Detection of potential security threats based on categorical patterns
First Claim
1. A method, comprising:
- organizing, by a computer system, raw machine data collected from one or more remote hardware devices, into a set of searchable time-stamped events, wherein the collected raw machine data is produced by one or more components in an information technology environment and reflects activity in the information technology environment, wherein each event in the set of searchable time-stamped events is searchable based on its associated time stamp;
executing, by the computer system, a search to identify a subset of the set of searchable time-stamped events satisfying search criteria that include a time stamp and that identify security-related events derived from raw machine data collected from remote hardware devices, and that fall more than a threshold distance from a defined statistical measure of a security-related data population;
while or after identifying the subset of the set of searchable time-stamped events, applying a schema, by the computer system, to the raw machine data included in each event in the subset of the set of time-stamped searchable events to impose structure on the raw machine data and to extract a set of values that relate to a particular category;
identifying, by the computer system, based on the particular category, one or more patterns among the set of values;
generating a multi-dimensional data object based on the one or more patterns;
determining, by the computer system, that a pattern of the one or more patterns occurs outside of a normal occurrence and indicates that a security threat exists, by analyzing data corresponding to the multi-dimensional data object to determine that the pattern occurs outside of the normal occurrence; and
causing, by the computer system, graphical display of information relating to the one or more patterns that occur outside of the normal occurrence, including display of the multi-dimensional data object.
1 Assignment
0 Petitions
Accused Products
Abstract
A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population'"'"'s center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.
-
Citations
25 Claims
-
1. A method, comprising:
-
organizing, by a computer system, raw machine data collected from one or more remote hardware devices, into a set of searchable time-stamped events, wherein the collected raw machine data is produced by one or more components in an information technology environment and reflects activity in the information technology environment, wherein each event in the set of searchable time-stamped events is searchable based on its associated time stamp; executing, by the computer system, a search to identify a subset of the set of searchable time-stamped events satisfying search criteria that include a time stamp and that identify security-related events derived from raw machine data collected from remote hardware devices, and that fall more than a threshold distance from a defined statistical measure of a security-related data population; while or after identifying the subset of the set of searchable time-stamped events, applying a schema, by the computer system, to the raw machine data included in each event in the subset of the set of time-stamped searchable events to impose structure on the raw machine data and to extract a set of values that relate to a particular category; identifying, by the computer system, based on the particular category, one or more patterns among the set of values; generating a multi-dimensional data object based on the one or more patterns; determining, by the computer system, that a pattern of the one or more patterns occurs outside of a normal occurrence and indicates that a security threat exists, by analyzing data corresponding to the multi-dimensional data object to determine that the pattern occurs outside of the normal occurrence; and causing, by the computer system, graphical display of information relating to the one or more patterns that occur outside of the normal occurrence, including display of the multi-dimensional data object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 23, 24)
-
-
14. One or more non-transitory computer-readable storage media, storing instructions, which when executed by one or more processors cause performance of:
-
organizing raw machine data collected from one or more remote hardware devices, into a set of searchable time-stamped events, wherein the collected raw machine data is produced by one or more components in an information technology environment and reflects activity in the information technology environment, wherein each event in the set of searchable time-stamped events is searchable based on its associated time stamp; executing a computer-implemented search to identify a subset of the set of searchable time-stamped events satisfying search criteria that include a time stamp and that identify security-related events derived from raw machine data collected from remote hardware devices, and that fall more than a threshold distance from a defined statistical measure of a security-related data population; while or after identifying the subset of the set of searchable time-stamped events, applying a schema to the raw machine data included in each event in the subset of the set of searchable time-stamped events to impose structure on the raw machine data and to extract a set of values that relate to a particular category; identifying, based on the particular category, one or more patterns among the set of values; generating a multi-dimensional data object based on the one or more patterns; determining that a pattern of the one or more patterns occurs outside of a normal occurrence and indicates that a security threat exists, by analyzing data corresponding to the multi-dimensional data object to determine that the pattern occurs outside of the normal occurrence; and causing graphical display of information relating to the one or more patterns that occur outside of the normal occurrence, including display of the multi-dimensional data object. - View Dependent Claims (15, 16, 17, 18)
-
-
19. An apparatus, comprising:
-
a raw data processor, implemented at least partially in hardware, configured to organize raw machine data collected from one or more remote hardware devices, into a set of searchable time-stamped events, wherein the collected raw machine data is produced by one or more components in an information technology environment and reflects activity in the information technology environment, wherein each event in the set of searchable time-stamped events is searchable based on its associated time stamp; a subsystem, implemented at least partially in hardware, configured to identify a subset of the set of searchable time-stamped events satisfying search criteria that include a time stamp and that identify security-related events derived from raw machine data collected from remote hardware devices, and that fall more than a threshold distance from a defined statistical measure of a security-related data population; a schema device, implemented at least partially in hardware, configured to, while or after identifying the subset of the set of searchable time-stamped events, apply a schema to the raw machine data included in each event in the subset of the set of searchable time-stamped events to impose structure on the raw machine data and to extract a set of values that relate to a particular category; a categorizer device, implemented at least partially in hardware, configured to identify, based on the particular category, one or more patterns among the set of values; a generator device, implemented at least partially in hardware, configured to generate a multi-dimensional data object based on the one or more patterns; an analyzer device, implemented at least partially in hardware, configured to determine that a pattern of the one or more patterns occurs outside of a normal occurrence and indicates that a security threat exists, by analyzing data corresponding to the multi-dimensional data object to determine that the pattern occurs outside of the normal occurrence; and a display formatter, implemented at least partially in hardware, configured to cause graphical display of information relating to the one or more patterns that occur outside of the normal occurrence including display of the multi-dimensional data object. - View Dependent Claims (20, 21, 22, 25)
-
Specification