PERFORMING RULE-BASED ACTIONS FOR NEWLY OBSERVED DOMAIN NAMES

    公开(公告)号:US20200177624A1

    公开(公告)日:2020-06-04

    申请号:US16779544

    申请日:2020-01-31

    Applicant: Splunk Inc.

    Abstract: Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

    DETECTION OF POTENTIAL SECURITY THREATS IN MACHINE DATA BASED ON PATTERN DETECTION

    公开(公告)号:US20200169579A1

    公开(公告)日:2020-05-28

    申请号:US16777544

    申请日:2020-01-30

    Applicant: SPLUNK INC.

    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.

    Detection of Potential Security Threats Based on Categorical Patterns
    24.
    发明申请
    Detection of Potential Security Threats Based on Categorical Patterns 审中-公开
    基于分类模式检测潜在的安全威胁

    公开(公告)号:US20170048265A1

    公开(公告)日:2017-02-16

    申请号:US15339955

    申请日:2016-11-01

    Applicant: Splunk Inc.

    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.

    Abstract translation: 为表征计算通信或对象的一组事件中的每个事件确定度量值。 例如,度量值可以包括事件中的URL或代理字符串的长度。 生成子集标准,使得子集内的度量值与群体的中心(例如,分布尾部)相对分开。 将标准应用于度量值产生一个子集。 该子集的表示呈现在交互式仪表板中。 该表示可以包括子集中的唯一值和相应事件发生的计数。 客户端可以选择表示中的特定元素,以便相对于子集中的特定值对应的各个事件来呈现更多的细节。 因此,客户可以使用他们的知识系统操作和遵守价值频率和基础事件来识别异常度量值和潜在的安全威胁。

    Security threat detection using domain name registrations
    25.
    发明授权
    Security threat detection using domain name registrations 有权
    使用域名注册进行安全威胁检测

    公开(公告)号:US09432396B2

    公开(公告)日:2016-08-30

    申请号:US14815972

    申请日:2015-08-01

    Applicant: Splunk Inc.

    Abstract: Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

    Abstract translation: 确定一组中每个计算事件的域名,每个事件详细说明网页的请求或帖子。 确定在一段时间内与每个域名相关联的一些事件或访问。 进一步查询注册商以确定何时注册域名。 生成一个对象,其中包括访问计数的表示和每个域名注册后的年龄。 客户端可以与对象进行交互,以探索与高访问次数和最近注册相关联的域名的表示。 一旦确定给定的域名是可疑的,就可以生成一个规则来阻止对域名的访问。

    Detection of potential security threats in machine data based on pattern detection

    公开(公告)号:US11134094B2

    公开(公告)日:2021-09-28

    申请号:US16777544

    申请日:2020-01-30

    Applicant: SPLUNK INC.

    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.

    Performing rule-based actions for newly observed domain names

    公开(公告)号:US11108807B2

    公开(公告)日:2021-08-31

    申请号:US16779544

    申请日:2020-01-31

    Applicant: Splunk Inc.

    Abstract: Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

    Performing rule-based actions for domain names accessed by particular parties

    公开(公告)号:US10567423B2

    公开(公告)日:2020-02-18

    申请号:US16051408

    申请日:2018-07-31

    Applicant: Splunk Inc.

    Abstract: Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

    SECURITY THREAT DETECTION USING ACCESS PATTERNS AND DOMAIN NAME REGISTRATIONS
    29.
    发明申请
    SECURITY THREAT DETECTION USING ACCESS PATTERNS AND DOMAIN NAME REGISTRATIONS 有权
    使用访问模式和域名注册进行安全威胁检测

    公开(公告)号:US20170034206A1

    公开(公告)日:2017-02-02

    申请号:US15224652

    申请日:2016-07-31

    Applicant: Splunk Inc.

    Abstract: Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

    Abstract translation: 确定一组中每个计算事件的域名,每个事件详细说明网页的请求或帖子。 确定在一段时间内与每个域名相关联的一些事件或访问。 进一步查询注册商以确定何时注册域名。 生成一个对象,其中包含访问计数的表示和每个域名注册后的年龄。 客户端可以与对象进行交互,以探索与高访问次数和最近注册相关联的域名的表示。 一旦确定给定的域名是可疑的,就可以生成一个规则来阻止对域名的访问。

    Analyzing a group of values extracted from events of machine data relative to a population statistic for those values
    30.
    发明授权
    Analyzing a group of values extracted from events of machine data relative to a population statistic for those values 有权
    分析从机器数据事件中提取的一组相对于这些值的人口统计量的值

    公开(公告)号:US09516046B2

    公开(公告)日:2016-12-06

    申请号:US14929321

    申请日:2015-10-31

    Applicant: Splunk Inc.

    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.

    Abstract translation: 为表征计算通信或对象的一组事件中的每个事件确定度量值。 例如,度量值可以包括事件中的URL或代理字符串的长度。 生成子集标准,使得子集内的度量值与群体的中心(例如,分布尾部)相对分开。 将标准应用于度量值产生一个子集。 该子集的表示呈现在交互式仪表板中。 该表示可以包括子集中的唯一值和相应事件发生的计数。 客户端可以选择表示中的特定元素,以便相对于子集中的特定值对应的各个事件来呈现更多的细节。 因此,客户可以使用他们的知识系统操作和遵守价值频率和基础事件来识别异常度量值和潜在的安全威胁。

Patent Agency Ranking