F5, Inc.
METHODS FOR DETECTING AND MITIGATING MALICIOUS NETWORK ACTIVITY BASED ON DYNAMIC APPLICATION CONTEXT AND DEVICES THEREOF

Last updated:

Abstract:

Methods, non-transitory computer readable media, attack mitigation apparatuses, and network security systems that maintain an application context model for a protected application based on ingested logs. The application context model includes a map of network infrastructure associated with the protected application. Using the application context model, potential attack(s) against the protected application are identified and possible mitigation action(s) to take in response to one or more of the identified potential attack(s) are scored. A stored policy is executed to evaluate the possible mitigation action(s) based on the scoring. One or more of the possible mitigation action(s) are initiated on the identified potential attack(s) based on the evaluation. With this technology, malicious network activity can be more effectively and quickly detected and mitigated resulting in improved network security.

Status:
Application
Type:

Utility

Filling date:

11 Dec 2018

Issue date:

11 Jun 2020