WO2013032911A1 - Multidimension clusters for data partitioning - Google Patents
Multidimension clusters for data partitioning Download PDFInfo
- Publication number
- WO2013032911A1 WO2013032911A1 PCT/US2012/052289 US2012052289W WO2013032911A1 WO 2013032911 A1 WO2013032911 A1 WO 2013032911A1 US 2012052289 W US2012052289 W US 2012052289W WO 2013032911 A1 WO2013032911 A1 WO 2013032911A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- event
- data
- cluster
- query
- data storage
- Prior art date
Links
- 238000000638 solvent extraction Methods 0.000 title claims abstract description 42
- 238000013500 data storage Methods 0.000 claims abstract description 46
- 238000004513 sizing Methods 0.000 claims abstract description 17
- 238000005192 partition Methods 0.000 claims abstract description 15
- 238000012545 processing Methods 0.000 claims description 15
- 238000007726 management method Methods 0.000 claims description 14
- 238000000034 method Methods 0.000 description 23
- 230000008569 process Effects 0.000 description 9
- 230000000694 effects Effects 0.000 description 8
- 238000001514 detection method Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 101100264195 Caenorhabditis elegans app-1 gene Proteins 0.000 description 3
- 230000002155 anti-virotic effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000013481 data capture Methods 0.000 description 1
- 238000004374 forensic analysis Methods 0.000 description 1
- 238000013467 fragmentation Methods 0.000 description 1
- 238000006062 fragmentation reaction Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/906—Clustering; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
- G06F16/278—Data partitioning, e.g. horizontal or vertical partitioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/283—Multi-dimensional databases or data warehouses, e.g. MOLAP or ROLAP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Definitions
- Database partitioning is commonly performed to create smaller pieces of the database for manageability or performance. Partitioning may include putting different rows of a database in different tables or creating tables with a fewer number of columns.
- partitioning is static and requires the partitions to be configured before use. Also, the database administrator needs to manage partitions over time, such as adding or dropping partitions depending on the data being stored in the database.
- Figure 1 illustrates a data storage system
- Figure 2 illustrates a security information and event management system.
- Figures 3 and 4 illustrate methods.
- Figure 5 illustrates a computer system that may be used for the methods and systems described herein.
- a data storage system performs multidimensional partitioning.
- the data storage system dynamically partitions data into multiple dimensions.
- the partitioning is performed across the multiple dimensions simultaneously.
- the data storage system may store event data, which is described below.
- the event data includes time attributes comprised of Manager Receipt Time (MRT) and Event End Time (ET).
- MRT is when the event is received by the storage system and ET is when the event happened.
- ET is when the event happened.
- MRT is set according to the time of the system receiving the events and ET is set, for example, according to the source device that detected the event.
- the data storage system may perform partitioning across ET and MRT simultaneously for received event data.
- the partitioning may include a dynamic partitioning process. The size of the partitions can be varied allowing the partitioning to be dynamic.
- the size of the partitions can include a fine granularity.
- clusters may be created for multiple time-based attributes of the event data, such as ET and MRT.
- the size of the clusters may be set to 5 minutes, 30 minutes or other time periods less than one hour. This optimizes query performance for queries that are trying to identify events falling within a small time window.
- Event data includes any data related to an activity performed on a computer device or in a computer network.
- the event data may be correlated and analyzed to identify security threats. Even data may be analyzed to determine if it is associated with a security threat.
- the activity may be associated with a user, also referred to as an actor, to identify the security threat and the cause of the security threat. Activities may include logins, logouts, sending data over a network, sending emails, accessing applications, reading or writing data, etc.
- a security threat may include activities determined to be indicative of suspicious or inappropriate behavior, which may be performed over a network or on systems connected to a network.
- a common security threat is a user or code attempting to gain unauthorized access to confidential information, such as social security numbers, credit card numbers, etc., over a network.
- the data sources for the events may include network devices, applications or other types of data sources described below operable to provide event data that may be used to identify network security threats.
- Event data is data describing events. Event data may be captured in logs or messages generated by the data sources. For example, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), vulnerability assessment tools, firewalls, antivirus tools, anti-spam tools, and encryption tools may generate logs describing activities performed by the source. Event data may be provided, for example, by entries in a log file or a syslog server, alerts, alarms, network packets, emails, or notification pages.
- Event data can include information about the device or application that generated the event.
- the event source is a network endpoint identifier (e.g., an IP address or Media Access Control (MAC) address) and/or a description of the source, possibly including information about the product's vendor and version.
- the time attributes, source information and other information is used to correlate events with a user and analyze events for security threats.
- the data storage system performs two-phase query execution.
- the first phase is a fussy search that narrows down where the possible hits are.
- metadata for each cluster is used to identify clusters that may store data for the query.
- the second phase is filtering, using fast scan technology to filter and find the matching events.
- Figure 1 illustrates a data storage system 100 comprising a partitioning module 122 and query manager 124.
- the partitioning module 122 performs multidimensional data partitioning of data, which may be event data, received from data sources 101.
- the data sources 101 may comprise a network device, an application or other type of system that can provide data for storage in the data storage system 100.
- a dimension for the multidimensional data partitioning may be an attribute for the data.
- the data storage 111 stores the partitioned data as clusters.
- the data storage 111 may include memory for performing in-memory processing and/or non-volatile storage, such as hard disks.
- the query manager 124 may receive queries 104 and execute the queries on the data stored in the data storage 111 to provide query results 105.
- the query manager 124 may use metadata for the clusters to identify clusters storing data relevant to a query.
- the query manager 124 may execute the search on the identified clusters.
- Query results 105 are results of query executions and may be presented to a user or to another module.
- the partitioning module 122 performs multidimensional data partitioning of data received from the data sources 101.
- the data may be event data, and the event data may include time attributes comprised of Manager Receipt Time (MRT) and Event End Time (ET). Examples of dimensions include ET and MRT. MRT is when the event data is received by the data storage system 100 and ET is when the event happened.
- the data storage system may perform partitioning across ET and MRT simultaneously for received event data.
- the partitioning may include a dynamic partitioning process. The size of the partitions can be varied allowing the partitioning to be dynamic.
- FIG. 2 illustrates an environment 200 including security information and event management system (SIEM) 210, according to an embodiment.
- SIEM security information and event management system
- the SIEM 210 processes event data, which may include real-time event processing.
- the SIEM 210 may process the event data to determine network-related conditions, such as network security threats.
- the SIEM 210 is described as a security information and event management system by way of example.
- the system 210 is an information and event management system, and it may perform event data processing related to network security as an example. It is operable to perform event data processing for events not related to network security.
- the environment 200 includes the data sources 101 generating event data for events, which are collected by the SIEM 210 and stored in the data storage 111.
- the data storage 111 stores any data used by the SIEM 210 to correlate and analyze event data.
- the data sources 101 may include network devices, applications or other types of data sources operable to provide event data that may be analyzed.
- Event data may be captured in logs or messages generated by the data sources 101.
- IDSs intrusion detection systems
- IPSs intrusion prevention systems
- vulnerability assessment tools For example, firewalls, anti-virus tools, anti-spam tools, encryption tools, and business applications may generate logs describing activities performed by the data source.
- Event data is retrieved from the logs and stored in the data storage 111.
- Event data may be provided, for example, by entries in a log file or a syslog server, alerts, alarms, network packets, emails, or notification pages.
- the data sources 101 may send messages to the SIEM 210 including event data.
- Event data can include information about the source that generated the event and information describing the event.
- the event data may identify the event as a user login or a credit card transaction.
- Other information in the event data may include when the event was received from the event source ("receipt time").
- the receipt time may be a date/time stamp.
- the event data may describe the source, such as an event source is a network endpoint identifier (e.g., an IP address or Media Access Control (MAC) address) and/or a description of the source, possibly including information about the product's vendor and version.
- the data/time stamp, source information and other information may be columns in the event schema and may be used for correlation performed by the event processing engine 221.
