×

Methods and systems for analyzing cybersecurity threats

  • US 10,685,293 B1
  • Filed: 01/20/2017
  • Issued: 06/16/2020
  • Est. Priority Date: 01/20/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method of analyzing cybersecurity threats comprising:

  • performing processing associated with receiving, with an analysis module of a processor, log data from a network node;

    performing processing associated with identifying, with the analysis module, a statistical outlier within the log data using Tailjumps, the identifying comprising;

    transforming the log data into community data indicative of a network structure, identifying a plurality of communications between nodes in the community data, and identifying the statistical outlier within the plurality of communications;

    generating a behavioral graph model using the log data, determining a best fit line for a characteristic of the behavioral graph model, and identifying a data point at or beyond a predetermined distance from the best fit line as the statistical outlier;

    oranalyzing text data in the log data using language processing algorithm to identify the statistical outlier;

    ora combination thereof; and

    performing processing associated with determining, with the analysis module, that the statistical outlier represents a cybersecurity threat by applying a Janus machine learning algorithm to provide a predication about the novelty of the statistical outlier,wherein the Janus machine learning algorithm categorizes the statistical outlier into classes, wherein the classes are separated by a security threat decision boundary, and wherein the classes comprise;

    a forward class that is a most probable security threat class, a do not send class that is a least probable security threat class, and an unknown class for entities that are on the security threat decision boundary;

    performing processing associated with forwarding statistical outliers categorized as unknown for additional analysis;

    performing processing associated with updating the security threat decision boundary based on analysist input; and

    performing processing associated with repeating the categorizing for the statistical outliers categorized as unknown with an updated security threat decision boundary.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×