×

Correlating threat information across sources of distributed computing systems

  • US 10,333,962 B1
  • Filed: 03/30/2016
  • Issued: 06/25/2019
  • Est. Priority Date: 03/30/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • obtaining access to a set of logs generated by a set of computing resources associated with a customer, the set of computing resources maintained by a computing resource service provider and connected by a network operated by the computing resource service provider;

    generating threat information by at least correlating at least a first portion of the set of logs and a second portion of the set of logs based at least in part on a first computing resource of the set of computing resources responsible for generating the first portion of the set of logs and a second computing resource of the set of computing resources responsible for generating the second portion of the set of logs;

    correlating the generated threat information with at least some other threat information obtained from an additional service of the computing resource service provider to generate correlated threat information, the other threat information comprises a different set of logs based at least in part on the additional service responsible for generating the different set of logs;

    providing the correlated threat information to the customer andwherein, generating the threat information further comprises anonymizing the first portion of the set of logs and the second portion of the set of logs by at least removing operational information referencing the customer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×