- the event data may include metadata for the event, such as when it took place, where it took place, the user involved, etc.
- Examples of the data sources 101 are shown in figure 1 as Database (DB), UNIX, App1 and App2.
- DB and UNIX are systems that include network devices, such as servers, and generate event data.
- App1 and App2 are applications that generate event data.
- App1 and App2 may be business applications, such as financial applications for credit card and stock transactions, IT applications, human resource applications, or any other type of applications.
- data sources 101 may include security detection and proxy systems, access and policy controls, core service logs and log consolidators, network hardware, encryption devices, and physical security.
- security detection and proxy systems include IDSs, IPSs, multipurpose security appliances, vulnerability assessment and management, antivirus, honeypots, threat response technology, and network monitoring.
- access and policy control systems include access and identity management, virtual private networks (VPNs), caching engines, firewalls, and security policy management.
- core service logs and log consolidators include operating system logs, database audit logs, application logs, log consolidators, web server logs, and management consoles.
- network devices includes routers and switches.
- encryption devices include data security and integrity.
- Examples of physical security systems include card-key readers, biometrics, burglar alarms, and fire alarms.
- Other data sources may include data sources that are unrelated to network security.
- the connector 202 may include code comprised of machine readable instructions that provide event data from a data source to the SIEM 210.
- the connector 202 may provide efficient, real-time (or near real-time) local event data capture and filtering from one or more of the data sources 101.
- the connector 202 collects event data from event logs or messages. The collection of event data is shown as "EVENTS" describing event data from the data sources 101 that is sent to the SIEM 210. Connectors may not be used for all the data sources 101.
- the SIEM 210 collects and analyzes the event data. Events can be cross-correlated with rules to create meta-events. Correlation includes, for example, discovering the relationships between events, inferring the significance of those relationships (e.g., by generating metaevents), prioritizing the events and meta-events, and providing a framework for taking action.
- the SIEM 210 (one embodiment of which is manifest as machine readable instructions executed by computer hardware such as a processor) enables aggregation, correlation, detection, and investigative tracking of activities.
- the SIEM 210 also supports response management, ad-hoc query resolution, reporting and replay for forensic analysis, and graphical visualization of network threats and activity.
- the SIEM 210 may include modules that perform the functions described herein. Modules may include hardware and/or machine readable instructions. For example, the modules may include event processing engine 221 , partitioning module 122, user interface 223 and query manager 124.
- the event processing engine 221 processes events according to rules and instructions, which may be stored in the data storage 111.
- the event processing engine 221 for example, correlates events in accordance with rules, instructions and/or requests. For example, a rule indicates that multiple failed logins from the same user on different machines performed simultaneously or within a short period of time is to generate an alert to a system administrator. Another rule may indicate that two credit card transactions from the same user within the same hour, but from different countries or cities, is an indication of potential fraud.
- the event processing engine 221 may provide the time, location, and user correlations between multiple events when applying the rules.
- the user interface 223 may be used for communicating or displaying reports or notifications 220 about events and event processing to users.
- the user interface 223 may also be used to select the data that will be included in each chunk, which is described in further detail with respect to figure 2.
- a user may select a dimension and a size parameter.
- the size parameter is a distance in terms of a time period from a seed.
- the amount of data in a cluster may be smaller or larger.
- the user interface 223 may be used to select a distance from an ET or MRT which may control the amount of data in each cluster.
- Each cluster may be considered a partition.
- the user interface 223 may include a graphic user interface that may be web-based.
- the partitioning module 122 may perform partitioning across multiple dimensions simultaneously. For example, chunks may be determined for ET and MRT simultaneously for received event data.
- the partitioning may include a dynamic partitioning process. The size of the partitions can be varied allowing the partitioning to be dynamic.
- Figure 3 illustrates a method 300 for dynamic data partitioning according to an embodiment.
- the method 300 and other methods described herein are described with respect to the data storage system 100 shown in figure 1 by way of example and not limitation. The methods may be performed by other systems. Also, the methods are described with respect to event data but the methods may be used for any type of data.
