×

Graph based detection of anomalous activity

  • US 9,225,730 B1
  • Filed: 03/19/2014
  • Issued: 12/29/2015
  • Est. Priority Date: 03/19/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • accessing event data describing a plurality of events associated with a plurality of host devices, individual ones of the plurality of events including an interaction between a first entity and a second entity, the first and second entities including two of;

    a host device of the plurality of host devices;

    a process that is executable on at least one of the host devices;

    ora service that is provided by the plurality of host devices, the service comprising a plurality of executable processes;

    generating a graph based at least partially on the event data, the graph relating the plurality of events, wherein the graph includes;

    a plurality of vertices, individual ones of the plurality of vertices associated with one of the first or second entities included in the plurality of events; and

    a plurality of edges, individual ones of the plurality of edges indicating an event by connecting two of the plurality of vertices corresponding to the first and second entities included in the event, individual ones of the plurality of edges including;

    a type attribute indicating a type of the event; and

    a timestamp attribute indicating a time when the event occurred;

    determining a rarity metric associated with one or more of the plurality of edges, the rarity metric of an edge being based on a number of edges that include a same type attribute as the edge and that connect a same two vertices as the edge;

    determining a risk metric of one or more of the plurality of edges, the risk metric of the edge indicating a degree of security risk associated with the event corresponding to the edge;

    determining a start vertex associated with an earliest timestamp attribute within a time period;

    traversing the graph, beginning from the start vertex, along at least a portion of the plurality of edges, wherein each successive traversed edge includes a timestamp attribute greater than that of a previously traversed edge to identify a subset of the plurality of edges for which the rarity metric satisfies a rarity threshold and the risk metric satisfies a risk threshold;

    determining the subset of the plurality of edges for which the rarity metric satisfies the rarity threshold and the risk metric satisfies the risk threshold to indicate anomalous activity;

    storing data indicative of the subset of the plurality of edges as anomalous activity data for determining a pattern of anomalous activity within the plurality of host devices; and

    performing one or more interdiction operations based on the anomalous activity data, the one or more interdiction operations including suspending a communication with at least one host device indicated by the anomalous activity data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×