Human user verification of high-risk network access

ABSTRACT

Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, when an intermediary security device identifies a high-risk network access that is potentially initiated by a human user or a piece of software running on the device of the human user, a human user test message is sent to the human user to verify that the high-risk network access was indeed initiated by the human user. After a response to the human user test message is received by the intermediary security device, it is determined if the response is a correct response to the human user test. The security device allows the high risk network access if the response is correct.

COPYRIGHT NOTICE

Contained herein is material that is subject to copyright protection.The copyright owner has no objection to the facsimile reproduction ofthe patent disclosure by any person as it appears in the Patent andTrademark Office patent files or records, but otherwise reserves allrights to the copyright whatsoever. Copyright© 2013, Fortinet, Inc.

BACKGROUND

1. Field

Embodiments of the present invention generally relate to the field ofnetwork security techniques. In particular, various embodiments relateto human user verification of high risk network access performed on anintermediary security device.

2. Description of the Related Art

Malware includes software that may be loaded onto a computer forperforming operations against an interest or intension of a user.Malware commonly perform automated network access without notificationto or awareness by the user. Such network accesses include downloadingmalware via drive-by-download. In this case, a website contains one ormore web browser exploits that will execute arbitrary code on the user'scomputer automatically when the user visits that site with a vulnerableversion of a web browser. Some malware may download other malwaremodules or updates to an infected computer. Most of the time asuccessful exploit (or social engineering attack) first installs aloader program on the victim's computer, which then loads other malware(e.g., a rootkit, a bot, a spambot, a password stealer or the like) andfuture updates of those malware automatically. Some malware connect tobotnet command and control (C&C) servers to retrieve instructions orupload stolen information. Most bots connect to their C&C servers on aregular basis as long as the victim computer is running Many modern botstry to disguise their C&C communication as normal HyperText TransferProtocol (HTTP) traffic. Some malware actively scan or attack othercomputers on the Internet or a local network to which the infectedcomputer is attached. Many bots include modules to scan a network rangeor websites for vulnerable systems, or perform Distributed Denial ofService (DDoS) attacks on other websites as instructed by the C&Cserver.

In view of the foregoing, it is desirable to identify and verifyhigh-risk network accesses.

SUMMARY

Systems and methods are described for verifying a high-risk networkaccess has been initiated by or is otherwise authorized by a human user.According to one embodiment, when an intermediary security deviceidentifies a high-risk network access that is potentially initiated by ahuman user or a piece of software running on the device of the humanuser, a human user test message is sent to the human user to verify thatthe high-risk network access was indeed initiated by the human user.After a response to the human user test message is received by theintermediary security device, it is determined if the response is acorrect response to the human user test. The security device allows thehigh risk network access if the response is correct.

Other features of embodiments of the present invention will be apparentfrom the accompanying drawings and from the detailed description thatfollows.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present invention are illustrated by way of example,and not by way of limitation, in the figures of the accompanyingdrawings and in which like reference numerals refer to similar elementsand in which:

FIG. 1 is a block diagram conceptually illustrating an exemplaryenvironment in which various embodiments of the present invention may beemployed.

FIG. 2 illustrates exemplary functional units of a human userverification system in accordance with an embodiment of the presentinvention.

FIG. 3 illustrates exemplary functional units of a risk managementmodule in accordance with an embodiment of the present invention.

FIG. 4 illustrates exemplary functional units of a human user testengine in accordance with an embodiment of the present invention.

FIG. 5 is a flow diagram illustrating a method for verifying a humanuser in accordance with an embodiment of the present invention.

FIG. 6 is an exemplary computer system in which or with whichembodiments of the present invention may be utilized.

DETAILED DESCRIPTION

Systems and methods are described for verifying a high-risk networkaccess has been initiated by or is otherwise authorized by a human user.According to one embodiment, automated network accesses initiated bymalware can be identified and blocked by an intermediary securitydevice, such as a gateway or a firewall. Responsive to observing ahigh-risk network access, the intermediary security device may send averification message to the user. The intermediary security device mayallow the network access if an appropriate response to the verificationmessage is received from the user. According to one embodiment, theverification message is something other than a simple Yes or No message,which could be easily intercepted and bypassed by malware withoutdisplaying the verification message to the user.

According to one embodiment, when a high-risk network access is observedby an intermediary security device, a human user test message is sent toa potential user. If a correct answer to the human user test is receivedfrom the potential user, the intermediary security device allows theaccess. By sending a human user test message to the user, instead of asimple inquiry message, malware that is controlling the user's computercannot bypass the human user test.

In the following description, numerous specific details are set forth inorder to provide a thorough understanding of embodiments of the presentinvention. It will be apparent, however, to one skilled in the art thatembodiments of the present invention may be practiced without some ofthese specific details. In other instances, well-known structures anddevices are shown in block diagram form.

