EXTERNAL MALWARE DATA ITEM CLUSTERING AND ANALYSIS
First Claim
1. A computer system comprising:
- one or more computer readable storage devices configured to store;
a plurality of computer executable instructions;
a data clustering strategy; and
a plurality of data items including at least;
external domain data items; and
network-related data items associated with captured communications between an internal network and an external network, the network-related data items including at least one of;
external Internet Protocol addresses, external domains, external computerized devices, internal Internet Protocol addresses, internal computerized devices, users of particular computerized devices, or organizational positions associated with users of particular computerized devices; and
one or more hardware computer processors in communication with the one or more computer readable storage devices and configured to execute the plurality of computer executable instructions in order to cause the computer system to;
scan one or more threat lists stored external to the internal network, each of the threat lists including information related to previously identified malware threats and information related to those previously identified malware threats including external domain data items;
identify one or more external domain data items included in the one or more threat lists, each of the one or more external domain data items being associated with a malicious domain;
designate each of the identified one or more external domain data items as a seed; and
for each of the designated seeds, generate a data item cluster based on the data clustering strategy by at least;
adding the seed to the data item cluster;
identifying one or more of the network-related data items associated with the seed;
adding, to the data item cluster, the one or more identified network-related data items;
identifying an additional one or more data items, including external domain data items and/or network-related data items, associated with any data items of the data item cluster; and
adding, to the data item cluster, the additional one or more data items.
8 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, and provide results of the automated analysis in an optimized way to an analyst. The automated analysis of the clustered data structures (also referred to herein as data clusters) may include an automated application of various criteria or rules so as to generate a compact, human-readable analysis of the data clusters. The human-readable analyses (also referred to herein as “summaries” or “conclusions”) of the data clusters may be organized into an interactive user interface so as to enable an analyst to quickly navigate among information associated with various data clusters and efficiently evaluate those data clusters in the context of, for example, a fraud investigation. Embodiments of the present disclosure also relate to automated scoring of the clustered data structures.
-
Citations
20 Claims
-
1. A computer system comprising:
-
one or more computer readable storage devices configured to store; a plurality of computer executable instructions; a data clustering strategy; and a plurality of data items including at least; external domain data items; and network-related data items associated with captured communications between an internal network and an external network, the network-related data items including at least one of;
external Internet Protocol addresses, external domains, external computerized devices, internal Internet Protocol addresses, internal computerized devices, users of particular computerized devices, or organizational positions associated with users of particular computerized devices; andone or more hardware computer processors in communication with the one or more computer readable storage devices and configured to execute the plurality of computer executable instructions in order to cause the computer system to; scan one or more threat lists stored external to the internal network, each of the threat lists including information related to previously identified malware threats and information related to those previously identified malware threats including external domain data items; identify one or more external domain data items included in the one or more threat lists, each of the one or more external domain data items being associated with a malicious domain; designate each of the identified one or more external domain data items as a seed; and for each of the designated seeds, generate a data item cluster based on the data clustering strategy by at least; adding the seed to the data item cluster; identifying one or more of the network-related data items associated with the seed; adding, to the data item cluster, the one or more identified network-related data items; identifying an additional one or more data items, including external domain data items and/or network-related data items, associated with any data items of the data item cluster; and adding, to the data item cluster, the additional one or more data items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification