-
1.
公开(公告)号:US20240354401A1
公开(公告)日:2024-10-24
申请号:US18761554
申请日:2024-07-02
Applicant: Splunk Inc.
Inventor: James Apger , Allison Lindsey Drake , James Irwin Ebeling , Orville Esoy , Bhooshan Kulkarni , Marquis L. Montgomery , Daniel Trenkner
IPC: G06F21/55 , G06F3/0482 , G06F21/57
CPC classification number: G06F21/552 , G06F3/0482 , G06F21/577 , G06F2221/2101
Abstract: A graphical user interface (GUI) for presentation of network security risk and threat information is disclosed. A listing is generated of incidents identified by use of event data obtained from a networked computing environment. A particular incident is determined to be associated with a risk object, wherein a risk object is a component of the networked computing environment. The listing is populated with a name associated with the risk object. Risk events associated with the incident are determined, wherein each risk event contributes to a risk score for the incident. The risk score indicates a potential security issue associated with the risk object. The listing is populated with the risk score and a summary of the events. An action is associated with the listing, for triggering display of additional information associated with the risk object. The listing can be displayed in a first display screen of the GUI.
-
2.
公开(公告)号:US12061691B2
公开(公告)日:2024-08-13
申请号:US17515328
申请日:2021-10-29
Applicant: Splunk Inc.
Inventor: James Apger , Allison Lindsey Drake , James Irwin Ebeling , Orville Esoy , Bhooshan Kulkarni , Marquis L. Montgomery , Daniel Trenkner
IPC: G06F21/55 , G06F3/0482 , G06F21/57
CPC classification number: G06F21/552 , G06F3/0482 , G06F21/577 , G06F2221/2101
Abstract: A graphical user interface (GUI) for presentation of network security risk and threat information is disclosed. A listing is generated of incidents identified by use of event data obtained from a networked computing environment. A particular incident is determined to be associated with a risk object, wherein a risk object is a component of the networked computing environment. The listing is populated with a name associated with the risk object. Risk events associated with the incident are determined, wherein each risk event contributes to a risk score for the incident. The risk score indicates a potential security issue associated with the risk object. The listing is populated with the risk score and a summary of the events. An action is associated with the listing, for triggering display of additional information associated with the risk object. The listing can be displayed in a first display screen of the GUI.
-
3.
公开(公告)号:US20230139000A1
公开(公告)日:2023-05-04
申请号:US17515328
申请日:2021-10-29
Applicant: Splunk Inc.
Inventor: James Apger , Allison Lindsey Drake , James Irwin Ebeling , Orville Esoy , Bhooshan Kulkarni , Marquis L. Montgomery , Daniel Trenkner
IPC: G06F21/55 , G06F21/57 , G06F3/0482
Abstract: A graphical user interface (GUI) for presentation of network security risk and threat information is disclosed. A listing is generated of incidents identified by use of event data obtained from a networked computing environment. A particular incident is determined to be associated with a risk object, wherein a risk object is a component of the networked computing environment. The listing is populated with a name associated with the risk object. Risk events associated with the incident are determined, wherein each risk event contributes to a risk score for the incident. The risk score indicates a potential security issue associated with the risk object. The listing is populated with the risk score and a summary of the events. An action is associated with the listing, for triggering display of additional information associated with the risk object. The listing can be displayed in a first display screen of the GUI.
-
公开(公告)号:US20220141188A1
公开(公告)日:2022-05-05
申请号:US17213864
申请日:2021-03-26
Applicant: Splunk Inc.
Inventor: James Apger , Kyle Champlin
Abstract: Described herein, is a technique of data reduction and focusing for system and network security. Anomaly alerts pertain to specific risk objects that are network devices or users that triggered the associated anomaly. Threat objects are entities used by the risk object that include the specific activity of the risk object that triggered the anomaly. Once identified, threat objects are linked to the risk objects that they respectively pertain to. The link between a risk object and a threat object is generated via searchable metadata. Through linking, relationships are built between threat objects and risk objects. Links are between a number (N) risk objects and a number (M) of threat objects. The relationships are surfaced to a user based on satisfaction of predetermined thresholds. Examples of display to the user may include generation of a threat report, anomaly alerts, or graphical presentations depicting the links in the relationship(s). Where alerts are limited (via searches or reports) to relationships between threat objects and risk objects that are of a predetermined character, the excessive amount of data is reduced to a manageable number of notices.
-
-
-