×

Event correlation across heterogeneous operations

  • US 10,148,685 B2
  • Filed: 07/17/2017
  • Issued: 12/04/2018
  • Est. Priority Date: 04/09/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for determining a network security threat response, the method being executed by one or more processors and comprising:

  • receiving a data structure that represents communication events between computing devices of two or more network domains, including at least an originating computing device and a destination computing device, wherein the originating computing device and the destination computing device exist on different network domains;

    analyzing the data structure and determining a plurality of threat scenarios, each threat scenario being based on a respective chain of communication events that is represented in the data structure and that indicates a potential attack, the chain of communication events including a sequence of communication events between the computing devices of the two or more network domains proceeding from the originating computing device to the destination computing device;

    receiving, for the plurality of threat scenarios and from a threat intelligence data source, prior attack pattern data that is associated with prior computing device communications that occurred during one or more prior attacks; and

    based on the prior attack pattern data, for at least one of the plurality of threat scenarios;

    determining one or more courses of action for responding to the threat scenario; and

    providing information associated with the one or more courses of action for responding to the threat scenario, the information being relevant to at least one of the computing devices of the two or more network domains.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×