Space and time efficient threat detection
First Claim
1. A method for performing threat detection, comprising:
- receiving, at a server, aggregated event data from a client system, the aggregated event data comprising a plurality of event data structures, each event data structure of the plurality of event data structures comprising event data received during a different level of time-based granularity, the aggregated event data including an obfuscated representation of entity identifiers associated with each of a plurality of different events occurring on the client system during each different level of time-based granularity and excluding the entity identifiers themselves;
in response to receiving the aggregated event data, determining, at the server, a subset of the aggregated event data in an event data structure of the plurality of event data structures having a lowest level of granularity comprising a plurality of event data that is associated with at least one cyber-threat; and
reporting a message, by the server, indicating the presence of the at least one cyber-threat for each of the plurality of event data of the subset to the client system.
2 Assignments
0 Petitions
Accused Products
Abstract
A security monitoring system operated by a downstream client continually collects event information indicating events that have occurred within the computing environment of the downstream client. The monitoring system, using software provided by a threat analytics system, aggregates the event information into a secure and space efficient data structure. The monitoring system transmits the data structures storing event information to the threat analytics system for further processing. The threat analytics system also receives threat indicators from intelligence feed data sources. The threat analytics system compares the event information received from each security monitoring system against the threat indicators collected from the intelligence feed data sources to identify red flag events. The threat analytics system processes the event information to synthesize all information related to the red flag event and reports the red flag event to the downstream client.
-
Citations
20 Claims
-
1. A method for performing threat detection, comprising:
-
receiving, at a server, aggregated event data from a client system, the aggregated event data comprising a plurality of event data structures, each event data structure of the plurality of event data structures comprising event data received during a different level of time-based granularity, the aggregated event data including an obfuscated representation of entity identifiers associated with each of a plurality of different events occurring on the client system during each different level of time-based granularity and excluding the entity identifiers themselves; in response to receiving the aggregated event data, determining, at the server, a subset of the aggregated event data in an event data structure of the plurality of event data structures having a lowest level of granularity comprising a plurality of event data that is associated with at least one cyber-threat; and reporting a message, by the server, indicating the presence of the at least one cyber-threat for each of the plurality of event data of the subset to the client system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium storing instructions that, when executed by a processor of a server, cause the processor to:
-
receive, at a server, aggregated event data from a client system, the aggregated event data comprising a plurality of event data structures, each event data structure of the plurality of event data structures comprising event data received during a different level of time-based granularity, the aggregated event data including an obfuscated representation of entity identifiers associated with each of a plurality of different events occurring on the client system during each different level of time-based granularity and excluding the entity identifiers themselves; in response to receiving the aggregated event data, determine, at the server, a subset of the aggregated event data in an event data structure of the plurality of event data structures having a lowest level of granularity comprising a plurality of event data that is associated with at least one cyber-threat; and report a message, by the server, indicating the presence of the at least one cyber-threat for each of the plurality of event data of the subset to the client system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification