发明名称 Modeling user working time using authentication events within an enterprise network
摘要 Methods, apparatus and articles of manufacture for modeling user working time using authentication events within an enterprise network are provided herein. A method includes collecting multiple instances of activity within an enterprise network over a specified period of time, wherein said multiple instances of activity are attributed to a given device; creating a model based on said collected instances of activity, wherein said model comprises a temporal pattern of activity within the enterprise network associated with the given device; and generating an alert upon detecting an instance of activity within the enterprise network associated with the given device that is (i) inconsistent with the temporal pattern of the model and (ii) in violation of one or more security parameters.
申请公布号 US9338187(B1) 申请公布日期 2016.05.10
申请号 US201314139019 申请日期 2013.12.23
申请人 EMC Corporation 发明人 Oprea Alina;Yen Ting-Fang
分类号 H04L29/06;G06F21/31 主分类号 H04L29/06
代理机构 Ryan, Mason & Lewis, LLP 代理人 Ryan, Mason & Lewis, LLP
主权项 1. A method comprising: processing multiple items of log data derived from one or more data sources associated with an enterprise network, wherein said multiple items of log data pertain to multiple instances of activity within the enterprise network over a specified period of time attributed to a given device, and wherein said processing comprises normalizing said multiple items of log data by normalizing a timestamp associated with each respective one of the multiple items of log data to a common time zone via application of a correction function to the timestamp associated with each respective one of the multiple items of log data; creating a model based on said multiple items of processed log data, wherein said model comprises a temporal pattern of activity within the enterprise network associated with the given device; generating an alert upon detecting an instance of activity within the enterprise network associated with the given device that is (i) inconsistent with the temporal pattern of the model and (ii) in violation of one or more security parameters; assigning a risk score to the alert based on one or more risk factors, wherein each respective one of the one or more risk factors has a discrete weight applied thereto; prioritizing the alert over one or more additional alerts based on the risk score; and outputting the alert and the one or more additional alerts sequentially in an order matching said prioritizing; wherein said processing, said creating, said generating, said assigning, said prioritizing, and said outputting are carried out by at least one computing device.
地址 Hopkinton MA US