US 12,041,074 B2
Malware spread simulation and visualization for cloud security
Sean Hittel, Calgary (CA); and Ravindra K. Balupari, San Jose, CA (US)
Assigned to Netskope, Inc., Santa Clara, CA (US)
Filed by Netskope, Inc., Santa Clara, CA (US)
Filed on Jun. 30, 2023, as Appl. No. 18/345,307.
Application 18/345,307 is a continuation of application No. 17/110,132, filed on Dec. 2, 2020, granted, now 11,736,509.
Application 17/110,132 is a continuation of application No. 15/911,034, filed on Mar. 2, 2018, granted, now 10,862,916, issued on Dec. 8, 2020.
Claims priority of provisional application 62/480,542, filed on Apr. 3, 2017.
Prior Publication US 2023/0353592 A1, Nov. 2, 2023
Int. Cl. H04L 9/40 (2022.01); G06F 16/176 (2019.01); G06F 21/56 (2013.01); G06F 21/57 (2013.01); G06F 21/62 (2013.01); H04L 67/10 (2022.01)
CPC H04L 63/1433 (2013.01) [G06F 16/176 (2019.01); G06F 21/56 (2013.01); G06F 21/577 (2013.01); G06F 21/6218 (2013.01); H04L 63/145 (2013.01); H04L 67/10 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method of simulating spread of a malware in cloud applications, the method including:
accessing sharing data for files shared between users of cloud applications;
tracing connections between the users by traversing a directed graph constructed based on the sharing data;
simulating spread of a malware based on the traced connections to simulate user exposure to, infection by, and transmission of the malware, wherein the malware is spread by sharing of infected ones of the files; and
generating a time-lapse visualization of the spread of the malware, the generating comprising:
generating a visualization of the traced connections comprising nodes representing each of the users and edges connecting the nodes, the edges representing the traced connections,
applying visual codings to the nodes to distinguish between the users based on exposure to the malware, and
adjusting the visual codings to generate the time-lapse visualization indicating an evolution of a state of the users, wherein the states include malware exposure, malware infection, and malware transmission.