Anomaly detection system for enterprise network security
First Claim
Patent Images
1. An anomaly detection system, comprising:
- a processor configured to;
determine a set of anomalous events associated with an enterprise network, wherein each of the set of anomalous events is stored with a corresponding plurality of attributes; and
determine a path of interest based at least in part on at least a subset of the set of anomalous events, wherein the path of interest includes a series of two or more anomalous events from the set of anomalous events, wherein each anomalous event of the path of interest is determined to be linked to an adjacent anomalous event of the path of interest, wherein determining the path of interest includes;
determining that an attribute of a stored plurality of attributes corresponding to a first anomalous event of the set of anomalous events matches an attribute of a stored plurality of attributes corresponding to a second anomalous event of the set of anomalous events;
storing a link relationship between the first anomalous event and the second anomalous event based at least in part on the determination that the attribute of the stored plurality of attributes corresponding to the first anomalous event matches the attribute of the stored plurality of attributes corresponding to the second anomalous event, wherein the link relationship between the first anomalous event and the second anomalous event is included in the path of interest; and
determining a score corresponding to the stored link relationship between the first anomalous event and the second anomalous event;
determine an overall score corresponding to the path of interest based at least in part on the score corresponding to the stored link relationship between the first anomalous event and the second anomalous event, anda memory coupled to the processor and configured to store data associated with the set of anomalous events.
9 Assignments
0 Petitions
Accused Products
Abstract
Anomaly detection is disclosed, including: determining a set of anomalous events associated with an enterprise network; and determining a path of interest based at least in part on at least a subset of the set of anomalous events.
248 Citations
14 Claims
-
1. An anomaly detection system, comprising:
-
a processor configured to; determine a set of anomalous events associated with an enterprise network, wherein each of the set of anomalous events is stored with a corresponding plurality of attributes; and determine a path of interest based at least in part on at least a subset of the set of anomalous events, wherein the path of interest includes a series of two or more anomalous events from the set of anomalous events, wherein each anomalous event of the path of interest is determined to be linked to an adjacent anomalous event of the path of interest, wherein determining the path of interest includes; determining that an attribute of a stored plurality of attributes corresponding to a first anomalous event of the set of anomalous events matches an attribute of a stored plurality of attributes corresponding to a second anomalous event of the set of anomalous events; storing a link relationship between the first anomalous event and the second anomalous event based at least in part on the determination that the attribute of the stored plurality of attributes corresponding to the first anomalous event matches the attribute of the stored plurality of attributes corresponding to the second anomalous event, wherein the link relationship between the first anomalous event and the second anomalous event is included in the path of interest; and determining a score corresponding to the stored link relationship between the first anomalous event and the second anomalous event; determine an overall score corresponding to the path of interest based at least in part on the score corresponding to the stored link relationship between the first anomalous event and the second anomalous event, and a memory coupled to the processor and configured to store data associated with the set of anomalous events. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for anomaly detection, comprising:
-
determining, by a processor, a set of anomalous events associated with an enterprise network, wherein each of the set of anomalous events is stored with a corresponding plurality of attributes; and determining a path of interest based at least in part on at least a subset of the set of anomalous events, wherein the path of interest includes a series of two or more anomalous events from the set of anomalous events, wherein each anomalous event of the path of interest is determined to be linked to an adjacent anomalous event of the path of interest, wherein determining the path of interest includes; determining that an attribute of a stored plurality of attributes corresponding to a first anomalous event of the set of anomalous events matches an attribute of a stored plurality of attributes corresponding to a second anomalous event of the set of anomalous events; storing a link relationship between the first anomalous event and the second anomalous event based at least in part on the determination that the attribute of the stored plurality of attributes corresponding to the first anomalous event matches the attribute of the stored plurality of attributes corresponding to the second anomalous event, wherein the link relationship between the first anomalous event and the second anomalous event is included in the path of interest; and determining a score corresponding to the stored link relationship between the first anomalous event and the second anomalous event; and determining an overall score corresponding to the path of interest based at least in part on the score corresponding to the stored link relationship between the first anomalous event and the second anomalous event. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer program product for anomaly detection, the computer program product being embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
-
determining a set of anomalous events associated with an enterprise network, wherein each of the set of anomalous events is stored with a corresponding plurality of attributes; and determining a path of interest based at least in part on at least a subset of the set of anomalous events, wherein the path of interest includes a series of two or more anomalous events from the set of anomalous events, wherein each anomalous event of the path of interest is determined to be linked to an adjacent anomalous event of the path of interest, wherein determining the path of interest includes; determining that an attribute of a stored plurality of attributes corresponding to a first anomalous event of the set of anomalous events matches an attribute of a stored plurality of attributes corresponding to a second anomalous event of the set of anomalous events; storing a link relationship between the first anomalous event and the second anomalous event based at least in part on the determination that the attribute of the stored plurality of attributes corresponding to the first anomalous event matches the attribute of the stored plurality of attributes corresponding to the second anomalous event, wherein the link relationship between the first anomalous event and the second anomalous event is included in the path of interest; and determining a score corresponding to the stored link relationship between the first anomalous event and the second anomalous event; and determining an overall score corresponding to the path of interest based at least in part on the score corresponding to the stored link relationship between the first anomalous event and the second anomalous event.
-
Specification