CPC H04L 63/04 (2013.01) [G06F 21/566 (2013.01); G06F 21/577 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01); H04L 63/205 (2013.01); H04L 67/306 (2013.01); G06F 2221/034 (2013.01)] | 20 Claims |
1. A computer-implementable method for performing a security analytics mapping operation, comprising:
receiving a plurality of electronically-observable actions of a first entity, the plurality of electronically-observable actions of the first entity corresponding to a respective first plurality of events enacted by the first entity;
receiving a plurality of electronically-observable actions of a second entity, the plurality of electronically-observable actions of the second entity corresponding to a respective second plurality of events enacted by the second entity;
determining, via a distributed security analytics environment, whether a first event of the respective first plurality of events and a second event of the respective second plurality of events comprise an entity interaction between the first entity and the second entity;
generating, via the distributed security analytics environment, an entity interaction map, the entity interaction map providing a representation of the entity interaction between the first entity and the second entity; and,
performing, via the distributed security analytics environment, a security analytics operation, the security analytics operation using the entity interaction map to identify enactment of entity behaviors by the first entity and second entity, the enactment of the entity behaviors by the first entity and the second entity transcending an enactment of an entity behavior by a single entity, the security analytics operation resulting in a security risk assessment for the enactment of the entity behaviors by the first entity and the second entity.
|