CONNECTED SECURITY SYSTEM
First Claim
1. A system comprising:
- an event management module that;
receives, for a network of an organization, network domain activity that includes first domain activity data from a first network domain and second domain activity from a second network domain; and
identifies malicious activity present on at least one of the first network domain or the second network domain based on the received network domain activity;
a threat intelligence module that;
receives, from the even management module, data identifying the malicious activity in one or more first data constructs of a predefined data structure;
obtain, from one or more third party sources, additional data related to the identified malicious activity; and
generates, using the data identifying the malicious activity and the additional data, one or more second data constructs of the predefined data structure that include enriched data regarding the malicious activity, the enriched data including (i) data describing a campaign in which at least a portion of the malicious activity is involved and (ii) one or more courses of action for mitigating the malicious activity; and
a course of action module that;
receives the one or more second data constructs from the threat intelligence module and implements a given course of action of the one or more course of action.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to security events, and for implementing courses of action to protect assets in response to the security events. An event management module identifies malicious activity present on a first network domain and/or a second network domain based on received network domain activity. A threat intelligence module receives data identifying the malicious activity in first data constructs of a predefined data structure. The threat intelligence module obtains additional data related to the identified malicious activity and generates second data constructs that include enriched data regarding the malicious activity. The enriched data includes data describing a campaign in which at least a portion of the malicious activity is involved and one or more courses of action. A course of action module receives the second data constructs and implements a given course of action.
-
Citations
36 Claims
-
1. A system comprising:
-
an event management module that; receives, for a network of an organization, network domain activity that includes first domain activity data from a first network domain and second domain activity from a second network domain; and identifies malicious activity present on at least one of the first network domain or the second network domain based on the received network domain activity; a threat intelligence module that; receives, from the even management module, data identifying the malicious activity in one or more first data constructs of a predefined data structure; obtain, from one or more third party sources, additional data related to the identified malicious activity; and generates, using the data identifying the malicious activity and the additional data, one or more second data constructs of the predefined data structure that include enriched data regarding the malicious activity, the enriched data including (i) data describing a campaign in which at least a portion of the malicious activity is involved and (ii) one or more courses of action for mitigating the malicious activity; and a course of action module that; receives the one or more second data constructs from the threat intelligence module and implements a given course of action of the one or more course of action. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-implemented method comprising:
-
receiving, by an event management module and for a network of an organization, network domain activity that includes first domain activity data from a first network domain and second domain activity from a second network domain; identifying, by the event management module, malicious activity present on at least one of the first network domain or the second network domain based on the received network domain activity; receiving, by a threat intelligence module and from the even management module, data identifying the malicious activity in one or more first data constructs of a predefined data structure; obtaining, by the threat intelligence module and from one or more third party sources, additional data related to the identified malicious activity; generating, by the threat intelligence module and using the data identifying the malicious activity and the additional data, one or more second data constructs of the predefined data structure that include enriched data regarding the malicious activity, the enriched data including (i) data describing a campaign in which at least a portion of the malicious activity is involved and (ii) one or more courses of action for mitigating the malicious activity; receiving, by a course of action module, the one or more second data constructs from the threat intelligence module; and implementing, by the course of action module, a given course of action of the one or more course of action. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium coupled to one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
-
receiving, by an event management module and for a network of an organization, network domain activity that includes first domain activity data from a first network domain and second domain activity from a second network domain; identifying, by the event management module, malicious activity present on at least one of the first network domain or the second network domain based on the received network domain activity; receiving, by a threat intelligence module and from the even management module, data identifying the malicious activity in one or more first data constructs of a predefined data structure; obtaining, by the threat intelligence module and from one or more third party sources, additional data related to the identified malicious activity; generating, by the threat intelligence module and using the data identifying the malicious activity and the additional data, one or more second data constructs of the predefined data structure that include enriched data regarding the malicious activity, the enriched data including (i) data describing a campaign in which at least a portion of the malicious activity is involved and (ii) one or more courses of action for mitigating the malicious activity; receiving, by a course of action module, the one or more second data constructs from the threat intelligence module; and implementing, by the course of action module, a given course of action of the one or more course of action. - View Dependent Claims (10, 11, 12)
