×

Graph-based user tracking and threat detection

  • US 10,419,469 B1
  • Filed: 09/18/2018
  • Issued: 09/17/2019
  • Est. Priority Date: 11/27/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a processor configured to;

    receive log data associated with at least one user session in a network environment associated with an original user, wherein the received log data comprises information associated with the original user provided by a plurality of machines;

    generate a logical graph using at least a portion of the received log data, wherein the generated logical graph comprises a user login graph that models machines with which the original user interacts, and wherein the generated logical graph comprises;

    (1) a first node corresponding to the original user, (2) at least a second node, and (3) a set of edges, wherein the set of edges includes at least one edge connecting the first node to the second node;

    determine, using the generated logical graph, that a change has been made to the set of edges, wherein the change made to the set of edges is at least one of;

    (1) an addition of an edge to the set, and (2) a modification to an edge that is already present in the set; and

    in response to determining that the change has been made to the set of edges, automatically generating an alert that an anomaly in the network environment associated with the change in the set of edges has occurred; and

    a memory coupled to the processor and configured to provide the processor with instructions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×