Systems and methods for generating contextually meaningful animated visualizations of computer security events
First Claim
1. A computer-implemented method for generating contextually meaningful animated visualizations of computer security events, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- detecting a security-related event that involves an actor and a target within a computing environment;
identifying certain characteristics of the security-related event that collectively describe a context of the security-related event with respect to the actor and the target within the computing environment;
generating, based at least in part on the certain characteristics of the security-related event, a graphical animation of the security-related event that;
includes a motion-picture representation of the security-related event that, when presented to a user, changes with a passing of time; and
graphically represents the context of the security-related event with respect to the actor and the target within the computing environment;
generating a graphical timeline to which the motion-picture representation is synchronized such that, when presented to the user, the motion-picture representation changes consistent with the passing of time shown on the graphical timeline, wherein the graphical timeline includes;
a time marker that identifies a point in time reflected in the motion-picture representation; and
a graphical representation of the security-related event that is positioned relative to the time marker within the graphical timeline, wherein the time marker overlaps the graphical representation of the security-related event when the security-related event is reflected in the motion-picture representation; and
providing, for presentation to the user, the graphical animation of the security-related event to facilitate visualizing the context of the security-related event with respect to the actor and the target within the computing environment.
6 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for generating contextually meaningful animated visualizations of computer security events may include (1) detecting a security-related event that involves an actor and a target within a computing environment, (2) identifying certain characteristics of the security-related event that collectively describe a context of the security-related event with respect to the actor and the target within the computing environment, (3) generating, based at least in part on the certain characteristics of the security-related event, a graphical animation of the security-related event that graphically represents the context of the security-related event with respect to the actor and the target within the computing environment, and then (4) providing, for presentation to a user, the graphical animation of the security-related event to facilitate visualizing the context of the security-related event with respect to the actor and the target. Various other methods, systems, and computer-readable media are also disclosed.
22 Citations
16 Claims
-
1. A computer-implemented method for generating contextually meaningful animated visualizations of computer security events, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
detecting a security-related event that involves an actor and a target within a computing environment; identifying certain characteristics of the security-related event that collectively describe a context of the security-related event with respect to the actor and the target within the computing environment; generating, based at least in part on the certain characteristics of the security-related event, a graphical animation of the security-related event that; includes a motion-picture representation of the security-related event that, when presented to a user, changes with a passing of time; and graphically represents the context of the security-related event with respect to the actor and the target within the computing environment; generating a graphical timeline to which the motion-picture representation is synchronized such that, when presented to the user, the motion-picture representation changes consistent with the passing of time shown on the graphical timeline, wherein the graphical timeline includes; a time marker that identifies a point in time reflected in the motion-picture representation; and a graphical representation of the security-related event that is positioned relative to the time marker within the graphical timeline, wherein the time marker overlaps the graphical representation of the security-related event when the security-related event is reflected in the motion-picture representation; and providing, for presentation to the user, the graphical animation of the security-related event to facilitate visualizing the context of the security-related event with respect to the actor and the target within the computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for generating contextually meaningful animated visualizations of computer security events, the system comprising:
-
a detection module, stored in memory, that detects a security-related event that involves an actor and a target within a computing environment; an identification module, stored in memory, that identifies certain characteristics of the security-related event that collectively describe a context of the security-related event with respect to the actor and the target within the computing environment; a generation module, stored in memory, that; generates, based at least in part on the certain characteristics of the security-related event, a graphical animation of the security-related event that; includes a motion-picture representation of the security-related event that, when presented to a user, changes with a passing of time; and graphically represents the context of the security-related event with respect to the actor and the target within the computing environment; generates a graphical timeline to which the motion-picture representation is synchronized such that, when presented to the user, the motion-picture representation changes consistent with the passing of time shown on the graphical timeline, wherein the graphical timeline includes; a time marker that identifies a point in time reflected in the motion-picture representation; and a graphical representation of the security-related event that is positioned relative to the time marker within the graphical timeline, wherein the time marker overlaps the graphical representation of the security-related event when the security-related event is reflected in the motion-picture representation; a presentation module, stored in memory, that provides, for presentation to the user, the graphical animation of the security-related event to facilitate visualizing the context of the security-related event with respect to the actor and the target within the computing environment; and at least one physical processor configured to execute the detection module, the identification module, the generation module, and the presentation module. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
detect a security-related event that involves an actor and a target within a computing environment; identify certain characteristics of the security-related event that collectively describe a context of the security-related event with respect to the actor and the target within the computing environment; generate, based at least in part on the certain characteristics of the security-related event, a graphical animation of the security-related event that; includes a motion-picture presentation of the security-related event that, when presented to a user, changes with a passing of time; and graphically represents the context of the security-related event with respect to the actor and the target within the computing environment; generate a graphical timeline to which the motion-picture representation is synchronized such that, when presented to the user, the motion-picture representation changes consistent with the passing of time shown on the graphical timeline, wherein the graphical timeline includes; a time marker that identifies a point in time reflected in the motion-picture representation; and a graphical representation of the security-related event that is positioned relative to the time marker within the graphical timeline, wherein the time marker overlaps the graphical representation of the security-related event when the security-related event is reflected in the motion-picture representation; and provide, for presentation to a user, the graphical animation of the security-related event to facilitate visualizing the context of the security-related event with respect to the actor and the target within the computing environment.
-
Specification