Embodiments of the present invention include various steps, which willbe described below. The steps may be performed by hardware components ormay be embodied in machine-executable instructions, which may be used tocause a general-purpose or special-purpose processor programmed with theinstructions to perform the steps. Alternatively, the steps may beperformed by a combination of hardware, software, firmware and/or byhuman operators.

Embodiments of the present invention may be provided as a computerprogram product, which may include a machine-readable storage mediumtangibly embodying thereon instructions, which may be used to program acomputer (or other electronic devices) to perform a process. Themachine-readable medium may include, but is not limited to, fixed (hard)drives, magnetic tape, floppy diskettes, optical disks, compact discread-only memories (CD-ROMs), and magneto-optical disks, semiconductormemories, such as ROMs, PROMs, random access memories (RAMs),programmable read-only memories (PROMs), erasable PROMs (EPROMs),electrically erasable PROMs (EEPROMs), flash memory, magnetic or opticalcards, or other type of media/machine-readable medium suitable forstoring electronic instructions (e.g., computer programming code, suchas software or firmware). Moreover, embodiments of the present inventionmay also be downloaded as one or more computer program products, whereinthe program may be transferred from a remote computer to a requestingcomputer by way of data signals embodied in a carrier wave or otherpropagation medium via a communication link (e.g., a modem or networkconnection).

In various embodiments, the article(s) of manufacture (e.g., thecomputer program products) containing the computer programming code maybe used by executing the code directly from the machine-readable storagemedium or by copying the code from the machine-readable storage mediuminto another machine-readable storage medium (e.g., a hard disk, RAM,etc.) or by transmitting the code on a network for remote execution.Various methods described herein may be practiced by combining one ormore machine-readable storage media containing the code according to thepresent invention with appropriate standard computer hardware to executethe code contained therein. An apparatus for practicing variousembodiments of the present invention may involve one or more computers(or one or more processors within a single computer) and storage systemscontaining or having network access to computer program(s) coded inaccordance with various methods described herein, and the method stepsof the invention could be accomplished by modules, routines,subroutines, or subparts of a computer program product.

Notably, while embodiments of the present invention may be describedusing modular programming terminology, the code implementing variousembodiments of the present invention is not so limited. For example, thecode may reflect other programming paradigms and/or styles, including,but not limited to object-oriented programming (OOP), agent orientedprogramming, aspect-oriented programming, attribute-oriented programming(@OP), automatic programming, dataflow programming, declarativeprogramming, functional programming, event-driven programming, featureoriented programming, imperative programming, semantic-orientedprogramming, functional programming, genetic programming, logicprogramming, pattern matching programming and the like.

TERMINOLOGY

Brief definitions of terms used throughout this application are givenbelow.

The phase “security device” generally refers to a hardware device orappliance configured to be coupled to a network and to provide one ormore of data privacy, protection, encryption and security. The networksecurity device can be a device providing one or more of the followingfeatures: network firewalling, VPN, antivirus, intrusion prevention(IPS), content filtering, data leak prevention, antispam, antispyware,logging, reputation-based protections, event correlation, network accesscontrol, vulnerability management, load balancing and trafficshaping—that can be deployed individually as a point solution or invarious combinations as a unified threat management (UTM) solution.Non-limiting examples of network security devices include proxy servers,firewalls, VPN appliances, gateways, UTM appliances and the like.

The phrase “network appliance” generally refers to a specialized ordedicated device for use on a network in virtual or physical form. Somenetwork appliances are implemented as general-purpose computers withappropriate software configured for the particular functions to beprovided by the network appliance; others include custom hardware (e.g.,one or more custom Application Specific Integrated Circuits (ASICs)).Examples of functionality that may be provided by a network applianceinclude, but is not limited to, Layer 2/3 routing, content inspection,content filtering, firewall, traffic shaping, application control, Voiceover Internet Protocol (VoIP) support, Virtual Private Networking (VPN),IP security (IPSec), Secure Sockets Layer (SSL), antivirus, intrusiondetection, intrusion prevention, Web content filtering, spywareprevention and anti-spam. Examples of network appliances include, butare not limited to, network gateways and network security appliances(e.g., FORTIGATE family of network security appliances and FORTICARRIERfamily of consolidated security appliances), messaging securityappliances (e.g., FORTIMAIL family of messaging security appliances),database security and/or compliance appliances (e.g., FORTIDB databasesecurity and compliance appliance), web application firewall appliances(e.g., FORTIWEB family of web application firewall appliances),application acceleration appliances, server load balancing appliances(e.g., FORTIBALANCER family of application delivery controllers),vulnerability management appliances (e.g., FORTISCAN family ofvulnerability management appliances), configuration, provisioning,update and/or management appliances (e.g., FORTIMANAGER family ofmanagement appliances), logging, analyzing and/or reporting appliances(e.g., FORTIANALYZER family of network security reporting appliances),bypass appliances (e.g., FORTIBRIDGE family of bypass appliances),Domain Name Server (DNS) appliances (e.g., FORTIDNS family of DNSappliances), wireless security appliances (e.g., FORTIWIFI family ofwireless security gateways), FORIDDOS, wireless access point appliances(e.g., FORTIAP wireless access points), switches (e.g., FORTISWITCHfamily of switches) and IP-PBX phone system appliances (e.g., FORTIVOICEfamily of IP-PBX phone systems).

