×

Detection of network security breaches based on analysis of network record logs

  • US 7,904,479 B2
  • Filed: 12/06/2007
  • Issued: 03/08/2011
  • Est. Priority Date: 04/04/2003
  • Status: Active Grant
First Claim
Patent Images

1. A network device including an interface to receive a log of security records from a plurality of network security devices in a computer network, the network device comprising:

  • a processor;

    the processor to process a log record, including deriving a key to a table and tagging the key with a time stamp, anddetermine a data value from information in the log record and adding the data value including a tag field to a list of data values associated with the key if the data value is not already in the list of data values, wherein the time stamp and the tag field differ, and the tag field indicates that the key has been modified by the addition of the data value since a prior evaluation;

    a database to store the table; and

    an evaluation engine to;

    retrieve entries of the table not having the tag field,retrieve entries of the table having the tag field,evaluate entries of the table having the tag field based on predetermined criteria to detect attempted security breaches, andreset the tag field of the evaluated entries to indicate that the key has been evaluated since a prior modification, andupdate the time stamp.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×