×

Intrusion assessment system

  • US 10,049,208 B2
  • Filed: 12/03/2015
  • Issued: 08/14/2018
  • Est. Priority Date: 12/03/2015
  • Status: Active Grant
First Claim
Patent Images

1. An intrusion assessment apparatus comprising:

  • a memory configured to store;

    a first email that indicates a first network intrusion;

    a second email;

    a first keyword pertaining to network intrusions;

    a second keyword pertaining to network intrusions; and

    a third keyword pertaining to network intrusions; and

    a processor communicatively coupled to the memory, the processor configured to;

    determine a number of occurrences of the first keyword in the first email;

    determine a number of occurrences of the first keyword in the second email;

    determine a number of occurrences of the second keyword in the first email;

    determine a number of occurrences of the second keyword in the second email;

    determine a number of occurrences of the third keyword in the first email;

    determine a number of occurrences of the third keyword in the second email;

    based on the number of occurrences of the first, second, and third keywords in the first and second emails, assign the first email to a first cluster and the second email to a second cluster;

    determine a per-record average number of occurrences of the first keyword in a plurality of emails assigned to the first cluster and in a plurality of emails assigned to the second cluster;

    determine a per-record average number of occurrences of the second keyword in the plurality of emails assigned to the first cluster and in the plurality of emails assigned to the second cluster;

    determine a per-record average number of occurrences of the third keyword in the plurality of emails assigned to the first cluster and in the plurality of emails assigned to the second cluster;

    receive a search request indicating the first, second, and third keywords and an emphasis value for each of the first, second, and third keywords, the search request pertaining to a second network intrusion;

    determine, based on the per-record average numbers of occurrences of the first, second, and third keywords in the plurality of emails assigned to the first cluster and in the plurality of emails assigned to the second cluster, that the first cluster should be returned in response to the request;

    transmit, based on the determination that the first cluster should be returned, the first email indicating the first network intrusion; and

    implement, based on the first email, a process to prevent the second network intrusion.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×