throbber
Case 3:17-cv-05659-WHA Document 96-13 Filed 06/07/18 Page 1 of 5
`Case 3:17-cv-05659-WHA Document 96-13 Filed 06/07/18 Page 1of5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`EXHIBIT 9
`EXHIBIT 9
`
`

`

`Case 3:17-cv-05659-WHA Document 96-13 Filed 06/07/18 Page 2 of 5
`
`Sky ATP
`
`Sky Advanced Threat Prevention Administration
`Guide
`
`Modified: 2017-12-21
`
`Copyright © 2018, Juniper Networks, Inc.
`
`JNPR-FNJN_29006_00162061
`
`

`

`Case 3:17-cv-05659-WHA Document 96-13 Filed 06/07/18 Page 3 of 5
`
`Chapter 1: Sky Advanced Threat Prevention Overview
`
`Figure 3: Inspecting Inbound Files for Malware
`
`Step
`
`Description
`
`1
`
`2
`
`3
`
`4
`
`5
`
`A client system behind an SRX Series devices requests a file download from the Internet. The SRX Series device
`forwards that request to the appropriate server.
`
`The SRX Series device receives the downloaded file and checks its security profile to see if any additional action
`must be performed.
`
`The downloaded file type is on the list of files that must be inspected and is sent to the cloud for analysis.
`
`Sky ATP has inspected this file before and has the analysis stored in cache. In this example, the file is not malware
`and the verdict is sent back to the SRX Series device.
`
`Based on user-defined policies and because this file is not malware, the SRX Series device sends the file to the
`client.
`
`For outbound traffic, the SRX Series device monitors traffic that matches C&C feeds it
`receives, blocks these C&C requests, and reports them to Sky ATP. A list of infected hosts
`is available so that the SRX Series device can block inbound and outbound traffic.
`
`Sky ATP Use Cases
`
`Sky ATP can be used anywhere in an SRX Series deployment. See Figure 4 on page 8.
`
`Copyright © 2018, Juniper Networks, Inc.
`
`7
`
`JNPR-FNJN_29006_00162083
`
`

`

`Case 3:17-cv-05659-WHA Document 96-13 Filed 06/07/18 Page 4 of 5
`
`Chapter 1: Sky Advanced Threat Prevention Overview
`
`Figure 5: Example Sky ATP Pipeline Approach for Analyzing Malware
`
`Cache Lookup
`
`Antivirus Scan
`
`Each analysis technique creates a verdict number, which is combined to create a final
`verdict number between 1 and 10. A verdict number is a score or threat level. The higher
`the number, the higher the malware threat. The SRX Series device compares this verdict
`number to the policy settings and either permits or denies the session. If the session is
`denied, a reset packet is sent to the client and the packets are dropped from the server.
`
`When a file is analyzed, a file hash is generated, and the results of the analysis are stored
`in a database. When a file is uploaded to the Sky ATP cloud, the first step is to check
`whether this file has been looked at before. If it has, the stored verdict is returned to the
`SRX Series device and there is no need to re-analyze the file. In addition to files scanned
`by Sky ATP, information about common malware files is also stored to provide faster
`response.
`
`Cache lookup is performed in real time. All other techniques are done offline. This means
`that if the cache lookup does not return a verdict, the file is sent to the client system while
`the Sky ATP cloud continues to examine the file using the remaining pipeline techniques.
`If a later analysis returns a malware verdict, then the file and host are flagged.
`
`The advantage of antivirus software is its protection against a large number of potential
`threats, such as viruses, trojans, worms, spyware, and rootkits. The disadvantage of
`antivirus software is that it is always behind the malware. The virus comes first and the
`patch to the virus comes second. Antivirus is better at defending familiar threats and
`known malware than zero-day threats.
`
`Sky ATP utilizes multiple antivirus software packages, not just one, to analyze a file. The
`results are then fed into the machine learning algorithm to overcome false positives and
`false negatives.
`
`Copyright © 2018, Juniper Networks, Inc.
`
`9
`
`JNPR-FNJN_29006_00162085
`
`

`

`Case 3:17-cv-05659-WHA Document 96-13 Filed 06/07/18 Page 5 of 5
`
`Chapter 1: Sky Advanced Threat Prevention Overview
`
`samples and thousands of goodware samples. It learns what malware looks like, and is
`regularly re-programmed to get smarter as threats evolve.
`
`Threat Levels
`
`Sky ATP assigns a number between 0-10 to indicate the threat level of files scanned for
`malware and the threat level for infected hosts. See Table 4 on page 11.
`
`Table 4: Threat Level Definitions
`
`Threat Level
`
`Definition
`
`0
`
`1 - 3
`
`4 - 6
`
`7 -10
`
`Clean; no action is required.
`
`Low threat level.
`
`Medium threat level.
`
`High threat level.
`
`For more information on threat levels, see the Sky ATP Web UI online help.
`
`Juniper Networks Sky Advanced Threat Prevention on page 3
`
`Dashboard Overview on page 36
`
`• •
`
`Related
`Documentation
`
`• Sky Advanced Threat Prevention License Types on page 11
`
`Sky Advanced Threat Prevention License Types
`
`Sky ATP has three service levels:
`
`• Free—The free model solution is available on all supported SRX Series devices (see
`the Supported Platforms Guide) and for customers that have a valid support contract,
`but only scans executable file types (see Sky Advanced Threat Prevention Profile
`Overview). Based on this result, the SRX Series device can allow the traffic or perform
`inline blocking.
`
`• Basic—Includes executable file scanning and adds filtering using the following threat
`feed types: Command and Control, GeoIP, Custom Filtering, and Threat Intel feeds.
`Threat Intel feeds use APIs that allow you to injects feeds into Sky ATP.
`
`• Premium—Includes all features provided in the Free and Basic licenses, but provides
`deeper analysis. All supported file types are scanned and examined using several
`analysis techniques to give better coverage. Full reporting provides details about the
`threats found on your network.
`
`NOTE: You do not need to download any additional software to run Sky ATP.
`
`Table 5 on page 12 shows a comparison between the free model and the premium model.
`
`Copyright © 2018, Juniper Networks, Inc.
`
`11
`
`JNPR-FNJN_29006_00162087
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket