Patents by Inventor Robin Lynn Burkett

Robin Lynn Burkett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11522882
    Abstract: Implementations are directed to methods for detecting and identifying advanced persistent threats (APTs) in networks, including receiving first domain activity data from a first network domain and second domain activity data from a second network domain, including multiple alerts from the respective first and second network domains and where each alert of the multiple alerts results from one or more detected events in the respective first or second network domains. A classification determined for each alert of the multiple alerts with respect to a cyber kill chain. A dependency is then determined for each of one or more pairs of alerts and a graphical visualization of the multiple alerts is generated, where the graphical visualization includes multiple nodes and edges between the nodes, each node corresponding to the cyber kill chain and representing at least one alert, and each edge representing a dependency between alerts.
    Type: Grant
    Filed: October 19, 2020
    Date of Patent: December 6, 2022
    Assignee: Accenture Global Solutions Limited
    Inventors: Amin Hassanzadeh, Azzedine Benameur, Robin Lynn Burkett, Apoorv Krishak, Chien An Chen, Nahid Farhady Ghalaty
  • Patent number: 11323460
    Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: May 3, 2022
    Assignee: Accenture Global Solutions Limited
    Inventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
  • Patent number: 11212306
    Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: December 28, 2021
    Assignee: Accenture Global Solutions Limited
    Inventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
  • Publication number: 20210037029
    Abstract: Implementations are directed to methods for detecting and identifying advanced persistent threats (APTs) in networks, including receiving first domain activity data from a first network domain and second domain activity data from a second network domain, including multiple alerts from the respective first and second network domains and where each alert of the multiple alerts results from one or more detected events in the respective first or second network domains. A classification determined for each alert of the multiple alerts with respect to a cyber kill chain. A dependency is then determined for each of one or more pairs of alerts and a graphical visualization of the multiple alerts is generated, where the graphical visualization includes multiple nodes and edges between the nodes, each node corresponding to the cyber kill chain and representing at least one alert, and each edge representing a dependency between alerts.
    Type: Application
    Filed: October 19, 2020
    Publication date: February 4, 2021
    Inventors: Amin Hassanzadeh, Azzedine Benameur, Robin Lynn Burkett, Apoorv Krishak, Chien An Chen, Nahid Farhady Ghalaty
  • Patent number: 10812499
    Abstract: Implementations are directed to methods for detecting and identifying advanced persistent threats (APTs) in networks, including receiving first domain activity data from a first network domain and second domain activity data from a second network domain, including multiple alerts from the respective first and second network domains and where each alert of the multiple alerts results from one or more detected events in the respective first or second network domains. A classification determined for each alert of the multiple alerts with respect to a cyber kill chain. A dependency is then determined for each of one or more pairs of alerts and a graphical visualization of the multiple alerts is generated, where the graphical visualization includes multiple nodes and edges between the nodes, each node corresponding to the cyber kill chain and representing at least one alert, and each edge representing a dependency between alerts.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: October 20, 2020
    Assignee: Accenture Global Solutions Limited
    Inventors: Amin Hassanzadeh, Azzedine Benameur, Robin Lynn Burkett, Apoorv Krishak, Chien An Chen, Nahid Farhady Ghalaty
  • Publication number: 20200145441
    Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
    Type: Application
    Filed: December 23, 2019
    Publication date: May 7, 2020
    Inventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
  • Publication number: 20200076836
    Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
    Type: Application
    Filed: October 30, 2019
    Publication date: March 5, 2020
    Inventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
  • Patent number: 10530796
    Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: January 7, 2020
    Assignee: Accenture Global Solutions Limited
    Inventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
  • Patent number: 10476896
    Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
    Type: Grant
    Filed: September 13, 2016
    Date of Patent: November 12, 2019
    Assignee: Accenture Global Solutions Limited
    Inventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
  • Publication number: 20190141058
    Abstract: Implementations are directed to methods for detecting and identifying advanced persistent threats (APTs) in networks, including receiving first domain activity data from a first network domain and second domain activity data from a second network domain, including multiple alerts from the respective first and second network domains and where each alert of the multiple alerts results from one or more detected events in the respective first or second network domains. A classification determined for each alert of the multiple alerts with respect to a cyber kill chain. A dependency is then determined for each of one or more pairs of alerts and a graphical visualization of the multiple alerts is generated, where the graphical visualization includes multiple nodes and edges between the nodes, each node corresponding to the cyber kill chain and representing at least one alert, and each edge representing a dependency between alerts.
    Type: Application
    Filed: November 9, 2017
    Publication date: May 9, 2019
    Inventors: Amin Hassanzadeh, Azzedine Benameur, Robin Lynn Burkett, Apoorv Krishak, Chien An Chen, Nahid Farhady Ghalaty
  • Publication number: 20180077175
    Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
    Type: Application
    Filed: September 13, 2016
    Publication date: March 15, 2018
    Inventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
  • Publication number: 20180069885
    Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
    Type: Application
    Filed: September 6, 2017
    Publication date: March 8, 2018
    Inventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
  • Patent number: 9886582
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining threat data contextualization.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: February 6, 2018
    Assignee: Accenture Global Sevices Limited
    Inventors: Elvis Hovor, David William Rozmiarek, Robin Lynn Burkett, Matthew Carver, Mohamed H. El-Sharkawi
  • Publication number: 20170061132
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining threat data contextualization.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Elvis Hovor, David William Rozmiarek, Robin Lynn Burkett, Matthew Carver, Mohamed H. El-Sharkawi