×

Method and system for generating a kill chain for monitoring computer network security

  • US 10,154,047 B2
  • Filed: 10/30/2015
  • Issued: 12/11/2018
  • Est. Priority Date: 08/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving event data associated with network activities, wherein the event data comprises machine data;

    evaluating event data based on a machine learning model utilizing historical data pertaining to evaluations of past events;

    identifying at least one anomaly automatically determined from machine learning on the event data;

    identifying at least one threat automatically determined from machine learning on the event data and the identified at least one anomaly, wherein a threat is associated with each identified anomaly that, individually or in combination, triggered the determination of the threat; and

    upon selection by a user, via a graphical user interface, of an identified threat, generating a kill chain view associated with the threat, wherein the kill chain view includes a plurality of stages, and, for each stage, the kill chain view lists each type of identified anomaly associated with each stage of the kill chain and the number of anomalies of each type, wherein the listing of comprises a link for each anomaly type;

    upon selection by the user, via a graphical user interface, of the link for a selected anomaly type, generating a listing of all anomalies of the selected type, including a link for each anomaly;

    upon selection by the user of the link for a selected anomaly, generating a prompt to tag the anomaly for subsequent tracking; and

    upon receiving input from the user regarding the identified threat based upon the anomalies in the generated kill chain view, providing feedback for training the machine learning model.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×