- the method 300 may be performed by the partitioning module 122 shown in figure 1.
- event data for events is received.
- Event data may be received in batches from one or more of the data sources 101 or the event data may be stored and compiled into batches. The batches may be provided to the partitioning module 122 for determining clusters.
- the batched event data may include event data from multiple different data sources.
- the event data may include data from different network devices.
- multiple dimensions to be used for the partitioning are determined. A user may enter the dimensions. In one example, the dimensions are ET and MRT. In other examples, other dimensions may be selected. The selected dimensions may be dimensions that are for the same type of attribute. For example, ET and MRT are both time-based attributes.
- a sizing parameter is determined for each dimension.
- a user may enter and/or modify the sizing parameter, or the sizing parameter may be calculated by a system.
- the sizing parameter determines the size of a cluster.
- examples of sizing parameters may include 1 -minute, 5-minute, 30-minute, etc.
- the sizing parameter may be a distance from a seed. A larger distance results in a fewer number of clusters and bigger variance of aggregate ET. A smaller distance results in more clusters and a smaller variance.
- a function may calculate a reasonable distance that balances both factors to achieve better query performance and less storage fragmentation.
- an event seed is selected. Any event may be selected as an event seed. For example, events may be received in a batch from a data source. One of the events may be randomly selected as the seed.
- a cluster is determined for the received events based on the determined dimensions, sizing parameter for each dimension and the event seed. For example, the events in the received event data are split into clusters according to whether they fall into the distance from a seed. For example, if a seed has MRT and ET equal to 12:00 o'clock and a distance (e.g., sizing parameter) of 5 minutes for MRT and ET, then all events having an ET and MRT falling within the range of 12:00-12:05 are placed into the cluster. Similarly, other clusters may be created for other seeds.
- the ET and MRT for an event seed may be different. For example, there may be a delay from the time the event is detected and logged on a network device and the time the data storage system 100 receives the event data from the network device. Depending on the sizing parameter determined for each dimension, the events that have similar ET and MRT may be placed in the same cluster. Furthermore, in some instances, an event may not have an ET, but it may still be included in the cluster if its MRT is within the distance to the seed.
- the cluster is stored in the data storage 111. This may include storing metadata for the cluster which identifies the attributes for the cluster.
- the attributes may include the dimensions, sizing parameters, and event seed information which identifies the dimensions of the event seed, such as the event seed's ET and MRT.
- the method 300 may be repeated to determine multiple different clusters for each batch.
- Figure 4 illustrates a method 400 for running a query, according to an embodiment.
- the data storage system 100 receives a query of the queries 104.
- the query may be from a user or another system requesting data about events stored in the data storage 111.
- the data storage system 100 forwards the received query to the query manager 124 for processing.
- the query manager 124 identifies one or more of the stored clusters related to the query. For example, the query may identify a time range for ET or MRT that specifies the events to be retrieved. The query manager 124 compares ET and/or MRT data in the query to metadata for the clusters to identify all the clusters that may hold relevant events for the query.
- the query manager 124 executes the query on the identified clusters.
- Figure 5 shows a computer system 500 that may be used with the embodiments described herein including the data storage system 100.
- the computer system 500 represents a generic platform that includes components that may be in a server or another computer system.
- the computer system 500 may be used as a platform for the data storage system 100.
- the computer system 500 may execute, by a processor or other hardware processing circuit, the methods, functions and other processes described herein.
- These methods, functions and other processes may be embodied as machine readable instructions stored on computer readable medium, which may be non-transitory, such as hardware storage devices (e.g., RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), hard drives, and flash memory).
- RAM random access memory
- ROM read only memory
- EPROM erasable, programmable ROM
- EEPROM electrically erasable, programmable ROM
- hard drives e.g., hard drives, and flash memory
- the computer system 500 includes at least one processor 502 that may implement or execute machine readable instructions performing some or all of the methods, functions and other processes described herein. Commands and data from the processor 502 are communicated over a communication bus 504.
- the computer system 500 also includes a main memory 506, such as a random access memory (RAM), where the machine readable instructions and data for the processor 502 may reside during runtime, and a secondary data storage 508, which may be non-volatile and stores machine readable instructions and data.
- the partitioning module 122 and the query manager 124 may comprise machine readable instructions that reside in the memory 506 during runtime. Other components of the systems described herein may be embodied as machine readable instructions that are stored in the memory 506 during runtime.
- the memory and data storage are examples of non-volatile computer readable mediums.
- the secondary data storage 508 may store data used and machine readable instructions used by the systems.
- the computer system 500 may include an I/O device 510, such as a keyboard, a mouse, a display, etc.
- the computer system 500 may include a network interface 512 for connecting to a network.
- the data storage system 100 may be connected to the data sources 101 via a network and uses the network interface 512 to receive event data.
- Other known electronic components may be added or substituted in the computer system 500.
- the data storage system 100 may be implemented in a distributed computing environment, such as a cloud system.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computational Linguistics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A data storage system includes a partitioning module to partition data across multiple dimensions simultaneously. The partitioning may be based on a sizing parameter for each dimension. The partitioning module stores a cluster including the partitioned event data and metadata including attributes identifying the cluster.
Description
MULTIDIMENSION CLUSTERS FOR DATA PARTITIONING
CLAIM FOR PRIORITY
[0001] The present application claims priority to U.S. Provisional application number 61/527,933, filed on August 26, 2011 , which is incorporated by reference herein in its entirety.
BACKGROUND
[0002] Database partitioning is commonly performed to create smaller pieces of the database for manageability or performance. Partitioning may include putting different rows of a database in different tables or creating tables with a fewer number of columns.
[0003] For many databases available in today's market, partitioning is static and requires the partitions to be configured before use. Also, the database administrator needs to manage partitions over time, such as adding or dropping partitions depending on the data being stored in the database.
BRIEF DESCRIPTION OF DRAWINGS
[0004] The embodiments are described in detail in the following description with reference to the following figures. The figures illustrate examples of the embodiments.
[0005] Figure 1 illustrates a data storage system.
[0006] Figure 2 illustrates a security information and event management system.
[0007] Figures 3 and 4 illustrate methods.
[0008] Figure 5 illustrates a computer system that may be used for the methods and systems described herein.
DETAILED DESCRIPTION OF EMBODIMENTS
[0009] For simplicity and illustrative purposes, the principles of the embodiments are described by referring mainly to examples thereof. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the embodiments. It is apparent that the embodiments may be practiced without limitation to all the specific details. Also, the embodiments may be used together in various combinations.
[0010] According to an embodiment, a data storage system performs multidimensional partitioning. The data storage system dynamically partitions data into multiple dimensions. The partitioning is performed across the multiple dimensions simultaneously. The data storage system may store event data, which is described below. The event data includes time attributes comprised of Manager Receipt Time (MRT) and Event End Time (ET). MRT is when the event is received by the storage system and ET is when the event happened. Thus, MRT is set according to the time of the system receiving the events and ET is set, for example, according to the source device that detected the event. The data storage system may perform partitioning across ET and MRT simultaneously for received event data. The partitioning may include a dynamic partitioning process. The size of the partitions can be varied allowing the partitioning to be dynamic. Also, the size of the partitions can include a fine granularity. For example, clusters may be created for multiple time-based attributes of the event data, such as ET and MRT. The size of the clusters may be set to 5 minutes, 30 minutes or other time periods less than one hour. This optimizes query performance for queries that are trying to identify events falling within a small time window.
[0011] An example of the type of data stored in the data storage system is event data, however, any type of data may be stored in the data storage system. Event data includes any data related to an activity performed on a computer device or in a computer network. The event data may be correlated and analyzed to identify security threats. Even data may be analyzed to determine if it is
associated with a security threat. The activity may be associated with a user, also referred to as an actor, to identify the security threat and the cause of the security threat. Activities may include logins, logouts, sending data over a network, sending emails, accessing applications, reading or writing data, etc. A security threat may include activities determined to be indicative of suspicious or inappropriate behavior, which may be performed over a network or on systems connected to a network. A common security threat, by way of example, is a user or code attempting to gain unauthorized access to confidential information, such as social security numbers, credit card numbers, etc., over a network.
