Advanced persistent threat detection by an information technology and security operations application

    公开(公告)号:US11902306B1

    公开(公告)日:2024-02-13

    申请号:US16863911

    申请日:2020-04-30

    Applicant: Splunk Inc.

    Inventor: Sourabh Satish

    CPC classification number: H04L63/1425 H04L63/1441 H04L2463/121

    Abstract: Techniques are described for enabling an IT and security operations application to detect and remediate advanced persistent threats (APTs). The detection of APTs involves the execution of search queries to search event data that initially was associated with lower-severity activity or that otherwise did not initially rise to the level of actionable event data in the application. The execution of such search queries may thus generally be configured to search non-real-time event data, e.g., event data that outside of a current window of days or a week and instead searches and aggregates event data spanning time periods of many weeks, months, or years. Due the nature of APTs, analyses of historical event data spanning such relatively long periods of time may in the aggregate uncover the types of persistent activity associated with APTs that would otherwise go undetected based only on searches of more current, real-time event data.

    Identifying an indexing node to process data using a resource catalog

    公开(公告)号:US11892996B1

    公开(公告)日:2024-02-06

    申请号:US16513365

    申请日:2019-07-16

    Applicant: Splunk Inc.

    Abstract: Systems and methods are described for monitoring indexing nodes, populating and maintaining a resource catalog with relevant information, receiving requests for indexing node availability or assignments, identifying indexing nodes that are available to process data, and/or communicating information relating to available indexing nodes. The system can maintain the resource catalog based on communications with each of the containerized indexing nodes. The system can receive, from a partition manager of a data intake and query system, a request for a containerized indexing node that the partition manager can assign to process data received by the partition manager. The system can identify an available containerized indexing node to process the data. The system can communicate, to the partition manager, an indexing node identifier associated with the available containerized indexing node.

    Combined real-time and batch threat detection

    公开(公告)号:US11876821B1

    公开(公告)日:2024-01-16

    申请号:US18167040

    申请日:2023-02-09

    Applicant: Splunk Inc.

    Abstract: First event data, indicative of a first activity on a computer network and second event data indicative of a second activity on the computer network, is received. A first machine learning anomaly detection model is applied to the first event data, by a real-time analysis engine operated by the threat indicator detection system in real time, to detect first anomaly data. A second machine learning anomaly detection model is applied to the first anomaly data and the second event data, by a batch analysis engine operated by the threat indicator detection system in a batch mode, to detect second anomaly data. A third anomaly is detected using an anomaly detection rule. The threat indictor system processes the first anomaly data, the second anomaly data, and the third anomaly data using a threat indicator model to identify a threat indicator associated with a potential security threat to the computer network.

Patent Agency Ranking