×

Automatic baselining of anomalous event activity in time series data

  • US 9,471,778 B1
  • Filed: 11/30/2015
  • Issued: 10/18/2016
  • Est. Priority Date: 11/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving values of one or more attributes of a computing system, wherein the values of the one or more attributes correspond to one or more time periods;

    determining a first set of statistical thresholds for the received values of the one or more attributes, wherein the received values of the one or more attributes include one or more values that exceed the first set of statistical thresholds for the received values of the one or more attributes;

    determining a second set of statistical thresholds for a first subset of values of the received values of the one or more attributes, wherein each value of the first subset exceeds the first set of statistical thresholds for the received values of the one or more attributes;

    determining a baseline pattern for the one or more attributes based, at least in part, on the determined first set of statistical thresholds for the received values of the one or more attributes and the determined second set of statistical thresholds for the first subset of values that exceed the first set of statistical thresholds for the received values of the one or more attributes;

    utilizing an anti-gaming mechanism for preventing undetected malicious activity on the computing system, wherein the anti-gaming mechanism randomly determines a start time of one or more additional time periods to prevent potential attackers of the computing system from utilizing knowledge of the first set of statistical thresholds, the second set of statistical thresholds, and/or the baseline pattern to avoid detection of malicious activity;

    receiving additional values of the one or more attributes of the computing system, wherein the additional values of the one or more attributes correspond to the one or more additional time periods; and

    in response to identifying anomalous values in the received additional values based on the determined baseline pattern, sending an alert to a user of the computing system that a potential intrusion in the computing system has occurred.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×