×

System and user context in enterprise threat detection

  • US 10,075,462 B2
  • Filed: 12/22/2015
  • Issued: 09/11/2018
  • Est. Priority Date: 12/22/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • executing, by a computer, a transfer of master data in a backend computing system, wherein the master data includes user data and system data, and wherein the transfer of master data comprises;

    receiving, by a computer, user data associated with a particular user id in the backend computing system;

    transferring, by a computer, the received user data to an event stream processor (ESP), wherein a user context associated with the particular user id is created or updated;

    receiving, by a computer, system data associated with a particular log providing computing system in the backend computing system;

    transferring, by a computer, the received system data to the ESP, wherein a system context associated with the particular log providing system is created or updated; and

    executing, by a computer, a transfer of log data associated with logs of computing systems connected to the backend computing system;

    enriching one or more log entries of the transferred log data based on the user context and the system context; and

    rendering a semantic graphical user interface for interaction with the transferred log data, wherein the semantic graphical user interface is configured to render distributions of selectable semantic attribute type values with respect to events in the transferred log data and selected semantic filter values;

    wherein alert indications of malicious computing activities are identified in the semantic graphical user interface according to analysis with respect to one or more alert patterns defined using semantic events, and wherein one or more alerts are generated and transmitted based on the analysis.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×