[0012] The data sources for the events may include network devices, applications or other types of data sources described below operable to provide event data that may be used to identify network security threats. Event data is data describing events. Event data may be captured in logs or messages generated by the data sources. For example, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), vulnerability assessment tools, firewalls, antivirus tools, anti-spam tools, and encryption tools may generate logs describing activities performed by the source. Event data may be provided, for example, by entries in a log file or a syslog server, alerts, alarms, network packets, emails, or notification pages.
[0013] Event data can include information about the device or application that generated the event. The event source is a network endpoint identifier (e.g., an IP address or Media Access Control (MAC) address) and/or a description of the source, possibly including information about the product's vendor and version. The time attributes, source information and other information is used to correlate events with a user and analyze events for security threats.
[0014] In one example, the data storage system performs two-phase query execution. The first phase is a fussy search that narrows down where the possible hits are. For example, metadata for each cluster is used to identify clusters that
may store data for the query. The second phase is filtering, using fast scan technology to filter and find the matching events.
[0015] Figure 1 illustrates a data storage system 100 comprising a partitioning module 122 and query manager 124. The partitioning module 122 performs multidimensional data partitioning of data, which may be event data, received from data sources 101. The data sources 101 may comprise a network device, an application or other type of system that can provide data for storage in the data storage system 100. A dimension for the multidimensional data partitioning may be an attribute for the data. The data storage 111 stores the partitioned data as clusters. The data storage 111 may include memory for performing in-memory processing and/or non-volatile storage, such as hard disks. The query manager 124 may receive queries 104 and execute the queries on the data stored in the data storage 111 to provide query results 105. The query manager 124 may use metadata for the clusters to identify clusters storing data relevant to a query. The query manager 124 may execute the search on the identified clusters. Query results 105 are results of query executions and may be presented to a user or to another module.
[0016] The partitioning module 122 performs multidimensional data partitioning of data received from the data sources 101. The data may be event data, and the event data may include time attributes comprised of Manager Receipt Time (MRT) and Event End Time (ET). Examples of dimensions include ET and MRT. MRT is when the event data is received by the data storage system 100 and ET is when the event happened. The data storage system may perform partitioning across ET and MRT simultaneously for received event data. The partitioning may include a dynamic partitioning process. The size of the partitions can be varied allowing the partitioning to be dynamic.
[0017] Figure 2 illustrates an environment 200 including security information and event management system (SIEM) 210, according to an embodiment. The SIEM 210 processes event data, which may include real-time event processing.
The SIEM 210 may process the event data to determine network-related conditions, such as network security threats. Also, the SIEM 210 is described as a security information and event management system by way of example. As indicated above, the system 210 is an information and event management system, and it may perform event data processing related to network security as an example. It is operable to perform event data processing for events not related to network security. The environment 200 includes the data sources 101 generating event data for events, which are collected by the SIEM 210 and stored in the data storage 111. The data storage 111 stores any data used by the SIEM 210 to correlate and analyze event data.
[0018] The data sources 101 may include network devices, applications or other types of data sources operable to provide event data that may be analyzed. Event data may be captured in logs or messages generated by the data sources 101. For example, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), vulnerability assessment tools, firewalls, anti-virus tools, anti-spam tools, encryption tools, and business applications may generate logs describing activities performed by the data source. Event data is retrieved from the logs and stored in the data storage 111. Event data may be provided, for example, by entries in a log file or a syslog server, alerts, alarms, network packets, emails, or notification pages. The data sources 101 may send messages to the SIEM 210 including event data.