The terms “connected” or “coupled” and related terms are used in anoperational sense and are not necessarily limited to a direct connectionor coupling. Thus, for example, two devices may be coupled directly, orvia one or more intermediary media or devices. As another example,devices may be coupled in such a way that information can be passedthere between, while not sharing any physical connection with oneanother. Based on the disclosure provided herein, one of ordinary skillin the art will appreciate a variety of ways in which connection orcoupling exists in accordance with the aforementioned definition.

If the specification states a component or feature “may”, “can”,“could”, or “might” be included or have a characteristic, thatparticular component or feature is not required to be included or havethe characteristic.

FIG. 1 illustrates an exemplary network architecture 100 conceptuallyshowing a network environment in which various embodiments of thepresent invention may be employed. As shown in FIG. 1, networkarchitecture 100 comprises a private network 110 connected to a remoteserver 130 through Internet 120. Private network 110 comprises multiplenetwork appliances 111-114 and a security device 115. The networkappliances may include smart phone 111, PC 112, laptop 113, local server114 and other such computing devices that are operatively coupled toeach other through a Local Area Network (LAN), wherein the LAN is thenoperatively coupled with security device 115 which enable access toremote server 130 through Internet 120.

In the present example, security device 115 separates the externalcomputing environment, represented by Internet 120 and remote server130, from the internal computing environment of private network 110.Security device 115 may intercept or otherwise observe communicationsbetween Internet 120 and the network appliances of private network 110to identify potentially high-risk network accesses. Security device 1150may also scan such communications for malware, viruses and/or otherindicators of the presence of same. It will be appreciated by thoseskilled in the art that a network appliance may be infected with a virusor malware despite the existence of a network security device within theprivate network and/or the presence of antivirus software on the networkappliance.

A virus or malware that has infected PC 112, for example, may try toperform a network access, such as connecting to remote server 130 fromPC 112, without awareness of the user of PC 112. When the access toremote server 130 is detected by security device 115 and is identifiedas a high-risk network access, a human user test message may be sent,displayed or otherwise directed to the user to verify whether thenetwork access at issue was initiated by the user or is otherwiseauthorized by the user. In another embodiment, the human user test maybe sent to an administrator or another user that is responsible forcontrolling the security of the private network. In one embodiment, thehuman user test message is designed so as to be difficult to be answeredby an automatic recognition process. As such, it is not a simple matterfor the potential malware that may have initiated the network access inquestion to bypass the verification test. When a correct response fromthe user is received, security device 115 may decide that the responseis actually sent by the user, rather than by malware that may becontrolling the user's computer, and the high-risk network access may beallowed by security device 115.

Security device 115 may be implemented as a gateway device, such as aFortiGate® device, or other network appliance. The structure andoperation of the security device that performs the human userverification test to verify a high-risk network access is described infurther detail below with reference to FIGS. 2-5.

FIG. 2 illustrates exemplary functional units of a security device 200with a human user test engine 230 in accordance with an embodiment ofthe present invention. Security device 200 shown in FIG. 2 may be any ofa number of existing or future security devices, including, but notlimited to, a router, a switch, a hub, a gateway or a firewall, and mayscan, control or otherwise monitor communications among computingdevices within the private network and/or communications among computingdevices within the private network and those external to the privatenetwork. In the present example, security device 200 includes a networkinterface 210, a risk management module 220, a human user test engine230, a resource whitelist/blacklist 240 and a user communication module250.

Network interface 210 may capture data packets exchanged among thenetwork appliances within the private network and the Internet.According to one embodiment, before the data packets are sent to theirdestinations, they may be buffered and inspected by risk managementmodule 220. If the data packets are allowed by the risk managementmodule 220, they may be routed to their destinations. If the datapackets are not allowed, they may be discarded by network interface 210.In another embodiment, network interface 210 may capture an accessrequest to a network resource, such as an access request to an internalor external web page or file. One or both of the link and networkresource (e.g., the web page or the file) may be inspected by riskmanagement module 220.

