×

Real-time security monitoring using cross-channel event processor

  • US 9,800,615 B2
  • Filed: 09/09/2014
  • Issued: 10/24/2017
  • Est. Priority Date: 09/09/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of computer system security monitoring:

  • deploying a first event monitoring agent and a second event monitoring agent across an enterprise-wide computing system wherein the first event monitoring agent monitors events occurring at a first event generator accessed by a first device of a first type via a first portal into the enterprise-wide computing system and wherein the second event monitoring agent monitors events occurring at a second event generator accessed by a second device of a second type different from the first type via a second portal into the enterprise-wide computing system;

    connecting the first and second event monitoring agents to an event processing server;

    receiving, at the event processing server, first event information generated by the first event monitoring agent describing a first event that occurred at the first event generator in response to a first communication received from the first device via the first portal;

    receiving, at the event processing server, second event information generated by the second event monitoring agent describing a second event that occurred at the second event generator in response to a second communication received from the second device via the second portal;

    performing, by the event processing server, a security analysis that comprises applying a security policy to the first event information and the second event information and performing a predictive analysis on the first event information and the second event information to obtain a security prediction score that quantifies a likelihood that the first event and the second event correspond to a potential security issue, wherein performing the predictive analysis includes comparing a sequence of the first event, the first event including a transaction amount at least a predetermined percentage over an average amount of a transaction, and the second event, the second event including a transaction amount at least the predetermined percentage over the average amount of a transaction, and a time between the occurrence of the first event and the second event, to one or more event patterns,wherein the security prediction score is based on a similarity of the first event and the second event to the one or more event patterns;

    determining, by the event processing server, that the security prediction score is above a predetermined threshold; and

    executing, by the event processing server, a security response based on the security analysis performed and the determining that the security prediction score is above a predetermined threshold.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×