[0019] Event data can include information about the source that generated the event and information describing the event. For example, the event data may identify the event as a user login or a credit card transaction. Other information in the event data may include when the event was received from the event source ("receipt time"). The receipt time may be a date/time stamp. The event data may describe the source, such as an event source is a network endpoint identifier (e.g., an IP address or Media Access Control (MAC) address) and/or a description of the source, possibly including information about the product's vendor and version. The
data/time stamp, source information and other information may be columns in the event schema and may be used for correlation performed by the event processing engine 221. The event data may include metadata for the event, such as when it took place, where it took place, the user involved, etc.
[0020] Examples of the data sources 101 are shown in figure 1 as Database (DB), UNIX, App1 and App2. DB and UNIX are systems that include network devices, such as servers, and generate event data. App1 and App2 are applications that generate event data. App1 and App2 may be business applications, such as financial applications for credit card and stock transactions, IT applications, human resource applications, or any other type of applications.
[0021] Other examples of data sources 101 may include security detection and proxy systems, access and policy controls, core service logs and log consolidators, network hardware, encryption devices, and physical security. Examples of security detection and proxy systems include IDSs, IPSs, multipurpose security appliances, vulnerability assessment and management, antivirus, honeypots, threat response technology, and network monitoring. Examples of access and policy control systems include access and identity management, virtual private networks (VPNs), caching engines, firewalls, and security policy management. Examples of core service logs and log consolidators include operating system logs, database audit logs, application logs, log consolidators, web server logs, and management consoles. Examples of network devices includes routers and switches. Examples of encryption devices include data security and integrity. Examples of physical security systems include card-key readers, biometrics, burglar alarms, and fire alarms. Other data sources may include data sources that are unrelated to network security.
[0022] The connector 202 may include code comprised of machine readable instructions that provide event data from a data source to the SIEM 210. The connector 202 may provide efficient, real-time (or near real-time) local event data capture and filtering from one or more of the data sources 101. The connector
202, for example, collects event data from event logs or messages. The collection of event data is shown as "EVENTS" describing event data from the data sources 101 that is sent to the SIEM 210. Connectors may not be used for all the data sources 101.
[0023] The SIEM 210 collects and analyzes the event data. Events can be cross-correlated with rules to create meta-events. Correlation includes, for example, discovering the relationships between events, inferring the significance of those relationships (e.g., by generating metaevents), prioritizing the events and meta-events, and providing a framework for taking action. The SIEM 210 (one embodiment of which is manifest as machine readable instructions executed by computer hardware such as a processor) enables aggregation, correlation, detection, and investigative tracking of activities. The SIEM 210 also supports response management, ad-hoc query resolution, reporting and replay for forensic analysis, and graphical visualization of network threats and activity.
[0024] The SIEM 210 may include modules that perform the functions described herein. Modules may include hardware and/or machine readable instructions. For example, the modules may include event processing engine 221 , partitioning module 122, user interface 223 and query manager 124. The event processing engine 221 processes events according to rules and instructions, which may be stored in the data storage 111. The event processing engine 221 , for example, correlates events in accordance with rules, instructions and/or requests. For example, a rule indicates that multiple failed logins from the same user on different machines performed simultaneously or within a short period of time is to generate an alert to a system administrator. Another rule may indicate that two credit card transactions from the same user within the same hour, but from different countries or cities, is an indication of potential fraud. The event processing engine 221 may provide the time, location, and user correlations between multiple events when applying the rules.
[0025] The user interface 223 may be used for communicating or displaying reports or notifications 220 about events and event processing to users. The user interface 223 may also be used to select the data that will be included in each chunk, which is described in further detail with respect to figure 2. For example, a user may select a dimension and a size parameter. For example, if the dimension is ET or MRT, the size parameter is a distance in terms of a time period from a seed. Depending on the distance (e.g., 5 minutes versus 10 minutes), the amount of data in a cluster may be smaller or larger. Thus, the user interface 223 may be used to select a distance from an ET or MRT which may control the amount of data in each cluster. Each cluster may be considered a partition. The user interface 223 may include a graphic user interface that may be web-based.
[0026] The partitioning module 122 may perform partitioning across multiple dimensions simultaneously. For example, chunks may be determined for ET and MRT simultaneously for received event data. The partitioning may include a dynamic partitioning process. The size of the partitions can be varied allowing the partitioning to be dynamic.