In one embodiment, risk management module 220 scans and analyzes thedata packets captured by network interface 210. The scanning may includeone or more of performing one or more packet-based inspectiontechniques, one or more flow-based inspection techniques, or proxy-basedinspection of the data packets. Packet-based inspection may involveexamining the data part (e.g., a payload) and optionally a header of adata packet. For example, the data part and the header may be searchedfor protocol compliance/non-compliance, virus, spam, intrusion, or anyother defined criteria to decide whether the data packet should beallowed to pass, should be routed to a different destination, dropped,or should be observed for collecting statistical information.

Flow-based inspection may involve sampling of multiple data packets fromone session or across multiple sessions. Pattern matching techniques maythen be used to determine the activity being performed by thesession(s). Potential threats may be identified using pattern matchingtechniques.

Proxy-based inspection techniques may involve reconstructing content ofthe data packet in response to passing of the data packet from source todestination to determine any security threats within the data packet. Byusing one or more of these or other inspection techniques, riskmanagement module 220 may detect security threats in the data packets orthe corresponding network resources.

In other embodiments, risk management module 220 may further comprisemultiple scanning engines to perform different inspections. Thesescanning engines may include anti-virus, anti-spam, Distributed Denialof Service (DDoS) prevention, Intrusion Detection System (IDS)/IntrusionPrevention System (IPS) functionality and the like. The results of thesescanning engines may be combined, weighted or otherwise evaluated in theaggregate to determine if a human user test is needed before the networkaccess at issue is allowed.

In some embodiments, the security device (e.g., security device 200), inwhich risk management module 220 is integrated may additionally provideunified threat management (UTM) features/functionality. In otherembodiments, risk management module 220 may be a separate module ordevice from security device 200. For example, a separate DDoS preventiondevice may be used to perform DDoS scanning for security device 200.Security device 200 may also send the intercepted data packets to acloud-based security scanning service for virus inspection and/orcontent filtering. Exemplary functions and structures of risk managementmodule 220 are described in further detail below with reference to FIG.3.

Human user test engine 230 is used for performing human user testing inorder to distinguish if a network access is actually initiated by ahuman user or by an automatic process of malware that may be running ona user's computer. When a high-risk network access is detected by riskmanagement module 220, human user test engine 230 generates a challengequestion to be posed to the human user of the computer. When human usertest engine 230 receives an answer to the challenge question, itcompares the received answer with the correct answer to the challengequestion. Human user test engine 230 then sends the test result to riskmanagement module 220. Exemplary structure and functions of human usertest engine 230 are described in further detail below with reference toFIG. 4.

In the example shown in FIG. 2, security device 200 may compriseresource whitelist/blacklist 240. Resource whitelist/blacklist 240 mayrecord the network resources that are allowed and/or blocked by securitydevice 200. The whitelist/blacklist may include a list of specificInternet Protocol (IP) addresses, network segments, Uniform ResourceLocators (URLs), domain names or other network resources that are to beallowed and/or blocked. Resource whitelist/blacklist 240 may furthercontain other items, such as user ids and/or time periods, so that thewhitelist/blacklist may control the access with more granularity. Theresource whitelist/blacklist 240 may be updated when a resource accessverification/rejection is received by a human user. Resourcewhitelist/blacklist 240 may also be imported or edited by a networkadministrator or a user when security device 200 is setup. It will beappreciated by those of skill in the art that resourcewhitelist/blacklist 240 may be a local list that is used solely bysecurity device 200 itself or a cloud-based whitelist/blacklist that maybe shared by multiple security devices. Resource whitelist/blacklist 240is accessed by risk management module 220 to check if the network accessat issue is to be blocked/allowed without further analysis. If theaccess is already in the whitelist/blacklist, it is allowed/blocked (asappropriate) without further identification or verification.Whitelist/blacklist techniques are well-known in the art; therefore, adetailed description thereof is omitted.

In the embodiment shown in FIG. 2, security device 200 may furthercomprise user communication module 250. User communication module 250may server as an alternative or additional channel for sending a humanuser test message and/or for receiving a response to the test message.Generally, when security device 200 captures a high-risk network access,the source and corresponding application of the access may beidentified. The human user test message may be sent to the source of theaccess as a response message of the application through networkinterface 210. However, in this embodiment, user communication module250 may be used for sending the human user test message. For example,user communication module 250 may be an Email client or atelecommunication module and an Email address or mobile phone number ofa user may be bound with the identified high-risk network access. Insuch a scenario, when the high-risk network access is detected, humanuser test engine 230 may send a test message through Email or ShortMessage Service (SMS) message to the user's Email box or mobile phone.The user may provide the answer to the test message by replying theEmail or SMS message. When user communication module 250 receives thereply, the answer to the test message is sent to human user test engine230 for verification. By sending the human user test message through analternative channel (e.g., an out-of-band channel), it is more difficultfor malware to bypass the human user verification.

