F5, Inc.
METHODS FOR DETECTING AND MITIGATING MALICIOUS NETWORK ACTIVITY BASED ON DYNAMIC APPLICATION CONTEXT AND DEVICES THEREOF
Last updated:
Abstract:
Methods, non-transitory computer readable media, attack mitigation apparatuses, and network security systems that maintain an application context model for a protected application based on ingested logs. The application context model includes a map of network infrastructure associated with the protected application. Using the application context model, potential attack(s) against the protected application are identified and possible mitigation action(s) to take in response to one or more of the identified potential attack(s) are scored. A stored policy is executed to evaluate the possible mitigation action(s) based on the scoring. One or more of the possible mitigation action(s) are initiated on the identified potential attack(s) based on the evaluation. With this technology, malicious network activity can be more effectively and quickly detected and mitigated resulting in improved network security.
Utility
11 Dec 2018
11 Jun 2020