-
-
13. A computer-implemented method comprising:
-
receiving, for an organization, first domain activity data from a first network domain and second domain activity data from a second network domain, the first domain activity data and the second domain activity data including events, alerts, or both from the respective first and second network domains; determining, based on the first domain activity data and the second domain activity data of the first data construct, one or more anomalous correlated event paths through which security events have progressed through at least one of the first network domain or the second network domain, each anomalous correlated event path including one or more assets of the organization; generating one or more first data constructs that include at least one of (i) the first domain activity data, (ii) the second domain activity data, or (iii) data describing the one or more anomalous correlated event paths; receiving external threat data including events, alerts, or both for one or more organizations different from the organization; generating a second data construct that includes data from the one or more first data constructs and at least a portion of the external threat data; determining, based on the one or more anomalous correlated event paths and the threat data, a risk associated with each of one or more outcomes for the organization; generating a visualization of the one or more anomalous correlated event paths and each risk; generating a third data construct that specifies a course of action determined based on at least one of one or more anomalous correlated event paths and each risk; and providing the third data construct to a course of action module that implements the course of action, wherein the first data construct, the second data construct, and the third data construct have a common data structure. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A system, comprising:
-
one or more processors; and a computer-readable storage device coupled to the one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations comprising; receiving, for an organization, first domain activity data from a first network domain and second domain activity data from a second network domain, the first domain activity data and the second domain activity data including events, alerts, or both from the respective first and second network domains; determining, based on the first domain activity data and the second domain activity data of the first data construct, one or more anomalous correlated event paths through which security events have progressed through at least one of the first network domain or the second network domain, each anomalous correlated event path including one or more assets of the organization; generating one or more first data constructs that include at least one of (i) the first domain activity data, (ii) the second domain activity data, or (iii) data describing the one or more anomalous correlated event paths; receiving external threat data including events, alerts, or both for one or more organizations different from the organization; generating a second data construct that includes data from the one or more first data constructs and at least a portion of the external threat data; determining, based on the one or more anomalous correlated event paths and the threat data, a risk associated with each of one or more outcomes for the organization; generating a visualization of the one or more anomalous correlated event paths and each risk; generating a third data construct that specifies a course of action determined based on at least one of one or more anomalous correlated event paths and each risk; and providing the third data construct to a course of action module that implements the course of action, wherein the first data construct, the second data construct, and the third data construct have a common data structure. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A non-transitory computer-readable storage medium coupled to one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
-
receiving, for an organization, first domain activity data from a first network domain and second domain activity data from a second network domain, the first domain activity data and the second domain activity data including events, alerts, or both from the respective first and second network domains; determining, based on the first domain activity data and the second domain activity data of the first data construct, one or more anomalous correlated event paths through which security events have progressed through at least one of the first network domain or the second network domain, each anomalous correlated event path including one or more assets of the organization; generating one or more first data constructs that include at least one of (i) the first domain activity data, (ii) the second domain activity data, or (iii) data describing the one or more anomalous correlated event paths; receiving external threat data including events, alerts, or both for one or more organizations different from the organization; generating a second data construct that includes data from the one or more first data constructs and at least a portion of the external threat data; determining, based on the one or more anomalous correlated event paths and the threat data, a risk associated with each of one or more outcomes for the organization; generating a visualization of the one or more anomalous correlated event paths and each risk; generating a third data construct that specifies a course of action determined based on at least one of one or more anomalous correlated event paths and each risk; and providing the third data construct to a course of action module that implements the course of action, wherein the first data construct, the second data construct, and the third data construct have a common data structure. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
Specification