In some embodiments, user communication module 250 may also be used asan alternative channel for sending the requested network resource afterthe network access is allowed by risk management module 220.

FIG. 3 illustrates exemplary functional units of a risk managementmodule 300 in accordance with an embodiment of the present invention.Risk management module 300 is configured for scanning data packets toinspect high risk network accesses. Examples of high risk networkaccesses include, but are not limited to, operations that are initiatedby computer virus, network intrusion or malware, such as downloading amalware from a remote server, uploading sensitive information to aremote server, initiating or participating in DDoS attacks on internalor external computers. High risk network accesses may also includeoperations that violate security policies or rules setup by the securitydevice. Therefore, risk management module 300 may comprises multipledetection modules that scan data packets or network resources atmultiple network layers. In this embodiment, risk management module 300comprises antivirus scanning 310, IDS/IPS scanning 320, reputation-basedevaluation 330, cloud-based evaluation 340, policies and rules scanning350, previous request and verification scanning 360 and decision engine390. Antivirus scanning 310 is configured for scanning computer viruscontained in a data packet, a session, a stream or a file. IDS/IPSscanning 320 is configured for detecting a potential intrusion fromother computers. Reputation-based evaluation 330 is configured forscanning software, files, Emails, IP addresses or domain names based onreputations aggregated by multiple users. Cloud-based evaluation 340 isconfigured for scanning software, files, Emails, IP addresses or domainnames by cloud-based scanning service. Policies and rules scanning 350is configured for determining if a network access is allowed based onthe policies or rules that is setup by the network administrator. Thepolicies or rules may regulate a network access based on the incominginterface, the outgoing interface, the source address, the destinationaddress, the schedule, the service of the network access etc. Thepolicies may setup content filters or Email filters to prevent certaincontents from going through the private network by checking keywords orother sensitive information contained in the contents or Emails.Previous request and verification scanning 360 is configured fordetermining if a network access is allowable based on thecharacteristics of previous access requests and the outcome of userverifications. For example, a previous access was allowed by the userbut it is then detected to be a virus. When the same or similar accessis captured again by risk management module 300, it will be determinedas a high risk network access. It is appreciated to a person skilled inthe art that other scanning modules or devices for other scanningfunctions may incorporated into risk management module 300 and any ofthe scanning modules may be integrated into or separated from riskmanagement module 300. It is also possible that these scanning modulesmay be products from different manufacturers.

Decision engine 390 is configured for aggregating the outcomes ofdifferent scanning modules to determine if the captured network accessis a high risk network access for which it would be desirable to obtaina human user verification before it is allowed/blocked. Each of thescanning modules may provide a result after scanning the network access.The result may a Boolean (e.g., true/false) value which represents ifthe scanning is passed. Alternatively, the result may be a percentagevalue or other value that represents the possibility that the networkaccess is a high risk access. Decision engine 390 may combine theresults received from the scanning modules to determine if the networkaccess is a high risk one. It will be appreciated by those of ordinaryskill in the art that there are many algorithms for combining suchresults to determine a final result. For example, each result of thescanning engines may have a weight and a sum of the weighted results maybe calculated. If the sum is over a predetermined threshold, the networkaccess may be determined as a high risk one. It is also possible thatthe network access is determined to be a high risk one when any one ofthe results from the scanning modules is over a threshold.

FIG. 4 illustrates exemplary functional units of a human user testengine in accordance with an embodiment of the present invention. Thehuman user test engine is used for generating a challenge/answer test sothat an action may be identified as initiated by a human user, asopposed to an automatic process that is running on a user's computer. Inthe embodiment shown in FIG. 4, human user test engine 400 compriseschallenge generating module 410, security question/answer database 420,answer verification module 430 and configuration module 440. Challengegenerating module 410 is configured for dynamically generating achallenge question when a high risk network access is detected. Thechallenge question may be a Completely Automated Public Turing test totell Computers and Humans Apart (CAPTCHA). The CAPTCHA may be a pictureor audio clip in which disturbances, such as deformations and/or noise,are incorporated so that the content thereof can be recognized by ahuman user but is difficult to be recognized by an automated process.

In addition to or instead of CAPTCHA, human user test engine 400 mayperform other human user tests. In one embodiment, human user testengine 400 may further comprise security question/answer database 420which keeps challenge questions and answers that are only known by theusers. The challenge question and answer may be a username and passwordpair, for example. The challenge question may be a question that can beanswered with the help of a physical device that the user possesses. Forexample, the challenge question may be what is the number of X line andY column of a password card or what is the number on a smart card or asecure token of the user. Only the user who currently possesses theseauxiliary security devices may check with these auxiliary securitydevices and provide the correct answer to the challenge question.

