System and method for detecting security risks in a computer system

    公开(公告)号:US10909242B2

    公开(公告)日:2021-02-02

    申请号:US16169081

    申请日:2018-10-24

    Abstract: A system and method are provided for identifying security risks in a computer system. The system includes an event stream generator configured to collect system event data from the computer system. The system further includes a query device configured to receive query requests that specify parameters of a query. Each query request includes at least one anomaly model. The query request and the anomaly model are included in a first syntax in which a system event is expressed as {subject-operation-object}. The system further includes a detection device configured to receive at least one query request from the query device and continuously compare the system event data to the anomaly models of the query requests to detect a system event that poses a security risk. The system also includes a reporting device configured to generate an alert for system events that pose a security risk detected by the detection device.

    REAL-TIME THREAT ALERT FORENSIC ANALYSIS
    2.
    发明申请

    公开(公告)号:US20200250308A1

    公开(公告)日:2020-08-06

    申请号:US16781366

    申请日:2020-02-04

    Abstract: Methods and systems for security monitoring and response include assigning an anomaly score to each of a plurality of event paths that are stored in a first memory. Events that are cold, events that are older than a threshold, and events that are not part of a top-k anomalous path are identified. The identified events are evicted from the first memory to a second memory. A threat associated with events in the first memory is identified. A security action is performed responsive to the identified threat.

    AUTOMATED THREAT ALERT TRIAGE VIA DATA PROVENANCE

    公开(公告)号:US20200042700A1

    公开(公告)日:2020-02-06

    申请号:US16507353

    申请日:2019-07-10

    Abstract: A method for implementing automated threat alert triage via data provenance includes receiving a set of alerts and security provenance data, separating true alert events within the set of alert events corresponding to malicious activity from false alert events within the set of alert events corresponding to benign activity based on an alert anomaly score assigned to the at least one alert event, and automatically generating a set of triaged alert events based on the separation.

    METHOD FOR AUTOMATED CODE REVIEWER RECOMMENDATION

    公开(公告)号:US20210089992A1

    公开(公告)日:2021-03-25

    申请号:US17016709

    申请日:2020-09-10

    Abstract: A method for automatically recommending a reviewer for submitted codes is presented. The method includes employing, in a learning phase, an artificial intelligence agent for learning an underlying and contextual structure of code regions, mapping the code regions into a distributed representation to define code region representations, employing, in a recommendation phase, the artificial intelligence agent to produce a ranked list of recommended reviewers for any given submitted code review request, and outputting the ranked list of recommended reviewers to a visualization device.

    SYSTEM AND METHOD FOR DETECTING SECURITY RISKS IN A COMPUTER SYSTEM

    公开(公告)号:US20190121973A1

    公开(公告)日:2019-04-25

    申请号:US16169081

    申请日:2018-10-24

    Abstract: A system and method are provided for identifying security risks in a computer system. The system includes an event stream generator configured to collect system event data from the computer system. The system further includes a query device configured to receive query requests that specify parameters of a query. Each query request includes at least one anomaly model. The query request and the anomaly model are included in a first syntax in which a system event is expressed as {subject-operation-object}. The system further includes a detection device configured to receive at least one query request from the query device and continuously compare the system event data to the anomaly models of the query requests to detect a system event that poses a security risk. The system also includes a reporting device configured to generate an alert for system events that pose a security risk detected by the detection device.

    Provenance-based threat detection tools and stealthy malware detection

    公开(公告)号:US11423146B2

    公开(公告)日:2022-08-23

    申请号:US16991288

    申请日:2020-08-12

    Abstract: Systems and methods for a provenance based threat detection tool that builds a provenance graph including a plurality of paths using a processor device from provenance data obtained from one or more computer systems and/or networks; samples the provenance graph to form a plurality of linear sample paths, and calculates a regularity score for each of the plurality of linear sample paths using a processor device; selects a subset of linear sample paths from the plurality of linear sample paths based on the regularity score, and embeds each of the subset of linear sample paths by converting each of the subset of linear sample paths into a numerical vector using a processor device; detects anomalies in the embedded paths to identify malicious process activities, and terminates a process related to the embedded path having the identified malicious process activities.

    Real-time threat alert forensic analysis

    公开(公告)号:US11275832B2

    公开(公告)日:2022-03-15

    申请号:US16781366

    申请日:2020-02-04

    Abstract: Methods and systems for security monitoring and response include assigning an anomaly score to each of a plurality of event paths that are stored in a first memory. Events that are cold, events that are older than a threshold, and events that are not part of a top-k anomalous path are identified. The identified events are evicted from the first memory to a second memory. A threat associated with events in the first memory is identified. A security action is performed responsive to the identified threat.

Patent Agency Ranking