×

Discovery of groupings of security alert types and corresponding complex multipart attacks, from analysis of massive security telemetry

  • US 10,178,109 B1
  • Filed: 03/31/2016
  • Issued: 01/08/2019
  • Est. Priority Date: 03/31/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for discovering groupings of security alerts identifying corresponding complex, multipart attacks, from analysis of security telemetry received from multiple endpoint computing devices, the method comprising:

  • receiving collected security telemetry, by a centralized computing system, from a plurality of endpoint computing devices on which attacks occur, the collected security telemetry including a plurality of samples collected on the plurality of endpoint computing devices responsive to detecting by the plurality of endpoint computing devices, one or more attacks from at least one invoking source computing device on which the one or more attacks originate, wherein the plurality of endpoint computing devices and the at least one invoking source computing device are different computing devices;

    identifying alerts in a given sample of the received security telemetry, by the centralized computing system, each specific identified alert having been generated by a triggering signature on a specific one of the plurality of endpoint computing devices, each specific alert containing at least an identifier of the triggering signature, an identifier of a corresponding invoking source computing device, and an identifier of the specific one of the plurality of endpoint computing devices on which the specific identified alert was generated;

    filtering invoking source computing devices of the identified alerts, by the centralized computing system, into a subset of alerts with filtered invoking source computing devices determined to meet at least one condition;

    discovering tuples identifying multipart attacks, by the centralized computing system, by examining the subset of alerts with filtered invoking source computing devices and identifying groupings of multiple alerts generated by at least one common filtered invoking source computing device, wherein a tuple comprises an identified grouping of alert types representative of diverse suspicious operations associated with a specific multipart attack; and

    utilizing the tuples for security analytics comprising one or more of;

    identifying targeted attacks against organizations associated with the plurality of endpoint computing devices;

    detecting multiple variations of specific multipart attacks; and

    identifying one or more attack launching infrastructures associated with the tuples.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×