×

Insider threat detection under user-resource bi-partite graphs

  • US 10,686,816 B1
  • Filed: 09/28/2017
  • Issued: 06/16/2020
  • Est. Priority Date: 09/28/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting anomalous user-file access patterns in relation to a group of users and files, the group including at least a first user, a second user, and a file, the method being performed by one or more computing devices comprising at least one processor, the method comprising:

  • evaluating a bi-partite mapping comprising nodes and edges connecting the nodes, wherein the nodes represent the users and files of the group and the edges represent network links between the users and files, and wherein the nodes comprise a first node representing the first user, a second node representing the second user, and a third node representing the file;

    computing a first file access frequency probability distribution for the first user over a first temporal period based at least in part on evaluating the bi-partite mapping;

    computing a second file access frequency probability distribution for the first user over a second temporal period, the first and second file access frequency probability distributions each comprising a probability of the first user accessing the file;

    computing a variation between the first file access frequency probability distribution and the second file access frequency probability distribution; and

    identifying anomalous activity in relation to the group based at least in part on the variation exceeding a pre-configured threshold.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×