Advanced persistent threat detection by an information technology and security operations application

    公开(公告)号:US11902306B1

    公开(公告)日:2024-02-13

    申请号:US16863911

    申请日:2020-04-30

    Applicant: Splunk Inc.

    Inventor: Sourabh Satish

    CPC classification number: H04L63/1425 H04L63/1441 H04L2463/121

    Abstract: Techniques are described for enabling an IT and security operations application to detect and remediate advanced persistent threats (APTs). The detection of APTs involves the execution of search queries to search event data that initially was associated with lower-severity activity or that otherwise did not initially rise to the level of actionable event data in the application. The execution of such search queries may thus generally be configured to search non-real-time event data, e.g., event data that outside of a current window of days or a week and instead searches and aggregates event data spanning time periods of many weeks, months, or years. Due the nature of APTs, analyses of historical event data spanning such relatively long periods of time may in the aggregate uncover the types of persistent activity associated with APTs that would otherwise go undetected based only on searches of more current, real-time event data.

    Securely managing authentication information for automated incident responses

    公开(公告)号:US11586722B2

    公开(公告)日:2023-02-21

    申请号:US17106001

    申请日:2020-11-27

    Applicant: Splunk Inc.

    Abstract: Described herein are improvements for responding to incidents in an information technology (IT) environment. In one example, a method includes, in an incident response system, receiving authentication information for use by a first component for responding to an incident in an information technology (IT) environment. The method further includes encrypting the authentication information and storing the authentication information in the incident response system along with encrypted parameters for operating the first component. In the incident response system, upon determining that the first component requires the authentication information for an interaction, the method provides retrieving the authentication information and providing the authentication information to the first component.

    Aggregate notable events in an information technology and security operations application

    公开(公告)号:US11516069B1

    公开(公告)日:2022-11-29

    申请号:US17086232

    申请日:2020-10-30

    Applicant: Splunk Inc.

    Abstract: Techniques are described for an IT and security operations application to automatically generate aggregate (or “bulk,” “group,” or “composite”) notable events by identifying notable events sharing common characteristics and aggregating the related notable events into a single aggregate notable event entity that can be displayed and operated upon. The IT and security operations application identifies related notable events based on notable events generated by a common correlation search, notable events having common event attributes, based on user-specified relatedness criteria, or other such criteria. Once identified, in some embodiments, the IT and security operations application displays, in notable event lists and other interfaces, a singular aggregate notable event to users representing each of the identified related notable events.

    Automated determination of decision step logic in a course of action for information technology incident response

    公开(公告)号:US11501184B1

    公开(公告)日:2022-11-15

    申请号:US16119322

    申请日:2018-08-31

    Applicant: Splunk Inc.

    Abstract: Described herein are improvements for generating courses of action for an information technology (IT) environment. In one example, a method includes determining that a decision step occurs between a one step and two or more other steps of a first course of action associated with an incident type in the information technology environment. The method further includes determining possible outputs of the one step that, when used as input to the decision step, cause the first course of action to proceed from the decision step to respective steps of the two or more other steps. The method also includes incorporating logic into the decision step to direct the course of action to respective steps of the two or more other steps based on one or more of the possible outputs.

Patent Agency Ranking