Patents by Inventor Stephen Dodson
Stephen Dodson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11783046Abstract: Anomaly detection in computing environments is disclosed herein. An example method includes receiving an unstructured input stream of data instances from the computing environment, the unstructured input stream being time stamped; categorizing the data instances of the unstructured input stream of data instances, the data instances comprising at least one principle value and a set of categorical attributes determined through machine learning; generating anomaly scores for each of the data instances collected over a period of time; and detecting a change in the categorical attribute that is indicative of an anomaly.Type: GrantFiled: December 27, 2017Date of Patent: October 10, 2023Assignee: Elasticsearch B.V.Inventors: Stephen Dodson, Thomas Veasey, David Mark Roberts
-
Patent number: 11657309Abstract: The field of the disclosure relates generally to a method and system for analyzing behavior of a computer infrastructure and the displaying the behavior of the computer infrastructure in a graphical manner. The system comprises an analytical engine connected to agents running on devices in the computer infrastructure and analyzing continuous data and asynchronous data.Type: GrantFiled: May 28, 2019Date of Patent: May 23, 2023Assignee: Elasticsearch B.V.Inventor: Stephen Dodson
-
Patent number: 11621969Abstract: Clustering and outlier detection in anomaly and causation detection for computing environments is disclosed. An example method includes receiving an input stream having data instances, each of the data instances having multi-dimensional attribute sets, identifying any of outliers and singularities in the data instances, extracting the outliers and singularities, grouping two or more of the data instances into one or more groups based on correspondence between the multi-dimensional attribute sets and a clustering type, and displaying the grouped data instances that are not extracted in a plurality of clustering maps on an interactive graphical user interface, wherein each of the plurality of clustering maps is based on a unique clustering type.Type: GrantFiled: December 28, 2017Date of Patent: April 4, 2023Assignee: ELASTICSEARCH B.V.Inventors: Stephen Dodson, Thomas Veasey
-
Publication number: 20220327409Abstract: Real time detection of cyber threats using behavioral analytics is disclosed. An example method includes obtaining, in real time, attributes for an entity within a population of entities, the attributes being indicative of entity behavior; building an entity probability model using the attributes and associated values collected over a period of time; and establishing a control portion of the entity probability model associated with a portion of the period of time. The example method includes comparing any of the entity attribute values and the entity probability model for other portions of the period of time to the control portion to identify one or more anomalous differences, and executing a remediation action based thereon. Some embodiments include determining a set comprising the anomalous differences and additional anomalous differences for the entity or the entity's peer group, and calculating the set's overall probability to determine if the entity is malicious.Type: ApplicationFiled: June 23, 2022Publication date: October 13, 2022Inventors: Stephen Dodson, Thomas Veasey
-
Patent number: 11423478Abstract: A system and method for detecting fraudulent activity in the execution of transactions is disclosed. The system comprises a monitoring device for reviewing data relating to execution of transactions, a transaction profile and an alert module. The transaction profile includes a plurality of historic data items relating to typical transactions, which can be compared with current execution of transactions to generate an alert by the alert module if unusual activity is determined.Type: GrantFiled: January 13, 2017Date of Patent: August 23, 2022Assignee: Elasticsearch B.V.Inventor: Stephen Dodson
-
Patent number: 11386343Abstract: Real time detection of cyber threats using behavioral analytics is disclosed. An example method includes obtaining, in real time, attributes for an entity within a population of entities, the attributes being indicative of entity behavior; building an entity probability model using the attributes and associated values collected over a period of time; and establishing a control portion of the entity probability model associated with a portion of the period of time. The example method includes comparing any of the entity attribute values and the entity probability model for other portions of the period of time to the control portion to identify one or more anomalous differences, and executing a remediation action based thereon. Some embodiments include determining a set comprising the anomalous differences and additional anomalous differences for the entity or the entity's peer group, and calculating the set's overall probability to determine if the entity is malicious.Type: GrantFiled: May 9, 2017Date of Patent: July 12, 2022Assignee: Elasticsearch B.V.Inventors: Stephen Dodson, Thomas Veasey
-
Publication number: 20210248230Abstract: A system and method for the detection of irregularities, such as fraud or malware, running on a device, is disclosed. An example method includes receiving new ones of data items indicative of the device's current operation; determining whether the new ones of data items deviate from the device's typical operation by comparing the new ones of data items to a profile relating to the typical operation of the device, wherein the deviating includes either using an infrequently used one of incoming ports and outgoing ports or continually accessing a new website. The example method can further include based on the determining: updating the device baseline profile to create an updated device baseline profile with the new ones of data items if the new ones of data items do not deviate from the typical operation of the device; and generating an alert if the new ones of data items do deviate from the typical operation of the device.Type: ApplicationFiled: April 30, 2021Publication date: August 12, 2021Inventor: Stephen Dodson
