DEVIATION DETECTION OF USAGE PATTERNS OF COMPUTER RESOURCES
First Claim
1. A method for monitoring activity of users accessing computer resources, comprising:
- collecting a first set of log records documenting user actions in accessing the computer resources during a first time interval;
based on the first set of log records, creating one or more models of user behavior in accessing the computer resources;
collecting a second set of log records documenting user actions in accessing the computer resources during a second time interval;
based on the one or more models of user behavior, analyzing the second set of log records to identify, for each user, changes in behavior exhibited during the second time interval, relative to the behavior of each respective user exhibited during the first time interval;
based on the identified changes in behavior, identifying a predefined suspicious activity engaged in by at least one user in accessing the computer resources during the second time interval; and
generating an alert message identifying the suspicious activity engaged in by the at least one user in accessing the computer resources.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide a method for detecting changes in behavior of authorized users of computer resources and reporting the detected changes to the relevant individuals. The method includes evaluating actions performed by each user against user behavioral models and business rules. As a result of the analysis, a subset of users may be identified and reported as having unusual or suspicious behavior. In response, the management may provide feedback indicating that the user behavior is due to the normal expected business needs or that the behavior warrants further review. The management feedback is available for use by machine learning algorithms to improve the analysis of user actions over time. Consequently, investigation of user actions regarding computer resources is facilitated and data loss is prevented more efficiently relative to the prior art approaches with only minimal disruption to the ongoing business processes.
315 Citations
24 Claims
-
1. A method for monitoring activity of users accessing computer resources, comprising:
-
collecting a first set of log records documenting user actions in accessing the computer resources during a first time interval; based on the first set of log records, creating one or more models of user behavior in accessing the computer resources; collecting a second set of log records documenting user actions in accessing the computer resources during a second time interval; based on the one or more models of user behavior, analyzing the second set of log records to identify, for each user, changes in behavior exhibited during the second time interval, relative to the behavior of each respective user exhibited during the first time interval; based on the identified changes in behavior, identifying a predefined suspicious activity engaged in by at least one user in accessing the computer resources during the second time interval; and generating an alert message identifying the suspicious activity engaged in by the at least one user in accessing the computer resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable storage medium storing a computer program which, when executed by a processor, performs operations, the operations comprising:
-
collecting a first set of log records documenting user actions in accessing the computer resources during a first time interval; based on the first set of log records, creating one or more models of user behavior in accessing the computer resources; collecting a second set of log records documenting user actions in accessing the computer resources during a second time interval; based on the identified changes in behavior, identifying a predefined suspicious activity engaged in by at least one user in accessing the computer resources during the second time interval; based on the identified changes in behavior, identifying a suspicious activity engaged in by at least one user in accessing the computer resources during the second time interval; and generating an alert message identifying the suspicious activity engaged in by the at least one user in accessing the computer resources. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
a processor; and a memory containing a program, which when executed by the processor is configured to monitor the activity of users in accessing computer resources by performing the steps of; collecting a first set of log records documenting user actions in accessing the computer resources during a first time interval, based on the first set of log records, creating one or more models of user behavior in accessing the computer resources, collecting a second set of log records documenting user actions in accessing the computer resources during a second time interval, based on the one or more models of user behavior, analyzing the second set of log records to identify, for each user, changes in behavior exhibited during the second time interval, relative to the behavior of each respective user exhibited during the first time interval, based on the identified changes in behavior, identifying a predefined suspicious activity engaged in by at least one user in accessing the computer resources during the second time interval, and documenting the suspicious activity engaged in by the at least one user in accessing the computer resources. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification