Computer-implemented method for determining computer system security threats, security operations center system and computer program product
A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system, the method including the steps of: (i) for a plurality of user accounts, assigning a risk level to each account; (ii) in a time interval, fo...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
09.06.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system, the method including the steps of: (i) for a plurality of user accounts, assigning a risk level to each account; (ii) in a time interval, for a plurality of events, wherein each event is linked to a respective user account, assigning an event score relating to deviation from normal behavior of each event with respect to the respective user account; (iii) in the time interval, for the plurality of events, calculating an event importance which is a function of the respective event score and the respective user account risk level; (iv) prioritizing the plurality of events by event importance, and (v) providing a record of the plurality of events, prioritized by event importance. |
---|---|
AbstractList | A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system, the method including the steps of: (i) for a plurality of user accounts, assigning a risk level to each account; (ii) in a time interval, for a plurality of events, wherein each event is linked to a respective user account, assigning an event score relating to deviation from normal behavior of each event with respect to the respective user account; (iii) in the time interval, for the plurality of events, calculating an event importance which is a function of the respective event score and the respective user account risk level; (iv) prioritizing the plurality of events by event importance, and (v) providing a record of the plurality of events, prioritized by event importance. |
Author | Scheidler, Balazs Illes, Marton |
Author_xml | – fullname: Scheidler, Balazs – fullname: Illes, Marton |
BookMark | eNqNjLsKwkAQRbfQwtc_jL0BHyDWBsVercOyO0kWsjvL7KTIP_jRJhBMa3G5cB9nqWaBAi7UJycfW0HOnI8NegyCFjxKTRZKYrDYl94FFyow4xZSlwQ9JDQtO-lAakYtaTclFJG1OAoJzMD8fXSwEycyVaz94LY1slbzUjcJN6Ov1PZ-e-WPDCMVmKLuUSjF-3nYny-99tfj6Z_NFyMOUc8 |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
ExternalDocumentID | US10681060B2 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_US10681060B23 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 14:31:14 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_US10681060B23 |
Notes | Application Number: US201515571934 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200609&DB=EPODOC&CC=US&NR=10681060B2 |
ParticipantIDs | epo_espacenet_US10681060B2 |
PublicationCentury | 2000 |
PublicationDate | 20200609 |
PublicationDateYYYYMMDD | 2020-06-09 |
PublicationDate_xml | – month: 06 year: 2020 text: 20200609 day: 09 |
PublicationDecade | 2020 |
PublicationYear | 2020 |
RelatedCompanies | BALABIT S.A |
RelatedCompanies_xml | – name: BALABIT S.A |
Score | 3.276312 |
Snippet | A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system,... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
Title | Computer-implemented method for determining computer system security threats, security operations center system and computer program product |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200609&DB=EPODOC&locale=&CC=US&NR=10681060B2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_G_HzTqej8IIL0yWK0aV0ehrB2Ywj7wG2yt7E0KU6wHbbiP-Ef7SXLrC_6VLg2B0l6ud8lv9wBXDUQozYSqjAsCWKXcem5nDLm3s49XyhGRRLrDf1eP-hO2OPUn1bgdX0XxuQJ_TTJEdGiYrT3wqzXy3ITKzLcyvxGLFCUPXTGzcix0bGOjyl3olazPRxEg9AJw-Zk5PSfEOvqxFsBbeFyvYEw-l7Tv9rPLX0rZfnbpXT2YHOI2tJiHyoqrcFOuK68VoPtnj3wrsGWYWjGOQqtFeYH8LUuxeAu3iz9W0myqgVNEIQSaTku6JZIbL8lq5zNJLcF60jxovFifl1KsqVa_Q850ZzNss08laUey-jST50r9hAuO-1x2HWxg7Of0ZxNRuVYeEdQTbNUHQMJEhFwKSXCK8kaknPfj5ngMRW-vKNecgL1v_XU_3t5Crt6Zgy_ip9BtXj_UOfoyQtxYabgGyTDp88 |
link.rule.ids | 230,309,783,888,25578,76884 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bS8MwFD6MeZlvOhWdtwjSJ4vRpqV5GMLajam74TbZ27BJihPshq34J_zRnnSZ9UWfCqftgSY9OV-SL98BuPARo_oxVTgt8YTNuHRsThmzr58dN1KMRrHQC_rdntces_uJOynB6-osTK4T-pmLI2JECYz3LB-vF8UiVphzK9OraIam-W1rVA8tMzvW82PKrbBRbw76YT-wgqA-Hlq9R8S6WnjLow0crtcQYvtaZ7_51NCnUha_U0prG9YH6C3JdqCkkipUglXltSpsds2GdxU2coamSNFoojDdha9VKQZ79mbo30qSZS1ogiCUSMNxwbREhHmWLDWbSWoK1pHsRePF9LKwzBdq-T-kRHM2i3eeE1n4MYwufdVasXtw3mqOgraNHzj9ac3peFi0hbMP5WSeqAMgXhx5XEqJ8EoyX3LuuoJFXNDIlTfUiQ-h9ref2n83z6DSHnU7085d7-EItnQv5Vwrfgzl7P1DnWBWz6LTvDu-AS0zqr8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Computer-implemented+method+for+determining+computer+system+security+threats%2C+security+operations+center+system+and+computer+program+product&rft.inventor=Scheidler%2C+Balazs&rft.inventor=Illes%2C+Marton&rft.date=2020-06-09&rft.externalDBID=B2&rft.externalDocID=US10681060B2 |