at the gateway facility 104network access control 122. The network access control 122 may act as a second level of defense against malicious code and malicious applications from accessing other network locations. The network access control 122 may be associated with the network access rules 124 that may provide all the rules for accessing other networks for the network 106. As previously described herein, the network access rules may include access databases, access rules that may be interpreted, a combination of databases and access rules, or the like. 

In an embodiment, the network access request may be an attempt to connect to any type of computer facility on another network such as a server 126, desktop computer, laptop computer 128, smart device 130, database 116, or the like. 

Once received at the network access control 122, the network access request may be analyzed, parsed, reviewed, or the like to determine if the network access request is allowed by the defined access rules stored within the network access rules 124. If the network access request is for a network location that is not allowed as defined by the rules within the network access rules 124, the network access request may be denied. 

In a first embodiment, the denied network access request may be reported back to the client computing facility 102 as a denied access and the malicious code infected may continue attempts to access the same network location or a different access location with the possibility that the second network location may not be within the deny access rules. In an embodiment, the malicious code infectedapplication 112 may try a plurality of different network locations in an attempt for a successful network access request

In a second embodiment, with the denied network access request, the network access control 122 may return a file to the client computing facility 102 that may include information for investigating the source of the denied network access request. In an embodiment, the information file that is received at a client computing facility 102 may be accessed by the remedial action facility 120 to determine actions that the remedial action facility 120 and the security facility 108 may take to determine the source of the denied network access request. In embodiments, the sending of file information to the client computing facility 102 may comprise an attempt to find the source application of the denied network access request, the remedial action facility 120 may take action against the application 112 attempting the network accesses to prevent additional attempts to connect with network locations that are not permitted per the network access rules 124. In an embodiment, the information file may be stored on the client computing facility 102 and the storing of the information file may provide an indication for the remedial action facility 120 to analyze the information file

In an embodiment, the information file may include commands determined by the network access control 122 to locate the source of the network access request. The remedial action facility 120 may parse the information file to at least one command. In an embodiment, the commands may be executed as the information file is parsed, the commands may be stored to a file from which the commands may be executed, or the like. In an embodiment, there may be more than one command, with a second command being executed based on the outcome of a first command. For example, the first command may include instructing the security facility 108 to scan all executing applications on the client computing facility 102 to determine the application 112 that requested the denied network access. The second command may include instructions to terminate executing applications 112 if the first command is not able to determine the application 112 that requested the denied network access. In an embodiment, one of the commands in the information file may be to request a new IDE file114 that may provide the latest malicious code and malicious application information

In an embodiment, the information file may include data that the remedial action facility 120 may interpret for locating the application that requested the denied network application request. In an embodiment, the data within the information file may include instructions to the remedial action facility 120 for steps to be taken to identify the application requesting the denied network access request. The remedial action facility 120 may parse the information file in to at least one instruction. In an embodiment, the parsed instructions may be interpreted by the remedial action facility 120 for the determination of the actions that are to be used to identify the application requesting the denied network access request. In embodiments, the instructions may be interpreted as requesting a new IDE file114, requesting the security facility 108 to scan the client computing facility 102, terminating an identified application, isolating an identified application, reporting an identified application to a reporting facility within the network, requesting additional actions from the network access control 122, or the like. 


