×

Detecting anomalous behavior via user authentication graphs

  • US 10,015,175 B2
  • Filed: 04/15/2016
  • Issued: 07/03/2018
  • Est. Priority Date: 04/16/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • determining, by a computing system, a set of reachable vertices and a respective distance to each of the reachable vertices from a starting vertex within a graph, wherein the set of reachable vertices represent other computers that a computer, represented by the starting vertex, has authenticated to during a period of time on behalf of its user;

    outputting the set of reachable vertices and the respective distance to each of the vertices, by the computing system, as a Person'"'"'s Authentication Subgraph (PAS) for the starting vertex of the graph;

    comparing, by the computing system, a plurality of PASs for a computer over a series of sliding time windows; and

    determining, by the computing system, based on a statistical comparison of the PASs, whether a deviation between an estimated statistical model and observed PAS attributes at a given time window exceeds an expected deviation for a user, whereina level of deviation indicating potential compromise takes into account variability of a history of behavioral observations in order to report statistically significant deviations above normal variation by an externally provided threshold to allow users to receive alerts at a prescribed average reporting rate.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×