×

Monitoring network traffic by using event log information

  • US 9,584,522 B2
  • Filed: 04/04/2006
  • Issued: 02/28/2017
  • Est. Priority Date: 02/26/2004
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method comprising:

  • receiving, by a first computing device via a first network, an event log from an authentication service that authorizes user access to resources on the first network, the event log including an event authorizing access to the resources on the first network;

    receiving, by a second computing device, the event log from the first computing device over a second network, the second network enabling the first computing device and the second computing device to communicate without using the first network;

    extracting, by the second computing device, a first user name, a time stamp, and a first network address from an authenticated-related event portion of the event log;

    receiving, by the first computing device, network traffic from the first network;

    identifying, by the second computing device, at least one packet from the network traffic that contains a second network address matching the first network address;

    identifying, by the second computing device, a time stamp within the network packet;

    determining that the time stamp within the network packet is equal to or later than the time stamp from the authenticated-related event portion of the event log; and

    based on the determining, associating, by the second computing device, the at least one packet with the first user name.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×