Detection of network security breaches based on analysis of network record logs
First Claim
Patent Images
1. A system comprising:
- a network device, that includes a processor and a memory, to;
process, for detecting one or more attempted security breaches, each of a plurality of log records to generate a respective value corresponding to each of the plurality of log records,identify, based on the value corresponding to a log record of the plurality of log records, a first entry of a plurality of entries of a data structure,generate, based on one or more fields of the log record, a data value,associate the data value with a list of values associated with the first entry, when the data value does not match another value of the list of values,insert a tag into the first entry to form a modified entry after associating the data value with the list of values,analyze each of the plurality of entries of the data structure,identify, based on the tag of the first entry of the plurality of entries and the data value, the modified entry,perform, after identifying the modified entry, an evaluation of the data value associated with the modified entry to detect an attempted security breach, andmodify, upon completion of the evaluation of the data value, the tag of the modified entry to cause the modified entry to no longer be identified as a modified entry.
2 Assignments
0 Petitions
Accused Products
Abstract
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches.
67 Citations
25 Claims
-
1. A system comprising:
a network device, that includes a processor and a memory, to; process, for detecting one or more attempted security breaches, each of a plurality of log records to generate a respective value corresponding to each of the plurality of log records, identify, based on the value corresponding to a log record of the plurality of log records, a first entry of a plurality of entries of a data structure, generate, based on one or more fields of the log record, a data value, associate the data value with a list of values associated with the first entry, when the data value does not match another value of the list of values, insert a tag into the first entry to form a modified entry after associating the data value with the list of values, analyze each of the plurality of entries of the data structure, identify, based on the tag of the first entry of the plurality of entries and the data value, the modified entry, perform, after identifying the modified entry, an evaluation of the data value associated with the modified entry to detect an attempted security breach, and modify, upon completion of the evaluation of the data value, the tag of the modified entry to cause the modified entry to no longer be identified as a modified entry. - View Dependent Claims (2, 3, 4, 22, 23)
-
5. A method comprising:
-
generating, by a network device and based on at least one field of a log record, a key; evaluating, by the network device, a data structure to identify an entry corresponding to the generated key; retrieving, by the network device, a data list associated with the identified entry; comparing, by the network device, the data list to a value, the value being generated using one or more fields of the log record; determining, by the network device, whether the data list includes a list entry that matches the value; inserting, by the network device and when the data list does not include the list entry that matches the value, the value into the data list; tagging, by the network device and when the data list does not include the list entry that matches the value, the identified entry in the data structure with a time stamp corresponding to the tagging; determining, by the network device and based on a tag associated with each entry of the data structure, whether each entry of the data structure is expired; deleting, by the network device, each expired entry of the data structure; evaluating, by the network device, each data list, associated with each unexpired entry of the data structure, to detect an attempted security breach; and generating, by the network device, a response to detecting the attempted security breach. - View Dependent Claims (6, 7, 8)
-
-
9. A method comprising:
-
generating, by the network device and based on at least one field of a log record associated with a network event, a data value; identifying, by the network device and based on a particular value that is generated based on fields of the log record, a first entry in a data structure; comparing, by the network device, the generated data value to other data values, associated with the first entry in the data structure, to identify a matching data value corresponding to the generated data value; associating, by the network device and only when the generated data value does not match a data value in the other data values, the generated data value and a tag with the first entry in the data structure, the tag indicating that the first entry has been modified in the data structure; identifying, by the network device and based on the tag being associated with the first entry in the data structure, the first entry in the data structure as having been modified; evaluating, by the network device and based on identifying the first entry in the data structure as having been modified, the first entry in the data structure to detect an attempted security breach; and disassociating, by the network device and upon completion of the evaluating, the first entry, in the data structure, from the tag. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium comprising:
a plurality of instructions which, when executed by a device, cause the device to; process, for detecting one or more attempted security breaches, each of a plurality of log records to generate a respective value corresponding to each of the plurality of log records, identify, based on the value corresponding to a log record of the plurality of log records, a first entry of a plurality of entries of a data structure, generate, based on one or more fields of the log record, a data value, associate the data value with a list of values associated with the first entry, when the data value does not match another value of the list of values, insert a tag into the first entry to form a modified entry after associating the data value with the list of values, analyze each of the plurality of entries of the data structure; identify, based on the tag of the first entry, the modified entry; perform, after identifying the modified entry, an evaluation of the data value associated with the modified entry to detect an attempted security breach; and modify, upon completion of the evaluation of the data values, the tag of the modified entry to cause the modified entry to no longer be identified as a modified entry. - View Dependent Claims (19, 20, 21, 24, 25)
Specification