Using frequency analysis in enterprise threat detection to detect intrusions in a computer system

    公开(公告)号:US10530792B2

    公开(公告)日:2020-01-07

    申请号:US15380450

    申请日:2016-12-15

    Applicant: SAP SE

    Abstract: The present disclosure describes methods, systems, and computer program products for performing a frequency domain analysis of activity data for a computer system. One computer-implemented method receiving time domain activity data for a computer system, wherein the time domain activity data comprise activity records associated with the computer system in a time domain; computing, by a hardware processor, frequency domain activity data based on the time domain activity data; and displaying the frequency domain activity data.

    Using frequency analysis in enterprise threat detection to detect intrusions in a computer system

    公开(公告)号:US10440040B2

    公开(公告)日:2019-10-08

    申请号:US15380450

    申请日:2016-12-15

    Applicant: SAP SE

    Abstract: The present disclosure describes methods, systems, and computer program products for performing a frequency domain analysis of activity data for a computer system. One computer-implemented method receiving time domain activity data for a computer system, wherein the time domain activity data comprise activity records associated with the computer system in a time domain; computing, by a hardware processor, frequency domain activity data based on the time domain activity data; and displaying the frequency domain activity data.

    Using domains for flexible data access in heterogeneous system landscapes

    公开(公告)号:US11042654B2

    公开(公告)日:2021-06-22

    申请号:US16216400

    申请日:2018-12-11

    Applicant: SAP SE

    Abstract: Metadata describing access control capabilities of a database technology resource is received from an access control system. Access restrictions for accessing data of the database resource by users of an application that have a role are received from an application developer. A role maintenance user interface is generated, using the metadata, for assigning the role to users of the application. Attribute values for creating an instance of the role for a user are received, using the role maintenance user interface. The instance of the role is created for the user based on the received attribute values and the access restrictions. A request from the application for the user to access the database resource is received by the access control system when the user is logged into the application. The access restrictions are applied by the access control system in the database resource when the database resource is accessed.

    USING FREQUENCY ANALYSIS IN ENTERPRISE THREAT DETECTION TO DETECT INTRUSIONS IN A COMPUTER SYSTEM

    公开(公告)号:US20180176238A1

    公开(公告)日:2018-06-21

    申请号:US15380450

    申请日:2016-12-15

    Applicant: SAP SE

    Abstract: The present disclosure describes methods, systems, and computer program products for performing a frequency domain analysis of activity data for a computer system. One computer-implemented method receiving time domain activity data for a computer system, wherein the time domain activity data comprise activity records associated with the computer system in a time domain; computing, by a hardware processor, frequency domain activity data based on the time domain activity data; and displaying the frequency domain activity data.

    Standard metadata model for analyzing events with fraud, attack, or any other malicious background

    公开(公告)号:US09876809B2

    公开(公告)日:2018-01-23

    申请号:US14937794

    申请日:2015-11-10

    Applicant: SAP SE

    Inventor: Kathrin Nos

    CPC classification number: H04L63/1416 G06F21/554 H04L63/1425

    Abstract: A standard metadata model for analyzing events with fraud, attack or other malicious background is disclosed. Log data for two or more computing systems is stored, and mapped to standardized attributes based on metadata entities defined for each computing system. A standard metadata model is defined for the computing systems, in which one or more standardized attributes of a first set of computing systems is associated with one or more standardized attributes of a second set of computing systems to define connected metadata that connects attributes of the associated metadata entities.

Patent Agency Ranking