-
Patent number: 11068588Abstract: A system and method for the detection of irregularities, such as fraud or malware, running on a device, is disclosed. An example method includes receiving new ones of data items indicative of the device's current operation; determining whether the new ones of data items deviate from the device's typical operation by comparing the new ones of data items to a profile relating to the typical operation of the device, wherein the deviating includes either using an infrequently used one of incoming ports and outgoing ports or continually accessing a new website. The example method can further include based on the determining: updating the device baseline profile to create an updated device baseline profile with the new ones of data items if the new ones of data items do not deviate from the typical operation of the device; and generating an alert if the new ones of data items do deviate from the typical operation of the device.Type: GrantFiled: January 31, 2020Date of Patent: July 20, 2021Assignee: Elasticsearch B.V.Inventor: Stephen Dodson
-
Publication number: 20210200782Abstract: Creating and performing transforms for indexed data on a continuous basis. An example method includes receiving from a user a selection of a source index, the source index comprising data including a collection of documents; receiving from the user a selection of one or more fields; creating a transform of the source index based at least on the selected one or more fields; and updating the transform based at least on the selected one or more fields on a continuous basis in response to new data being ingested into the source index. The example method further includes performing the transform, comprising automatically causing display of a visual representation of the transformed source index on a computer device of the user; and automatically storing the transformed source index to a destination index. Transforms can be used to pivot a user's indexed data into a new entity-centric index.Type: ApplicationFiled: December 30, 2019Publication date: July 1, 2021Inventors: Stephen Dodson, Hendrik Muhs
-
Publication number: 20210194910Abstract: Anomaly and causation detection in computing environments are disclosed. An example method includes receiving an input stream of data instances for a time series, each of the data instances being time stamped and including at least one principle value and a set of categorical attributes; generating anomaly scores for each of the data instances over time intervals; detecting a change in the anomaly scores over the time intervals for the data instances; and identifying which of the set of categorical attributes of the data instances caused the change in the anomaly scores using a counterfactual analysis. The counterfactual analysis may comprise removing a portion of the data instances; regenerating the anomaly scores for each of the remaining data instances over the time intervals; and if the anomaly scores are improved, identifying the portion as a cause of anomalous activity. Recommendations to remediate the cause may be generated.Type: ApplicationFiled: March 4, 2021Publication date: June 24, 2021Inventors: Stephen Dodson, Thomas Veasey
-
Patent number: 11017330Abstract: A method and system for analysing data is disclosed. One or more data records are passed to a data analysis system. The data records comprised a plurality of data items and a first one of the data items is selected from the data items in the data record. A statistical model can be retrieved from a store in a computer system and the statistical model used to detect abnormal results from the selected data item and produce a data model. This statistical model is stored with the data record in the data base.Type: GrantFiled: May 20, 2015Date of Patent: May 25, 2021Assignee: Elasticsearch B.V.Inventor: Stephen Dodson
-
Patent number: 10986110Abstract: Anomaly and causation detection in computing environments are disclosed. An example method includes receiving an input stream of data instances for a time series, each of the data instances being time stamped and including at least one principle value and a set of categorical attributes; generating anomaly scores for each of the data instances over continuous time intervals; detecting a change in the anomaly scores over the continuous time intervals for the data instances; and identifying which of the set of categorical attributes of the data instances caused the change in the anomaly scores using a counterfactual analysis. The counterfactual analysis may comprise removing a portion of the data instances; regenerating the anomaly scores for each of the remaining data instances over the continuous time intervals; and if the anomaly scores are improved, identifying the portion as a cause of anomalous activity. Recommendations to remediate the cause may be generated.Type: GrantFiled: April 26, 2017Date of Patent: April 20, 2021Assignee: Elasticsearch B.V.Inventors: Stephen Dodson, Thomas Veasey
-
Publication number: 20200167468Abstract: A system and method for the detection of irregularities, such as fraud or malware, running on a device, is disclosed. An example method includes receiving new ones of data items indicative of the device's current operation; determining whether the new ones of data items deviate from the device's typical operation by comparing the new ones of data items to a profile relating to the typical operation of the device, wherein the deviating includes either using an infrequently used one of incoming ports and outgoing ports or continually accessing a new website. The example method can further include based on the determining: updating the device baseline profile to create an updated device baseline profile with the new ones of data items if the new ones of data items do not deviate from the typical operation of the device; and generating an alert if the new ones of data items do deviate from the typical operation of the device.Type: ApplicationFiled: January 31, 2020Publication date: May 28, 2020Inventor: Stephen Dodson
