×

Data trend analysis

  • US 9,355,172 B2
  • Filed: 03/14/2013
  • Issued: 05/31/2016
  • Est. Priority Date: 01/10/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for cyber security threat related data trend analysis, the method comprising:

  • retrieving, over a computer network, cyber security threat related data from at least one data source;

    associating the cyber security threat related data with a time;

    identifying, by an ontology creation hardware module, co-occurrences of terms and concepts within the cyber security threat related data;

    in response to determining that co-occurrences of term and concept pairs reach a predefined threshold, adding the term and concept pairs to an ontology;

    logging occurrences of terms in the ontology within the cyber security threat related data with respect to associated data times;

    identifying a plurality of time periods;

    for one of the plurality of time periods and for the logged terms;

    determining, by a hardware processor, a first score indicative of a weighted term frequency metric for a logged term within the cyber security threat related data during the one time period, anddetermining, by the hardware processor, a second score indicative of a commonality of a presence of the logged term within the cyber security threat related data among the plurality of time periods;

    using the first and second scores to determine a cyber security threat trend;

    monitoring the at least one data source or another source related to the at least one data source based on the determined cyber security threat trend;

    generating, based on the monitoring, a report indicative of the cyber security threat trend related to the cyber security threat related data;

    determining a third score indicative of the weighted term frequency metric for the logged term during the one time period and the commonality of the presence of the logged term among the plurality of time periods; and

    filtering the logged terms based on user preferences by multiplying the third score by a user-preference factor.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×