Computer-implemented method for determining computer system security threats, security operations center system and computer program product

A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system, the method including the steps of: (i) for a plurality of user accounts, assigning a risk level to each account; (ii) in a time interval, fo...

Full description

Saved in:
Bibliographic Details
Main Authors Scheidler, Balazs, Illes, Marton
Format Patent
LanguageEnglish
Published 09.06.2020
Subjects
Online AccessGet full text

Cover

Loading…
Abstract A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system, the method including the steps of: (i) for a plurality of user accounts, assigning a risk level to each account; (ii) in a time interval, for a plurality of events, wherein each event is linked to a respective user account, assigning an event score relating to deviation from normal behavior of each event with respect to the respective user account; (iii) in the time interval, for the plurality of events, calculating an event importance which is a function of the respective event score and the respective user account risk level; (iv) prioritizing the plurality of events by event importance, and (v) providing a record of the plurality of events, prioritized by event importance.
AbstractList A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system, the method including the steps of: (i) for a plurality of user accounts, assigning a risk level to each account; (ii) in a time interval, for a plurality of events, wherein each event is linked to a respective user account, assigning an event score relating to deviation from normal behavior of each event with respect to the respective user account; (iii) in the time interval, for the plurality of events, calculating an event importance which is a function of the respective event score and the respective user account risk level; (iv) prioritizing the plurality of events by event importance, and (v) providing a record of the plurality of events, prioritized by event importance.
Author Scheidler, Balazs
Illes, Marton
Author_xml – fullname: Scheidler, Balazs
– fullname: Illes, Marton
BookMark eNqNjLsKwkAQRbfQwtc_jL0BHyDWBsVercOyO0kWsjvL7KTIP_jRJhBMa3G5cB9nqWaBAi7UJycfW0HOnI8NegyCFjxKTRZKYrDYl94FFyow4xZSlwQ9JDQtO-lAakYtaTclFJG1OAoJzMD8fXSwEycyVaz94LY1slbzUjcJN6Ov1PZ-e-WPDCMVmKLuUSjF-3nYny-99tfj6Z_NFyMOUc8
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
ExternalDocumentID US10681060B2
GroupedDBID EVB
ID FETCH-epo_espacenet_US10681060B23
IEDL.DBID EVB
IngestDate Fri Jul 19 14:31:14 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_US10681060B23
Notes Application Number: US201515571934
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200609&DB=EPODOC&CC=US&NR=10681060B2
ParticipantIDs epo_espacenet_US10681060B2
PublicationCentury 2000
PublicationDate 20200609
PublicationDateYYYYMMDD 2020-06-09
PublicationDate_xml – month: 06
  year: 2020
  text: 20200609
  day: 09
PublicationDecade 2020
PublicationYear 2020
RelatedCompanies BALABIT S.A
RelatedCompanies_xml – name: BALABIT S.A
Score 3.276312
Snippet A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system,...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
Title Computer-implemented method for determining computer system security threats, security operations center system and computer program product
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200609&DB=EPODOC&locale=&CC=US&NR=10681060B2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_G_HzTqej8IIL0yWK0aV0ehrB2Ywj7wG2yt7E0KU6wHbbiP-Ef7SXLrC_6VLg2B0l6ud8lv9wBXDUQozYSqjAsCWKXcem5nDLm3s49XyhGRRLrDf1eP-hO2OPUn1bgdX0XxuQJ_TTJEdGiYrT3wqzXy3ITKzLcyvxGLFCUPXTGzcix0bGOjyl3olazPRxEg9AJw-Zk5PSfEOvqxFsBbeFyvYEw-l7Tv9rPLX0rZfnbpXT2YHOI2tJiHyoqrcFOuK68VoPtnj3wrsGWYWjGOQqtFeYH8LUuxeAu3iz9W0myqgVNEIQSaTku6JZIbL8lq5zNJLcF60jxovFifl1KsqVa_Q850ZzNss08laUey-jST50r9hAuO-1x2HWxg7Of0ZxNRuVYeEdQTbNUHQMJEhFwKSXCK8kaknPfj5ngMRW-vKNecgL1v_XU_3t5Crt6Zgy_ip9BtXj_UOfoyQtxYabgGyTDp88
link.rule.ids 230,309,783,888,25578,76884
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bS8MwFD6MeZlvOhWdtwjSJ4vRpqV5GMLajam74TbZ27BJihPshq34J_zRnnSZ9UWfCqftgSY9OV-SL98BuPARo_oxVTgt8YTNuHRsThmzr58dN1KMRrHQC_rdntces_uJOynB6-osTK4T-pmLI2JECYz3LB-vF8UiVphzK9OraIam-W1rVA8tMzvW82PKrbBRbw76YT-wgqA-Hlq9R8S6WnjLow0crtcQYvtaZ7_51NCnUha_U0prG9YH6C3JdqCkkipUglXltSpsds2GdxU2coamSNFoojDdha9VKQZ79mbo30qSZS1ogiCUSMNxwbREhHmWLDWbSWoK1pHsRePF9LKwzBdq-T-kRHM2i3eeE1n4MYwufdVasXtw3mqOgraNHzj9ac3peFi0hbMP5WSeqAMgXhx5XEqJ8EoyX3LuuoJFXNDIlTfUiQ-h9ref2n83z6DSHnU7085d7-EItnQv5Vwrfgzl7P1DnWBWz6LTvDu-AS0zqr8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Computer-implemented+method+for+determining+computer+system+security+threats%2C+security+operations+center+system+and+computer+program+product&rft.inventor=Scheidler%2C+Balazs&rft.inventor=Illes%2C+Marton&rft.date=2020-06-09&rft.externalDBID=B2&rft.externalDocID=US10681060B2