Security action verification in a computing network

    公开(公告)号:US12074901B1

    公开(公告)日:2024-08-27

    申请号:US18177620

    申请日:2023-03-02

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide for validating security actions before they are implemented in a computing network. In one example, a computing network may include a plurality of computing assets that provide a variety of different operations. During the operations of the network, administration systems may generate and provide security actions to prevent or mitigate the effect of a security threat on the network. However, prior to implementing the security actions within the network, computing assets may exchange security parameters with the administration systems to verify that the security actions are authentic.

    Analysis and mitigation of network security risks

    公开(公告)号:US11949702B1

    公开(公告)日:2024-04-02

    申请号:US18052030

    申请日:2022-11-02

    Applicant: Splunk Inc.

    CPC classification number: H04L63/1425 H04L65/61

    Abstract: A method comprises acquiring anomaly data including a plurality of anomalies detected from streaming data, wherein each of the anomalies relates to an entity on or associated with a computer network. The method determines a risk score of each of the anomalies, and adjusts the risk score of an anomaly according to a set of factors. The method further determines, for each of a plurality of sliding time windows of different lengths, an entity score of the entity in relation to the sliding time window, based on an aggregation of risk scores of all anomalies related to the entity that were detected within the sliding time window, where the entity score corresponds to a risk level associated with the entity. An action to prevent the entity from performing an operation can be determined and caused to occur based on the entity score.

    Automatic assignment of incidents in an information technology (IT) and security operations application

    公开(公告)号:US11916929B1

    公开(公告)日:2024-02-27

    申请号:US16657966

    申请日:2019-10-18

    Applicant: Splunk Inc.

    CPC classification number: H04L63/1416

    Abstract: An information technology (IT) and security operations application enables the automatic assignment of incident events to analysts based on a variety of characteristics of the incident events to be assigned, the analysts and analyst teams, and other considerations. An IT and security operations application can perform the automatic assignment of incident events based at least in part on data indicating each analyst's knowledge of certain types of incidents, data indicating each analyst's efficiency at responding to certain types of incidents, and the like, where such data is automatically created and maintained by the application. In this manner, incident events can be efficiently assigned to analysts upon their receipt by the system without the need for a security team to constantly perform a cumbersome incident event assignment process based on a limited set of data, thereby improving analyst teams' ability to efficiently ensure the operation and security of IT environments for which the teams are responsible.

    Reusable sets of instructions for responding to incidents in information technology environments

    公开(公告)号:US11734008B1

    公开(公告)日:2023-08-22

    申请号:US17506440

    申请日:2021-10-20

    Applicant: Splunk Inc.

    CPC classification number: G06F9/3017

    Abstract: Examples described herein relate to customization of courses of action for responding to incidents in information technology (IT) environments. An incident management service executes incident response monitoring, identification and remediation across an IT environment for one or more entities that may have their own configuration of computing assets (computing environment) within the IT environment. A course of action outlines remediation actions for responding to specific types of incidents within an IT environment. A course of action is customized for implementation within a particular computing environment associated with an entity. Customization of a course of action comprises generation and implementation of sets of instructions that are usable to tailor remedial actions for execution in computing environments of different entities. A set of instructions provides commands/calls that are specific to computing assets associated with an entity, which are usable to execute remedial actions for a specific type of incident.

    Cybersecurity risk analysis and mitigation

    公开(公告)号:US11552974B1

    公开(公告)日:2023-01-10

    申请号:US17086146

    申请日:2020-10-30

    Applicant: Splunk Inc.

    Abstract: A method comprises acquiring anomaly data including a plurality of anomalies detected from streaming data, wherein each of the anomalies relates to an entity on or associated with a computer network. The method determines a risk score of each of the anomalies, and adjusts the risk score of an anomaly according to a set of factors. The method further determines, for each of a plurality of sliding time windows of different lengths, an entity score of the entity in relation to the sliding time window, based on an aggregation of risk scores of all anomalies related to the entity that were detected within the sliding time window, where the entity score corresponds to a risk level associated with the entity. An action to prevent the entity from performing an operation can be determined and caused to occur based on the entity score.

Patent Agency Ranking