Human user test engine 400 may further comprise configuration module 440for setting up customized challenge questions and answers by usersthemselves. Users may create question/answer pairs based on theirpersonal information and keep these customized question/answer insecurity question/answer database 420. Challenge generating module 410may select one of these customized questions from securityquestion/answer database 420 when a human user verification is needed.Further, configuration module 440 may also be used by a user to selecthis/her preferred mode or parameters of the human user test.

Answer verification module 430 is used for receiving an answer from thepotential user and comparing the received answer with the correct answerof the challenge question which may be kept at security question/answerdatabase 420. If the received answer is correct, that means theverification is confirmed by the human user and the verification is notbypassed by an automatic process. Then the verification is sent to therisk management module and the network access is allowed by the riskmanagement module if the verification is correct.

FIG. 5 is a flow diagram illustrating a method for verifying a humanuser when a high risk network access is captured in accordance with anembodiment of the present invention. Depending upon the particularimplementation, the various process and decision blocks described belowmay be performed by hardware components, embodied in machine-executableinstructions, which may be used to cause a general-purpose orspecial-purpose processor programmed with the instructions to performthe steps, or the steps may be performed by a combination of hardware,software, firmware and/or involvement of humanparticipation/interaction.

At block 501, a network access is captured by an intermediary networksecurity device that is used for separating an internal network withother computing devices. The network access may be a data packet, anetwork session or an access to a network resource. The access mayoriginate from the internal network and be directed to a remotecomputing device or may originate from a remote computing device and bedirected to the internal network.

At block 502, the security device checks with a whitelist to verify ifthe access is allowed by the administrator or the user of the internalnetwork. If yes, the process goes to block 508 and the network access isallowed without human user verification. Similarly, a blacklist may alsobe used to verify if an access is already denied by the administrator orthe user. If the access is in the blacklist, the process goes to block507 and the access is blocked by the security device without any furtherverification.

If the network access is not in the whitelist and blacklist, at block503, the security device checks if the network access is a high risknetwork access. The network may be sent to multiple scanning engines toverify if it is a high risk access. Each scanning engine checks thenetwork access at different network layers and provides an outcome ofits scanning. The security device then aggregates all the outcomes fromdifferent scanning engines to determine if the network access is a highrisk one.

At block 504, a human user test message is generated and sent to thepotential user when a high risk network access is identified. The humanuser test message may be a visual or audio CAPTCHA message or othersecurity challenge questions that are different to be recognized by anautomatic process. In one embodiment, the human user test message may besent to the source of the network access as a response to the networkaccess. It is also possible that the network access is redirected to aweb page showing the human user test message. In another embodiment, anadministrator or a user may setup an alarm Email address or phone numberfor some high risk accesses. When these high risk accesses are capturedby the security device, an alarm Email or SMS message with the humanuser test may be sent to the user/administrator.

At block 505, a response to the human user test is received by thesecurity device. Since the human user test message is not a simpleverification such as an OK message that can be easily generated and sentby an automatic process running on the user's computer, a correctresponse can be sent only by a human user.

At block 506, the received response is compared with the correct answerof the challenge question. If it is not a correct answer, the processgoes to block 507 and the network access is blocked.

If the response is correct, at block 508, the network access is allowedby the security device. The captured high risk network access may beallowed in different manners based on the type of the access. If thecaptured access is a data packet, it may be routed to the destination bythe security device after a correct confirmation to the human userverification is received from the user. If the original access requestwas redirected to a human user test page for verification at the stageof verification, the security device may then direct the access back tothe resource originally requested. If the requested resource istemporarily stored on the security device when the user was doing theverification, the security device may directly return a copy of therequested resource temporarily stored on the security device. Further,the security device may send a resource originally requested to the uservia an alternative secure channel other than the original network link.For example, the requested resource may be sent to the user by Email orSMS. Optionally, the security device may present the user with analternative URL that point to a copy of the resource that is temporarilystored on the security device.

At block 509, the security device may update its whitelist/blacklistaccording to the received response from the user so that the securitydevice may directly allow/block future access to the same resource.

FIG. 6 is an example of a computer system 600 with which embodiments ofthe present disclosure may be utilized. Computer system 600 mayrepresent or form a part of a security device that performs human userverification when a high risk network access is captured.

Embodiments of the present disclosure include various steps, which willbe described in more detail below. A variety of these steps may beperformed by hardware components or may be tangibly embodied on acomputer-readable storage medium in the form of machine-executableinstructions, which may be used to cause a general-purpose orspecial-purpose processor programmed with instructions to perform thesesteps. Alternatively, the steps may be performed by a combination ofhardware, software, and/or firmware.

