SPACE AND TIME EFFICIENT THREAT DETECTION
First Claim
1. A method for performing threat detection, comprising:
- receiving event data from a client system, the event data including an obfuscated representation of entity identifiers associated with different events occurring on the client system;
determining that the event data is associated with at least one cyber-threat; and
reporting the presence of the at least one cyber-threat to the client system.
2 Assignments
0 Petitions
Accused Products
Abstract
A security monitoring system operated by a downstream client continually collects event information indicating events that have occurred within the computing environment of the downstream client. The monitoring system, using software provided by a threat analytics system, aggregates the event information into a secure and space efficient data structure. The monitoring system transmits the data structures storing event information to the threat analytics system for further processing. The threat analytics system also receives threat indicators from intelligence feed data sources. The threat analytics system compares the event information received from each security monitoring system against the threat indicators collected from the intelligence feed data sources to identify red flag events. The threat analytics system processes the event information to synthesize all information related to the red flag event and reports the red flag event to the downstream client.
-
Citations
25 Claims
-
1. A method for performing threat detection, comprising:
-
receiving event data from a client system, the event data including an obfuscated representation of entity identifiers associated with different events occurring on the client system; determining that the event data is associated with at least one cyber-threat; and reporting the presence of the at least one cyber-threat to the client system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 20, 21)
-
-
19. A method for performing forensics operation on event data, the method comprising:
-
receiving a forensics query that specifies one or more search parameters for performing a forensics operation on event data, the event data including an obfuscated representation of entity identifiers associated with different events occurring on a client system; identifying one or more cyber-threats that satisfy at least one of the search parameters, each threat indicator associated with at least one potential cyber-threat; and performing a real-time forensics operations on the event data to determine whether the event data is indicative of at least one of the cyber-threats.
-
-
22. A computer readable medium storing instructions that, when executed by a processor, cause the processor to:
-
receive event data from a client system, the event data including an obfuscated representation of entity identifiers associated with different events occurring on the client system; determine that the event data is associated with at least one cyber-threat; and report the presence of the at least one cyber-threat to the client system. - View Dependent Claims (23, 24, 25)
-
Specification