Parts List

102

client computing facility

104

gateway facility

106

network

108

security facility

110

network control facility

112

application

114

116

database

118

policy facility

120

remedial action facility

122

network access control

124

network access rules

126

server

128

laptop computer

130

smart device


Terms/Definitions

IDE files

reported information

supplemental file

threat notice

block list

commands, definitions, or instructions

associated malicious code files

plurality

established rules

network resources

rules or policies

network access locations

desktop computer

user type

gateway facility

known malicious code

computing device

test file

particular enterprise

firmware

intranet

communication

combination

most recent malicious code definitions

applications and files

same network location

second embodiment

update

all the rules

resides

streaming file

certain types

block

one network

actions

protection

level

preparedness

client computer facility

planned update

network

same network

new IDE file

desired network location

action upon

rules

web browser

user request

successful network access request

interpretation

network control facility

user network access request

recording facility

at least one command

demand basis

updated rules

remedial action request architecture

data file and command file

data file

policy facility

malicious file

rules provider

computer facility

IDE management facility

network computing device

allowed list

command

other activities

external network

control

malicious application

access databases

received malicious code alert

network site reputation database

remedial action facility

generic rule

black list

set time period

streaming file or portions

update facility

attempt

network access port

denied network access

other client computing facilities

acceptable network site database

at least one instruction

organization hierarchy

tablet computer

security management facility

database

testing facility

file information

network access capability

result

type

IDE management

hardware

unacceptable network site database

network access rules management facility

generic set

legitimate application

virus identities

requested network site

instant messenger access

streaming files

network access device

action

malicious code

ability

blocks

overall security

gateway

certain applications and files

malicious applications

denied network location

streaming file management

access rights

at least part

parsed instructions

list

parsed data

commands

policy database

access rules

example

outgoing files

stored streaming file

additional actions

requested access

periodic basis

new updates

network access requests

white list

direct control

application access request

capability

IDE information

network access rules

known malicious code information

testing information

malicious code scan

computing facility

number

security configurations

at least one protocol

network access

able discover malicious code

rapid updating

updating

location

network locations

computer facilities

malicious code infected

corrective action

instructions

enterprise wide access rules

management

fixed periodic basis

enterprise rules

management facility

access request denial

external networks

address information

network accesses

test management facility

subset

rule evaluation

received information

application

requested network location

rules data base

reaction

external computing facilities

text file

client computing facilities

allow list

policy

website

user

laptop computer

enterprise’s

data

internet

access request

resident network

sporting website

only the personnel

adequate protection

document application or document file

individual client computing facility

transmitted

updates

peer-to-peer access request

scanning files or applications

outgoing file

other network locations

distribution system

additional attempts

connectivity

new malicious code

existing IDE file

reporting facility

Peer-to-Peer network

automatic and manual methods

network location

checking streaming files

malicious application network access

IDE file

security management

wireless network

other computer facilities

various aspects

access rights and permissions

remedial actions

system administrator’s

distribution

incoming files

test files

entire enterprise

other rule evaluation method

network access rules management

blocked access

demand

malicious code descriptions

request

regular expression rule evaluation, virus description language

predefined rule sets

defense

rule

software, hardware

continual updating

IDE provider

access control

steps

protocol

software file

access

auto-requested network request

application capabilities

computer facility type

network access request

wired network

first command

external client computing facilities

requested website

FTP access

databases

only support personnel

bandwidth

threats

malicious application information

denied network access request

parsed information

isolation

requested network site interaction

altered malicious code

additional malicious code

continual defense

other security measures

outcome

IDE definitions

determination

policy management facility

command file

alert

more than one command

information file

firmware application

network administrator

other client computing facilities and networks

smart phone computing device

external computer devices

second network location

sporting websites

quarantine

support

second level

network access control

databases and access rules

client facility

applications

similar manner

deny access rules

enterprise

network access policies

websites

identified application

incoming file

information

definitions

contents

certain actions

alert basis

networks

different network locations

predefined rules

external computing facility

known or potential malicious code

search

source

embodiment

possibility

timely updates

data or commands

malicious code information

departments

file

facilities

more than one level

software application

customers

virus identity file

first embodiment

various actions

computing facilities

internal client computing facility

other networks

smart device

command or command file

security facility

sending

denied network application request

indication

handheld computer

rules evaluation

IM activity

application type

defined access rules

source application

client computing facility

known malicious code file

network access permissions

server

acceptability

policies

work

facility

different access location

second command

information store

executing applications

associated client facilities

rules evaluation request

embodiments

testing

malicious application protection

denied access

provider

scanning

system administrator

databases and text files

remedial action architecture

latest malicious code

client computer facilities

file or application