×

Using network locations obtained from multiple threat lists to evaluate network data or machine data

  • US 10,367,827 B2
  • Filed: 12/19/2013
  • Issued: 07/30/2019
  • Est. Priority Date: 12/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for identifying notable events in a set of events to facilitate identification of computer or network security-related events, the set of events including a plurality of subsets of events, an event in the set of events comprising a portion of raw machine data representing activity involving at least one host in a plurality of hosts distributed across an enterprise'"'"'s network, the method comprising:

  • accessing a plurality of threat location lists from third-party sources;

    receiving, from a user;

    (i) criteria for at least one correlation search for notable events that occur on the enterprise'"'"'s network, and(ii) designation of a set of threat location lists from the accessed plurality of threat location lists;

    generating an aggregated threat location list by merging and deduplicating the designated set of threat location lists from the plurality of threat location lists, the aggregated threat list stored in an index;

    in response to receiving the criteria for the at least one correlation search, for a subset of events in the set of events;

    extracting a network location and values for one or more fields identified in the criteria from at least one event in the subset of events, at analysis time, by using an extraction rule or regular expression that is associated with an identified field and with the subset of events, the extraction rule or regular expression defining how to extract the network location from the portion of raw machine data, anddetermining notable events based on the criteria by determining that;

    (i) the extracted network location for the at least one event in the subset of events matches a threat location in the aggregated threat location list stored in the index, and(ii) the extracted values for the one or more identified fields for the at least one event in the subset of events match user-specified values in the criteria;

    generating, for each of a plurality of threat locations from the aggregated threat location list, a count of events from the identified notable events that include a network location matching the threat location; and

    causing display of a graphical user interface (GUI) including at least one interface element indicating an amount of activity associated with threat locations from the aggregated threat location list, the amount of activity based on the generated count of events, from the determined notable events, for each of the plurality of threat locations from the aggregated threat location list, the amount of activity associated with threat locations used to facilitate operation performance or security associated with at least one component in an IT environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×