×

Systems and methods for detecting malicious computing events

  • US 10,320,818 B2
  • Filed: 02/14/2017
  • Issued: 06/11/2019
  • Est. Priority Date: 02/14/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting malicious computing events, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • determining, for each of a plurality of computing events detected within an enterprise, an initial disposition score that indicates a likelihood that the computing event is malicious based on currently-available security information;

    determining an initial classification of each computing event as malicious or non-malicious by comparing the initial disposition score of each computing event with a threshold disposition score that represents a minimum disposition score indicative of malicious computing events;

    determining, for each computing event after the initial disposition score for the computing event has been determined;

    an updated disposition score based on new security information that was not available when the initial disposition score was determined; and

    an updated classification by comparing the updated disposition score with the threshold disposition score;

    calculating a degree to which the threshold disposition score correctly identifies malicious computing events by;

    determining a false positive rate produced by the threshold disposition score based on a percentage of computing events that have an initial classification of malicious and an updated classification of non-malicious; and

    determining a false negative rate produced by the threshold disposition score based on a percentage of computing events that have an initial classification of non-malicious and an updated classification of malicious; and

    protecting the enterprise from security threats by;

    receiving, from the enterprise, a desired ratio of false positives to false negatives detected within the enterprise;

    determining, based on a retrospective analysis of the initial disposition scores and the updated disposition scores of the plurality of computing events, an optimal threshold disposition score that produces the desired ratio of false positives to false negatives; and

    implementing the optimal threshold disposition score within the enterprise.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×