Behavior analytics system for determining the cybersecurity risk associated with first-time, user-to-entity access alerts

    公开(公告)号:US10887325B1

    公开(公告)日:2021-01-05

    申请号:US15894703

    申请日:2018-02-12

    申请人: Exabeam, Inc.

    IPC分类号: H04L29/06 G06N20/00

    摘要: The present disclosure describes a system, method, and computer program for determining the cybersecurity risk associated with a first-time access event in a computer network. In response to receiving an alert that a user has accessed a network entity for the first time, a user behavior analytics system uses a factorization machine to determine the affinity between the accessing user and the accessed entity. The affinity measure is based on the accessing user's historical access patterns in the network, as wells as context data for both the accessing user and the accessed entity. The affinity score for an access event may be used to filter first-time access alerts or weight first-time access alerts in performing a risk assessment of the accessing user's network activity. The result is that many false-positive first-time access alerts are suppressed and not factored (or not factored heavily) into cybersecurity risk assessments.

    Graph-based multi-staged attack detection in the context of an attack framework

    公开(公告)号:US12063226B1

    公开(公告)日:2024-08-13

    申请号:US17484348

    申请日:2021-09-24

    申请人: Exabeam, Inc.

    摘要: The present disclosure relates to a system, method, and computer program for graph-based multi-stage attack detection in which alerts are displayed in the context of tactics in an attack framework, such as the MITRE ATT&CK framework. The method enables the detection of cybersecurity threats that span multiple users and sessions and provides for the display of threat information in the context of a framework of attack tactics. Alerts spanning an analysis window are grouped into tactic blocks. Each tactic block is associated with an attack tactic and a time window. A graph is created of the tactic blocks, and threat scenarios are identified from independent clusters of directionally connected tactic blocks in the graph. The threat information is presented in the context of a sequence of attack tactics in the attack framework.

    Anomaly detection based on processes executed within a network

    公开(公告)号:US11423143B1

    公开(公告)日:2022-08-23

    申请号:US16228071

    申请日:2018-12-20

    申请人: Exabeam, Inc.

    摘要: A cybersecurity system, method, and computer program is provided for detecting whether an entity's collection of processes during an interval is abnormal compared to the historical collection of processes observed for the entity during previous intervals of the same length. Logs from a training period are used to calculate global and local risk probabilities for each process based on the process's execution history during the training period. Risk probabilities may be computed using a Bayesian framework. For each entity in a network, an entity risk score is calculated by summing the applicable risk probabilities of the unique processes executed by the entity during an interval. An entity's historical risk scores form a score distribution. If an entity's current score is an outlier on the historical score distribution, an alert of potentially malicious behavior is generated with respect to the entity. Additional post-processing may be performed to reduce false positives.

    SYSTEM, METHOD, AND COMPUTER PROGRAM FOR DETECTION OF ANOMALOUS USER NETWORK ACTIVITY BASED ON MULTIPLE DATA SOURCES

    公开(公告)号:US20200228557A1

    公开(公告)日:2020-07-16

    申请号:US16828629

    申请日:2020-03-24

    申请人: Exabeam, Inc.

    摘要: The present disclosure relates a system, method, and computer program for detecting anomalous user network activity based on multiple data sources. The system extracts user event data for n days from multiple data sources to create a baseline behavior model that reflects the user's daily volume and type of IT events. In creating the model, the system addresses data heterogeneity in multi-source logs by categorizing raw events into meta events. Thus, baseline behavior model captures the user's daily meta-event pattern and volume of IT meta events over n days. The model is created using a dimension reduction technique. The system detects any anomalous pattern and volume changes in a user's IT behavior on day n by comparing user meta-event activity on day n to the baseline behavior model. A score normalization scheme allows identification of a global threshold to flag current anomalous activity in the user population.

    Detecting unmanaged and unauthorized assets in an information technology network with a recurrent neural network that identifies anomalously-named assets

    公开(公告)号:US11431741B1

    公开(公告)日:2022-08-30

    申请号:US16410181

    申请日:2019-05-13

    申请人: Exabeam, Inc.