-
Patent number: 10558799Abstract: A system and method for the detection of irregularities, such as fraud or malware, running on a device, is disclosed. The system comprises a monitoring program for reviewing data relating to operation of the device, a device profile including data items relating to typical operation of the device generated from messages relating to the device; and an alert module for generating an alert on detection of unusual activity relating to the device.Type: GrantFiled: August 4, 2017Date of Patent: February 11, 2020Assignee: Elasticsearch B.V.Inventor: Stephen Dodson
-
Publication number: 20190279098Abstract: The field of the disclosure relates generally to a method and system for analyzing behavior of a computer infrastructure and the displaying the behavior of the computer infrastructure in a graphical manner. The system comprises an analytical engine connected to agents running on devices in the computer infrastructure and analyzing continuous data and asynchronous data.Type: ApplicationFiled: May 28, 2019Publication date: September 12, 2019Inventor: Stephen Dodson
-
Patent number: 10346744Abstract: The field of the disclosure relates generally to a method and system for analyzing behavior of a computer infrastructure and the displaying the behavior of the computer infrastructure in a graphical manner. The system comprises an analytical engine connected to agents running on devices in the computer infrastructure and analyzing continuous data and asynchronous data.Type: GrantFiled: March 26, 2013Date of Patent: July 9, 2019Assignee: Elasticsearch B.V.Inventor: Stephen Dodson
-
Publication number: 20190197413Abstract: Forecasting resource allocation is disclosed. An example method includes receiving operating data from a resource; applying periodicity tests to the received operating data using a plurality of sketches of time series of prior operating data, the periodicity tests generating periodic components; applying regression models to the received operating data, the regression models collectively generating a trend component, each regression model being applied over a different time scale of a plurality of time scales; computing a trend model using the periodic components and a trend component; determining a random process describing the historical evolution of the trend model; and calculating and providing a mean prediction, an upper bound, and a lower bound for resource utilization at a future time using the trend model and a predicted distribution.Type: ApplicationFiled: December 27, 2017Publication date: June 27, 2019Inventors: Thomas Veasey, Stephen Dodson
-
Publication number: 20180330257Abstract: Real time detection of cyber threats using behavioral analytics is disclosed. An example method includes obtaining, in real time, attributes for an entity within a population of entities, the attributes being indicative of entity behavior; building an entity probability model using the attributes and associated values collected over a period of time; and establishing a control portion of the entity probability model associated with a portion of the period of time. The example method includes comparing any of the entity attribute values and the entity probability model for other portions of the period of time to the control portion to identify one or more anomalous differences, and executing a remediation action based thereon. Some embodiments include determining a set comprising the anomalous differences and additional anomalous differences for the entity or the entity's peer group, and calculating the set's overall probability to determine if the entity is malicious.Type: ApplicationFiled: May 9, 2017Publication date: November 15, 2018Inventors: Stephen Dodson, Thomas Veasey
-
Publication number: 20180314965Abstract: Anomaly and causation detection in computing environments are disclosed. An example method includes receiving an input stream of data instances for a time series, each of the data instances being time stamped and including at least one principle value and a set of categorical attributes; generating anomaly scores for each of the data instances over continuous time intervals; detecting a change in the anomaly scores over the continuous time intervals for the data instances; and identifying which of the set of categorical attributes of the data instances caused the change in the anomaly scores using a counterfactual analysis. The counterfactual analysis may comprise removing a portion of the data instances; regenerating the anomaly scores for each of the remaining data instances over the continuous time intervals; and if the anomaly scores are improved, identifying the portion as a cause of anomalous activity. Recommendations to remediate the cause may be generated.Type: ApplicationFiled: April 26, 2017Publication date: November 1, 2018Inventors: Stephen Dodson, Thomas Veasey
-
Publication number: 20180314835Abstract: Anomaly detection in computing environments is disclosed herein. An example method includes receiving an unstructured input stream of data instances from the computing environment, the unstructured input stream being time stamped; categorizing the data instances of the unstructured input stream of data instances, the data instances comprising at least one principle value and a set of categorical attributes determined through machine learning; generating anomaly scores for each of the data instances collected over a period of time; and detecting a change in the categorical attribute that is indicative of an anomaly.Type: ApplicationFiled: December 27, 2017Publication date: November 1, 2018Inventors: Stephen Dodson, Thomas Veasey, David Mark Roberts