Invention Grant
- Patent Title: Modeling behavior in a network using event logs
-
Application No.: US15355142Application Date: 2016-11-18
-
Publication No.: US10375095B1Publication Date: 2019-08-06
- Inventor: Melissa J. M. Turcotte , Nicholas A. Heard , Alexander D. Kent
- Applicant: Triad National Security, LLC , IP2IPO Innovations Limited
- Applicant Address: US NM Los Alamos GB London
- Assignee: Triad National Security, LLC,IP2IPO Innovations Limited
- Current Assignee: Triad National Security, LLC,IP2IPO Innovations Limited
- Current Assignee Address: US NM Los Alamos GB London
- Agency: LeonardPatel PC
- Agent Michael Aristo Leonard, II; Sheetal Suresh Patel
- Main IPC: H04L29/06
- IPC: H04L29/06

Abstract:
A framework is provided for modeling the activity surrounding user credentials and/or machine level activity on a computer network using computer event logs by viewing the logs attributed to each user as a multivariate data stream. The methodology performs well in detecting compromised user credentials at a very low false positive rate. Such a methodology may detect both users of compromised credentials by external actors and otherwise authorized users who have begun engaging in malicious activity.
Information query