US 11,899,790 B2
Cross-network security evaluation
Christopher Ahlberg, Watertown, MA (US); Bill Ladd, Watertown, MA (US); Sanil Chohan, Stivichall (GB); Adrian Tirados Mata, Medford, MA (US); Michael Tran, Cambridge, MA (US); and Staffan Truvé, Alingsås (SE)
Assigned to Recorded Future, Inc., Somerville, MA (US)
Filed by Recorded Future, Inc., Somerville, MA (US)
Filed on Dec. 22, 2022, as Appl. No. 18/087,686.
Application 18/087,686 is a division of application No. 16/823,282, filed on Mar. 18, 2020, granted, now 11,625,482.
Claims priority of provisional application 62/819,906, filed on Mar. 18, 2019.
Prior Publication US 2023/0281307 A1, Sep. 7, 2023
Int. Cl. G06F 21/56 (2013.01); G06F 21/55 (2013.01)
CPC G06F 21/56 (2013.01) [G06F 21/552 (2013.01); G06F 2221/034 (2013.01)] 12 Claims
OG exemplary drawing
 
1. A computer security monitoring method, including:
acquiring and storing data relating to interactions with malware controllers over a public network,
acquiring and storing a map of relationships between networks connected to the public network,
extracting risk data from the stored data relating to interactions with the malware controllers and the stored map of relationships by cross-referencing the acquired interaction data against the map of relationships,
issuing security alerts based on the extracted risk data, and
issuing reports that each include a plurality of visual elements that visually summarize the relationships and the interactions with malware controllers that lead to the issuing of security alerts, wherein the visual elements are responsive to user actuation and wherein user action of actuating of the visual elements causes the user to explore the relationships and the interactions with malware controllers that lead to the issuing of security alerts, wherein the presenting visual elements further presents the visual elements as including series of textual links that visually summarize additional information about the relationships and the interactions with malware controllers that lead to the issuing of security alerts, and wherein actuating of the textual links causes the user to explore the additional information about the relationships and the interactions with malware controllers that lead to the issuing of security alerts.