    IPC分类号: H04L9/40 G06N3/08

    摘要: The present disclosure describes a system, method, and computer program for detecting unmanaged and unauthorized assets on an IT network by identifying anomalously-named assets. A recurrent neural network (RNN) is trained to identify patterns in asset names in a network. The RNN learns the character distribution patterns of the names of all observed assets in the training data, effectively capturing the hidden naming structures followed by a majority of assets on the network. The RNN is then used to identify assets with names that deviate from the hidden naming structures. Specifically, the RNN is used to measure the reconstruction errors of input asset name strings. Asset names with high reconstruction errors are anomalous since they cannot be explained by learned naming structures. After filtering for attributes or circumstances that mitigate risk, such assets are associated with a higher cybersecurity risk.

    SYSTEM, METHOD, AND COMPUTER PROGRAM FOR AUTOMATICALLY CLASSIFYING USER ACCOUNTS IN A COMPUTER NETWORK USING KEYS FROM AN IDENTITY MANAGEMENT SYSTEM

    公开(公告)号:US20220006814A1

    公开(公告)日:2022-01-06

    申请号:US17478805

    申请日:2021-09-17

    申请人: Exabeam, Inc.

    IPC分类号: H04L29/06 G06N20/00

    摘要: The present disclosure describes a system, method, and computer program for automatically classifying user accounts within an entity's computer network, using machine-based-learning modeling and keys from an identity management system. A system uses supervised machine learning to create a statistical model that maps individual keys or sets of keys to a probability of being associated with a first type of user account (e.g., a service account). To classify an unclassified user account, the system identifies identity management keys associated with the unclassified user account. The system creates an N-dimensional vector from the keys (where N=the number of keys), and uses the vector and the statistical model to calculate a probability that the unclassified user account is the first type of user account. In response to the probability exceeding a first threshold, the system classifies the unclassified user account as the first type of user account.

    System, method, and computer program for detection of anomalous user network activity based on multiple data sources

    公开(公告)号:US10944777B2

    公开(公告)日:2021-03-09

    申请号:US16828629

    申请日:2020-03-24

    申请人: Exabeam, Inc.

    摘要: The present disclosure relates a system, method, and computer program for detecting anomalous user network activity based on multiple data sources. The system extracts user event data for n days from multiple data sources to create a baseline behavior model that reflects the user's daily volume and type of IT events. In creating the model, the system addresses data heterogeneity in multi-source logs by categorizing raw events into meta events. Thus, baseline behavior model captures the user's daily meta-event pattern and volume of IT meta events over n days. The model is created using a dimension reduction technique. The system detects any anomalous pattern and volume changes in a user's IT behavior on day n by comparing user meta-event activity on day n to the baseline behavior model. A score normalization scheme allows identification of a global threshold to flag current anomalous activity in the user population.

    System, method, and computer program for automatically classifying user accounts in a computer network using keys from an identity management system

    公开(公告)号:US12034732B2

    公开(公告)日:2024-07-09

    申请号:US17478805

    申请日:2021-09-17

    申请人: Exabeam, Inc.

    IPC分类号: G06N20/00 H04L9/40

    CPC分类号: H04L63/102 G06N20/00

    摘要: The present disclosure describes a system, method, and computer program for automatically classifying user accounts within an entity's computer network, using machine-based-learning modeling and keys from an identity management system. A system uses supervised machine learning to create a statistical model that maps individual keys or sets of keys to a probability of being associated with a first type of user account (e.g., a service account). To classify an unclassified user account, the system identifies identity management keys associated with the unclassified user account. The system creates an N-dimensional vector from the keys (where N=the number of keys), and uses the vector and the statistical model to calculate a probability that the unclassified user account is the first type of user account. In response to the probability exceeding a first threshold, the system classifies the unclassified user account as the first type of user account.

    Ranking cybersecurity alerts from multiple sources using machine learning

    公开(公告)号:US11956253B1

    公开(公告)日:2024-04-09

    申请号:US17239426

    申请日:2021-04-23

    申请人: Exabeam, Inc.

    IPC分类号: H04L9/40 G06N5/04 G06N20/00

    摘要: The present disclosure relates to a machine-learning system, method, and computer program for ranking security alerts from multiple sources. The system self-learns risk levels associated with alerts by calculating risk probabilities for the alerts based on characteristics of the alerts and historical alert data. In response to receiving a security alert from one of a plurality of alert-generation sources, the alert-ranking system evaluates the security alert with respect to a plurality of feature indicators. The system creates a feature vector for the security alert based on the feature indicator values identified for the alert. The system then calculates a probability that the security alert relates to a cybersecurity risk in the computer network based on the created feature vector and historical alert data in the network. The system ranks alerts from a plurality of different sources based on the calculated cybersecurity risk probabilities.