×

Modeling behavior in a network using event logs

  • US 10,375,095 B1
  • Filed: 11/18/2016
  • Issued: 08/06/2019
  • Est. Priority Date: 11/20/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • independently considering a time series of events generated by a plurality of user credentials, by a monitoring computing system, the time series of events comprising log events for each user credential, the log events comprising a client computing system, a server computing system, and an event type;

    fitting Bayesian models to the time series of events, by the monitoring computing system, for each of the plurality of user credentials;

    determining, by the monitoring computing system, p-values for the client computing system, the server computing system, and the event type for each of the plurality of user credentials based on the respective fitted Bayesian model;

    combining the determined p-values, by the monitoring computing system, to obtain a full posterior predictive p-value or an overall p-value;

    checking, by the computing system, whether an event generated for a given user credential is anomalous with respect to the respective full posterior predictive p-value or overall p-value for that given user credential; and

    when the event for the given user credential is anomalous based on the full posterior predictive p-value or overall p-value, flagging the given user credential as associated with anomalous behavior, by the monitoring computing system.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×