×

System for identifying anomalies in an information system

  • US 10,339,309 B1
  • Filed: 06/09/2017
  • Issued: 07/02/2019
  • Est. Priority Date: 06/09/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computerized system for identifying anomalies in a computerized information system, comprising:

  • a computer processor;

    a memory;

    a network communication device; and

    an information security analysis module stored in the memory, executable by the processor, and configured for;

    collecting information regarding a hierarchy of capabilities of the information system;

    storing, in a graph database, a plurality of capability nodes, each capability node corresponding to a capability category of the hierarchy of capabilities;

    collecting information regarding a hierarchy of resources of the information system;

    storing, in the graph database, a plurality of resource nodes, each resource node corresponding to a resource category of the hierarchy of resources;

    collecting information regarding a plurality of capability instances of the information system;

    storing, in the graph database, a plurality of capability instance nodes, each capability instance node corresponding to a capability instance of the plurality of capability instances of the information system;

    collecting information regarding a plurality of resource instances of the information system;

    storing, in the graph database, a plurality of resource instance nodes, each resource instance node corresponding to a resource instance of the plurality of resource instances of the information system;

    collecting information regarding relationships among the hierarchy of capabilities, the hierarchy of resources, the plurality of capability instances, and the plurality of resource instances;

    defining, in the graph database, edges among the plurality of capability nodes, the plurality of resource nodes, the plurality of capability instance nodes, and the plurality of resource instance nodes, the edges corresponding to the relationships among the hierarchy of capabilities, the hierarchy of resources, the plurality of capability instances, and the plurality of resource instances;

    collecting event and/or state data for the information system, wherein the event and/or state data includes parameters of an event and/or state;

    comparing the parameters of the event and/or state to the graph database;

    based on comparing the parameters of the event and/or state to the graph database, determining that the event and/or state is anomalous; and

    in response to determining that the event and/or state is anomalous, taking an information security action.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×