×

System and method for performing threat assessments using situational awareness

  • US 8,607,353 B2
  • Filed: 03/04/2011
  • Issued: 12/10/2013
  • Est. Priority Date: 07/29/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, performed by at least one processor, for performing threat assessments, comprising:

  • identifying, by the at least one processor, a first security breach at a first company;

    determining, by the at least one processor, after identifying the first security breach, one or more first actions associated with the first security breach, the one or more first actions including actions taken following the first security breach and actions taken prior to the first security breach;

    identifying, by the at least one processor, a first possible security breach at the first company;

    determining, by the at least one processor, contemporaneously with the identification of the first possible security breach, one or more second actions associated with the first possible security breach;

    generating, by the at least one processor, one or more patterns of behavior associated with the first company and corresponding to the one or more first actions and the one or more second actions;

    storing, by the at least one processor, the one or more patterns of behavior in a pattern repository;

    comparing, by the at least one processor, at least one of the one or more patterns with one or more standardized log files for the first company to identify one or more first log entries related to the at least one of the one or more patterns of behavior and corresponding to the one or more first actions and the one or more second actions, the one or more first log entries being identified based on a threshold of similarity between the at least one of the one or more patterns of behavior and the one or more standardized log files for the first company;

    notifying, by the at least one processor and based on the one or more identified first log entries, the first company of the first possible security breach at the first company;

    performing, by the at least one processor and the first company and based on the notification, preventative action relating to the first possible security breach;

    receiving, by the at least one processor, feedback from the first company, the feedback including a measure of success relating to the at least one of the one or more patterns of behavior and the one or more identified first log entries;

    updating, by the at least one processor and based on the received feedback, the at least one of the one or more identified patterns of behavior;

    comparing, by the at least one processor, at least one of the updated patterns of behavior with one or more standardized log files for a second company to identify log entries of the second company relating to a second possible security breach at the second company; and

    notifying, by the at least one processor and based on the one or more identified first log entries of the second company, the second company of a second possible security breach at the second company.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×