As shown, computer system 600 includes a bus 630, a processor 605,communication port 610, a main memory 615, a removable storage media640, a read only memory 620 and a mass storage 625. A person skilled inthe art will appreciate that computer system 600 may include more thanone processor and communication ports.

Examples of processor 605 include, but are not limited to, an Intel®Itanium® or Itanium 2 processor(s), or AMD® Opteron® or Athlon MP®processor(s), Motorola® lines of processors, FortiSOC™ system on a chipprocessors or other future processors. Processor 605 may include variousmodules associated with monitoring unit as described in FIGS. 2-4.Communication port 610 can be any of an RS-232 port for use with a modembased dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabitport using copper or fiber, a serial port, a parallel port, or otherexisting or future ports. Communication port 610 may be chosen dependingon a network, such a Local Area Network (LAN), Wide Area Network (WAN),or any network to which computer system 600 connects.

Memory 615 can be Random Access Memory (RAM), or any other dynamicstorage device commonly known in the art. Read only memory 620 can beany static storage device(s) such as, but not limited to, a ProgrammableRead Only Memory (PROM) chips for storing static information such asstart-up or BIOS instructions for processor 605.

Mass storage 625 may be any current or future mass storage solution,which can be used to store information and/or instructions. Exemplarymass storage solutions include, but are not limited to, ParallelAdvanced Technology Attachment (PATA) or Serial Advanced TechnologyAttachment (SATA) hard disk drives or solid-state drives (internal orexternal, e.g., having Universal Serial Bus (USB) and/or Firewireinterfaces), such as those available from Seagate (e.g., the SeagateBarracuda 7200 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000),one or more optical discs, Redundant Array of Independent Disks (RAID)storage, such as an array of disks (e.g., SATA arrays), available fromvarious vendors including Dot Hill Systems Corp., LaCie, NexsanTechnologies, Inc. and Enhance Technology, Inc.

Bus 630 communicatively couples processor(s) 605 with the other memory,storage and communication blocks. Bus 630 can be, such as a PeripheralComponent Interconnect (PCI)/PCI Extended (PCI-X) bus, Small ComputerSystem Interface (SCSI), USB or the like, for connecting expansioncards, drives and other subsystems as well as other buses, such a frontside bus (FSB), which connects processor 605 to system memory.

Optionally, operator and administrative interfaces, such as a display,keyboard, and a cursor control device, may also be coupled to bus 630 tosupport direct operator interaction with computer system 600. Otheroperator and administrative interfaces can be provided through networkconnections connected through communication port 610.

Removable storage media 640 can be any kind of external hard-drives,floppy drives, IOMEGA® Zip Drives, Compact Disc-Read Only Memory(CD-ROM), Compact Disc-Re-Writable (CD-RW), Digital Video Disk-Read OnlyMemory (DVD-ROM).

Components described above are meant only to exemplify variouspossibilities. In no way should the aforementioned exemplary computersystem limit the scope of the present disclosure.

While embodiments of the invention have been illustrated and described,it will be clear that the invention is not limited to these embodimentsonly. Numerous modifications, changes, variations, substitutions, andequivalents will be apparent to those skilled in the art, withoutdeparting from the spirit and scope of the invention, as described inthe claims.

