×

Anomalous network monitoring, user behavior detection and database system

  • US 10,129,282 B2
  • Filed: 12/30/2016
  • Issued: 11/13/2018
  • Est. Priority Date: 08/19/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computerized method performed by one or more computer systems, the method comprising:

  • accessing network access logs associated with a plurality of network accessible systems, the network access logs being generated in response to network actions associated with a plurality of user accounts, the user accounts each associated with, in the network access logs, one or more IP addresses of corresponding user devices;

    determining, based at least on the network access logs, information indicative of user accounts exhibiting high-risk behavior, the information including, for each of one or more user accounts, a transition from the user account to a subsequent user account associated with a different user, the transition being associated with escalated user privileges, wherein the user account transitions are determined based, at least in part, on monitoring IP addresses indicated in the network access logs; and

    providing, for presentation in an interactive user interface, information describing a set of user accounts and corresponding determined information, wherein the interactive user interface is configured to receive user actions associated with preventing an attack on one or more networks, wherein the user actions comprise one or more of selecting specific user accounts for more detailed information or generating information to be presented to specific user accounts.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×