Anomaly detection in enterprise threat detection

    公开(公告)号:US11093608B2

    公开(公告)日:2021-08-17

    申请号:US16780259

    申请日:2020-02-03

    Applicant: SAP SE

    Abstract: A selection of data types is defined from available log data for an evaluation of events associated with an entity. One or more evaluations associated with the entity are defined and reference data is generated from the selection of data types based on the one or more defined evaluations. The one or more evaluations are grouped into a pattern. A three dimensional (3D) score diversity diagram visualization is initialized for display in a graphical user interface, where a point representing the entity in the visualization is localized in 3D space at a coordinate based on two-dimensional (2D) coordinates in a 2D coordinate system of a centroid of the calculated area of a polygon placed to into the 2D coordinate system and defined by the values of each evaluation associated with the entity.

    ANOMALY DETECTION IN ENTERPRISE THREAT DETECTION

    公开(公告)号:US20200175159A1

    公开(公告)日:2020-06-04

    申请号:US16780259

    申请日:2020-02-03

    Applicant: SAP SE

    Abstract: A selection of data types is defined from available log data for an evaluation of events associated with an entity. One or more evaluations associated with the entity are defined and reference data is generated from the selection of data types based on the one or more defined evaluations. The one or more evaluations are grouped into a pattern. A three dimensional (3D) score diversity diagram visualization is initialized for display in a graphical user interface, where a point representing the entity in the visualization is localized in 3D space at a coordinate based on two-dimensional (2D) coordinates in a 2D coordinate system of a centroid of the calculated area of a polygon placed to into the 2D coordinate system and defined by the values of each evaluation associated with the entity.

    SYSTEM AND USER CONTEXT IN ENTERPRISE THREAT DETECTION

    公开(公告)号:US20220006828A1

    公开(公告)日:2022-01-06

    申请号:US17479850

    申请日:2021-09-20

    Applicant: SAP SE

    Abstract: A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system.

    SYSTEM AND USER CONTEXT IN ENTERPRISE THREAT DETECTION

    公开(公告)号:US20190007442A1

    公开(公告)日:2019-01-03

    申请号:US16125256

    申请日:2018-09-07

    Applicant: SAP SE

    Abstract: A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system.

    System and user context in enterprise threat detection

    公开(公告)号:US11252168B2

    公开(公告)日:2022-02-15

    申请号:US16125256

    申请日:2018-09-07

    Applicant: SAP SE

    Abstract: A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system.

Patent Agency Ranking