Graph-based network security threat detection across time and entities

    公开(公告)号:US10205735B2

    公开(公告)日:2019-02-12

    申请号:US15419959

    申请日:2017-01-30

    Applicant: Splunk Inc.

    Abstract: The disclosed techniques relate to a graph-based network security analytic framework to combine multiple sources of information and security knowledge in order to detect risky behaviors and potential threats. In some examples, the input can be anomaly events or simply regular events. The entities associated with the activities can be grouped into smaller time units, e.g., per day. The riskiest days of activity can be found by computing a risk score for each day and according to the features in the day. A graph can be built with links between the time units. The links can also receive scoring based on a number of factors. The resulting graph can be compared with known security knowledge for adjustments. Threats can be detected based on the adjusted risk score for a component (i.e., a group of linked entities) as well as a number of other factors.

    Event selector to generate alternate views

    公开(公告)号:US10185740B2

    公开(公告)日:2019-01-22

    申请号:US15011284

    申请日:2016-01-29

    Applicant: SPLUNK, INC.

    Abstract: An event view selector for a search user interface is described. In one or more implementations, a service may operate to collect and store data as events and apply a late binding schema to extract events that match the search criteria and provide search results for display via the search user interface. The search user interface exposes an event view selector operable to enable transitions between multiple different views of the events associated with different levels of detail. The views may include at least a raw view, a list view, and a table view. Responsive to receiving an indication of a view selected via the event view selector, the selected view may be exposed via the search user interface.

    CELL-BASED TABLE MANIPULATION OF EVENT DATA
    387.
    发明申请

    公开(公告)号:US20190012304A1

    公开(公告)日:2019-01-10

    申请号:US16042989

    申请日:2018-07-23

    Applicant: Splunk Inc.

    Abstract: A search interface is displayed in a table format that includes one or more columns, each column including data items of an event attribute, the data items being of a set of events, and a plurality of rows forming cells with the one or more columns, each cell including one or more of the data items of the event attribute of a corresponding column. Based on a user selecting one or more of the cells, a list of options if displayed corresponding to the selection, and one or more commands are added to a search query that corresponds to the set of events, the one or more commands being based on at least an option that is selected from the list of options and the event attribute for each of the one or more of the data items of each of the selected one or more cells.

    Central repository for storing configuration files of a distributed computer system

    公开(公告)号:US10178152B2

    公开(公告)日:2019-01-08

    申请号:US15143472

    申请日:2016-04-29

    Applicant: Splunk Inc.

    Abstract: In a computer-implemented method for configuring a distributed computer system comprising a plurality of nodes of a plurality of node classes, configuration files for a plurality of nodes of each of the plurality of node classes are stored in a central repository. The configuration files include information representing a desired system state of the distributed computer system, and the distributed computer system operates to keep an actual system state of the distributed computer system consistent with the desired system state. The plurality of node classes includes forwarder nodes for receiving data from an input source, indexer nodes for indexing the data, and search head nodes for searching the data. Responsive to receiving changes to the configuration files, the changes are propagated to nodes of the plurality of nodes impacted by the changes based on a node class of the nodes impacted by the changes.

    INCIDENT RESPONSE AUTOMATION ENGINE
    389.
    发明申请

    公开(公告)号:US20190007448A1

    公开(公告)日:2019-01-03

    申请号:US16107972

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

Patent Agency Ranking