×

Identifying suspicious user logins in enterprise networks

  • US 9,231,962 B1
  • Filed: 12/23/2013
  • Issued: 01/05/2016
  • Est. Priority Date: 11/12/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising steps of:

  • processing log data derived from one or more data sources associated with an enterprise network, wherein the enterprise network comprises multiple hosts;

    generating a set of profiles, wherein the set comprises profiles corresponding to respective ones of multiple users and profiles corresponding to respective ones of the multiple hosts, wherein each profile comprises historical login information derived from said log data;

    creating a graph based on said set of profiles, wherein said graph comprises (i) nodes representing said multiple users and said multiple hosts within the enterprise network, (ii) edges representing login instances linking together user-host pairs, and (iii) one or more communities identified among the nodes, wherein each community corresponds to a group of one or more users and one or more hosts that exhibit at least a specified level of interaction;

    analyzing a login instance within the enterprise network against the graph;

    identifying the login instance as inconsistent with the historical login information based on said graph; and

    outputting said identification of the inconsistent login instance;

    wherein said steps are carried out by at least one computing device.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×