What is claimed is:
 1. A method comprising: identifying, by anintermediary security device, a high-risk network access initiated by adevice, wherein the high-risk network access poses a risk to the device,a human user of the device or a private network within which the deviceis operating; sending, by the intermediary security device, a human usertest message to the human user of the device to verify that thehigh-risk network access was initiated by or is otherwise authorized bythe human user of the device; receiving, by the intermediary securitydevice, a response to the human user test message; determining, by theintermediary security device, if the response is a correct response tothe human user test message; and allowing, by the intermediary securitydevice, the high-risk network access if the response is correct, whereinsaid allowing the high-risk network access comprises one or more of:redirecting the human user of the device to the resource originallyrequested; directly returning a copy of the requested resourcetemporarily stored on the intermediary security device; presenting thehuman user of the device with an alternative Uniform Resource Locator(URL) that points to a copy of the resource originally requestedtemporarily stored on the intermediary security device; and sending aresource originally requested to the human user of the device via analternative secure channel.
 2. The method of claim 1, wherein saididentifying a high-risk network access is based on one or more of: anoutcome of an antivirus scan of a requested resource performed by theintermediary security device; an outcome of an intrusion detectionsystem/intrusion protection system (IDS/IPS) scan of a request and aresponse performed by the intermediary security device; an outcome of areputation-based evaluation of characteristics of an access performed bythe intermediary security device; an outcome of a cloud-based evaluationof the characteristics of the access performed by a remote computer asrequested by the intermediary security device; an outcome of a scanbased on policies and rules configured on the intermediary securitydevice; and an outcome of a scan based on characteristics of one or moreprevious access requests and user verifications.
 3. The method of claim1, wherein the human user test comprises presenting an CompletelyAutomated Public Turing test to tell Computers and Humans Apart(CAPTCHA) to the human user of the device and verifying a solutionallegedly provided by the human user of the device.
 4. The method ofclaim 1, wherein the human user test comprises presenting a challengequestion and verifying an answer allegedly provided by the human user ofthe device.
 5. The method of claim 4, wherein the challenge question andthe answer comprise a security question and an answer previously set bythe human user of the device.
 6. The method of claim 4, wherein thechallenge question and the answer comprises a user name and passwordpair.
 7. The method of claim 4, wherein the challenge question isanswered with the help of a physical device that the human user of thedevice possesses.
 8. The method of claim 7, wherein the physical devicecomprises one or more of a password card, a smart card and a securetoken.
 9. The method of claim 1, wherein said sending a human user testmessage comprises presenting the human user test message to the humanuser of the device and sending the correct response to the human user ofthe device through an alternative channel.
 10. The method of claim 9,wherein the alternative channel comprises an email address or a mobilephone number of the human user.
 11. The method of claim 1, wherein saidreceiving a response comprises receiving the response of the human userof the device through an alternative channel.
 12. The method of claim 1,further comprising storing a mapping of requested resources andverification results to skip verification steps for subsequent requeststo previously verified resources.
 13. A security device comprising: anon-transitory storage device having tangibly embodied thereininstructions representing a security application; and one or moreprocessors coupled to the non-transitory storage device and operable toexecute the security application to perform steps comprising:identifying, by an intermediary security device, a high-risk networkaccess initiated by a device, wherein the high-risk network access posesa risk to the device, a human user of the device or a private networkwithin which the device is operating; sending, by the intermediarysecurity device, a human user test message to the human user of thedevice to verify that the high-risk network access was initiated by oris otherwise authorized by the human user of the device; receiving, bythe intermediary security device, a response to the human user testmessage; determining, by the intermediary security device, if theresponse is a correct response to the human user test message; andallowing, by the intermediary security device, the high-risk networkaccess if the response is correct, wherein said allowing the high-risknetwork access comprises one or more of: redirecting the human user ofthe device to the resource originally requested; directly returning acopy of the requested resource temporarily stored on the intermediarysecurity device; presenting the human user of the device with analternative Uniform Resource Locator (URL) that points to a copy of theresource originally requested temporarily stored on the intermediarysecurity device; and sending a resource originally requested to thehuman user of the device via an alternative secure channel.
 14. Thesecurity device of claim 13, wherein said identifying a high-risknetwork access is based on one or more of: an outcome of an antivirusscan of a requested resource performed by the intermediary securitydevice; an outcome of an intrusion detection system/intrusion protectionsystem (IDS/IPS) scan of a request and a response performed by theintermediary security device; an outcome of a reputation-basedevaluation of characteristics of an access performed by the intermediarysecurity device; an outcome of a cloud-based evaluation of thecharacteristics of the access performed by a remote computer asrequested by the intermediary security device; an outcome of a scanbased on policies and rules configured on the intermediary securitydevice; and an outcome of a scan based on characteristics of one or moreprevious access requests and user verifications.
 15. The security deviceof claim 13, wherein the human user test comprises presenting aCompletely Automated Public Turing test to tell Computers and HumansApart (CAPTCHA) to the human user of the device and verifying a solutionallegedly provided by the human user of the device.
 16. The securitydevice of claim 13, wherein the human user test comprises presenting achallenge question and verifying an answer allegedly provided by thehuman user of the device.
 17. The security device of claim 16, whereinthe challenge question and the answer comprises a security question andan answer previously set by the human user of the device.
 18. Thesecurity device of claim 16, wherein the challenge question and theanswer comprise a user name and password pair.
 19. The security deviceof claim 16, wherein the challenge question is answered with the help ofa physical device that the human user of the device possesses.
 20. Thesecurity device of claim 19, wherein the physical device comprises oneor more of a password card, a smart card and a secure token.
 21. Thesecurity device of claim 13, wherein sending a human user test messagecomprises presenting the human user test message to the human user andsending the correct response to the human user through an alternativechannel.
 22. The security device of claim 21, wherein the alternativechannel comprises an email address or a mobile phone number of the humanuser.
 23. The security device of claim 13, wherein said receiving aresponse comprises receiving the response of the human user of thedevice through an alternative channel.
 24. The security device of claim13, wherein the steps further comprise storing a mapping of requestedresources and verification results to skip verification steps forsubsequent requests to previously verified resources.