Invention Grant
- Patent Title: Systems and methods for detecting network security threat event patterns
-
Application No.: US15715015Application Date: 2017-09-25
-
Publication No.: US10771486B2Publication Date: 2020-09-08
- Inventor: Lucas Murphey , Francis Gerard , Richard Barger , Bhavin Patel , Patrick Schulz , Chinmay Kulkarni
- Applicant: Splunk Inc.
- Applicant Address: US CA San Francisco
- Assignee: Splunk Inc.
- Current Assignee: Splunk Inc.
- Current Assignee Address: US CA San Francisco
- Agency: Nicholson De Vos Webster, Elliott LLP
- Main IPC: G06F21/00
- IPC: G06F21/00 ; G06F21/50 ; G06F21/55 ; H04L29/06 ; G06F16/951 ; G06F9/448 ; G06F3/0482 ; G06T11/20

Abstract:
Techniques and mechanisms are disclosed for a data intake and query system to generate “meta-notable” events by applying a meta-notable event rule to a collection of notable event data. A meta-notable event rule specifies one or more patterns of notable event instances defined by a set of notable event states and a set of transition rules (also referred to as association rules) indicating conditions for transitioning from one notable event state to another. The set of notable event states includes at least one start state and at least one end state. A meta-notable event is generated when a set of analyzed notable events satisfies a set of transition rules linking a start state to an end state (including transitions through any intermediary states between the start state and the end state).
Public/Granted literature
- US20190098032A1 SYSTEMS AND METHODS FOR DETECTING NETWORK SECURITY THREAT EVENT PATTERNS Public/Granted day:2019-03-28
Information query