Method and system for detecting system outages using application event logs

    公开(公告)号:US10235228B1

    公开(公告)日:2019-03-19

    申请号:US15438049

    申请日:2017-02-21

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for detecting system outages using application event logs. Various aspects may include obtaining several prior application event logs where the status of the system is known at the time the application event logs were recorded. Additionally, various aspects may include determining characteristics of prior application event logs which were recorded during a system outage, and/or determining characteristics of prior application event logs which were recorded while the system was available. When current application event logs are obtained where the status of the system is unknown at the time the current application event logs are recorded, various aspects include comparing the current application event logs to the prior application event logs to determine that a system outage has occurred based upon the comparison.

    Method and system for detecting system outages using application event logs

    公开(公告)号:US09612897B1

    公开(公告)日:2017-04-04

    申请号:US14885021

    申请日:2015-10-16

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for detecting system outages using application event logs. Various aspects may include obtaining several application event logs where the status of the system is known at the time the application event logs were recorded. Additionally, various aspects may include determining characteristics of application event logs which were recorded during a system outage, and/or determining characteristics of application event logs which were recorded while the system was available. Based upon the characteristics, various aspects include training using various machine learning techniques. When current application event logs are obtained where the status of the system is unknown at the time the current application event logs are recorded, various aspects include using the training data to determine a likelihood that a system outage has occurred based upon the obtained current application event logs.

    Method and system for detecting system outages using application event logs

    公开(公告)号:US11372699B1

    公开(公告)日:2022-06-28

    申请号:US16902954

    申请日:2020-06-16

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for detecting system outages using application event logs. Various aspects may include obtaining several prior application event logs where the status of the system is known at the time the application event logs were recorded. Additionally, various aspects may include determining characteristics of prior application event logs which were recorded during a system outage, and/or determining characteristics of prior application event logs which were recorded while the system was available. When current application event logs are obtained where the status of the system is unknown at the time the current application event logs are recorded, various aspects include comparing the current application event logs to the prior application event logs to determine that a system outage has occurred based upon the comparison.

    Method and system for identifying security risks using graph analysis

    公开(公告)号:US11044255B1

    公开(公告)日:2021-06-22

    申请号:US16375040

    申请日:2019-04-04

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure data files in an organizational network. Various aspects may include presenting the identified users on a display for a system administrator and/or security analyst to resolve. For example, the display may include a graph data structure with users represented as nodes and connections between users represented as edges. Each connection may be a pair of users belonging to the same security group. Nodes of the graph data structure may be clustered to indicate that each of the users in the cluster belong to the same security group. Moreover, the users who are connected to multiple clusters may be identified as a potential risk of having unauthorized access to secure data files. The authorized access may then be remedied or taken away.

    Method and system for identifying security risks using graph analysis

    公开(公告)号:US10320802B1

    公开(公告)日:2019-06-11

    申请号:US15834626

    申请日:2017-12-07

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure data files in an organizational network. Various aspects may include presenting the identified users on a display for a system administrator and/or security analyst to resolve. For example, the display may include a graph data structure with users represented as nodes and connections between users represented as edges. Each connection may be a pair of users belonging to the same security group. Nodes of the graph data structure may be clustered to indicate that each of the users in the cluster belong to the same security group. Moreover, the users who are connected to multiple clusters may be identified as a potential risk of having unauthorized access to secure data files. The authorized access may then be remedied or taken away.

    Method and system for identifying security risks using graph analysis

    公开(公告)号:US09876801B1

    公开(公告)日:2018-01-23

    申请号:US15611026

    申请日:2017-06-01

    CPC classification number: H04L63/104

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure data files in an organizational network. Various aspects may include presenting the identified users on a display for a system administrator and/or security analyst to resolve. For example, the display may include a graph data structure with users represented as nodes and connections between users represented as edges. Each connection may be a pair of users belonging to a same security group. Nodes of the graph data structure may be clustered according to a clustering coefficient. Moreover, the graph data structure display may be organized and color coded in such a manner, that a system administrator and/or security analyst may quickly and easily view the users who are most likely to have unauthorized access to secure data files. The authorized access may then be remedied or taken away.

    Method and system for identifying security risks using graph analysis

    公开(公告)号:US09819685B1

    公开(公告)日:2017-11-14

    申请号:US14603728

    申请日:2015-01-23

    CPC classification number: H04L63/104

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure data files in an organizational network. Various aspects may include presenting the identified users on a display for a system administrator and/or security analyst to resolve. For example, the display may include a graph data structure with users represented as nodes and connections between users represented as edges. Each connection may be a pair of users belonging to a same security group. The graph data structure display may be organized and color coded in such a manner, that a system administrator and/or security analyst may quickly and easily view the users who are most likely to have unauthorized access to secure data files. The authorized access may then be remedied or taken away.

Patent Agency Ranking