×

Systems and methods for detecting online attacks

  • US 9,183,387 B1
  • Filed: 06/05/2013
  • Issued: 11/10/2015
  • Est. Priority Date: 06/05/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • detecting a plurality of events based on an analysis of a data stream by identifying the plurality of events as being associated with users on a social graph, the social graph comprising a plurality of social graph nodes and social graph edges and each of the plurality of events having a type, to receive one or more indicators of an online attack;

    analyzing propagation of the plurality of events by, for each type of the plurality of events, generating at least one directed acyclic graph (DAG) comprising a plurality of DAG nodes and DAG edges, where each DAG node on the DAG represents a corresponding social graph node on the social graph where a subset of events of the plurality of events having a particular type occur and each of the DAG edges of the DAG represents a propagation of each event of the subset of events of the particular type from a first social graph node to a second social graph node, and assessing a confidence level that the plurality of events are online attack events;

    performing a cluster analysis comprising analysis of pairs of the plurality of events that have been graphed on the DAG as having been propagated, wherein the cluster analysis is repeated for each type of the plurality of events and one or more timings of the plurality of events; and

    providing an updated confidence level associated with the plurality of events being the online attack events based on the cluster analysis,wherein an identity of an online attacker associated with the online attack events is further associated with the social graph.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×