[0027] Figure 3 illustrates a method 300 for dynamic data partitioning according to an embodiment. The method 300 and other methods described herein are described with respect to the data storage system 100 shown in figure 1 by way of example and not limitation. The methods may be performed by other systems. Also, the methods are described with respect to event data but the methods may be used for any type of data. The method 300 may be performed by the partitioning module 122 shown in figure 1.
[0028] At 301 , event data for events is received. Event data may be received in batches from one or more of the data sources 101 or the event data may be stored and compiled into batches. The batches may be provided to the partitioning module 122 for determining clusters. The batched event data may include event data from multiple different data sources. For example, the event data may include data from different network devices.
[0029] At 302, multiple dimensions to be used for the partitioning are determined. A user may enter the dimensions. In one example, the dimensions are ET and MRT. In other examples, other dimensions may be selected. The selected dimensions may be dimensions that are for the same type of attribute. For example, ET and MRT are both time-based attributes.
[0030] At 303, a sizing parameter is determined for each dimension. A user may enter and/or modify the sizing parameter, or the sizing parameter may be calculated by a system. The sizing parameter determines the size of a cluster. For time-based attributes such as ET and MRT, examples of sizing parameters may include 1 -minute, 5-minute, 30-minute, etc. The sizing parameter may be a distance from a seed. A larger distance results in a fewer number of clusters and bigger variance of aggregate ET. A smaller distance results in more clusters and a smaller variance. A function may calculate a reasonable distance that balances both factors to achieve better query performance and less storage fragmentation.
[0031] At 304, an event seed is selected. Any event may be selected as an event seed. For example, events may be received in a batch from a data source. One of the events may be randomly selected as the seed.
[0032] At 305, a cluster is determined for the received events based on the determined dimensions, sizing parameter for each dimension and the event seed. For example, the events in the received event data are split into clusters according to whether they fall into the distance from a seed. For example, if a seed has MRT and ET equal to 12:00 o'clock and a distance (e.g., sizing parameter) of 5 minutes for MRT and ET, then all events having an ET and MRT falling within the range of 12:00-12:05 are placed into the cluster. Similarly, other clusters may be created for other seeds.
[0033] The ET and MRT for an event seed may be different. For example, there may be a delay from the time the event is detected and logged on a network device and the time the data storage system 100 receives the event data from the network device. Depending on the sizing parameter determined for each
dimension, the events that have similar ET and MRT may be placed in the same cluster. Furthermore, in some instances, an event may not have an ET, but it may still be included in the cluster if its MRT is within the distance to the seed.
[0034] At 306, the cluster is stored in the data storage 111. This may include storing metadata for the cluster which identifies the attributes for the cluster. The attributes may include the dimensions, sizing parameters, and event seed information which identifies the dimensions of the event seed, such as the event seed's ET and MRT. The method 300 may be repeated to determine multiple different clusters for each batch.
[0035] Figure 4 illustrates a method 400 for running a query, according to an embodiment.
[0036] At 401 , the data storage system 100 receives a query of the queries 104. The query may be from a user or another system requesting data about events stored in the data storage 111.
[0037] At 402, the data storage system 100 forwards the received query to the query manager 124 for processing.
[0038] At 403, the query manager 124 identifies one or more of the stored clusters related to the query. For example, the query may identify a time range for ET or MRT that specifies the events to be retrieved. The query manager 124 compares ET and/or MRT data in the query to metadata for the clusters to identify all the clusters that may hold relevant events for the query.
[0039] At 404, the query manager 124 executes the query on the identified clusters.
[0040] At 405, the query results are provided to the user for example via the user interface 223. The query results may be provided to the event processing engine 221, for example, to correlate events in accordance with rules, instructions and/or requests.
[0041] Figure 5 shows a computer system 500 that may be used with the embodiments described herein including the data storage system 100. The computer system 500 represents a generic platform that includes components that may be in a server or another computer system. The computer system 500 may be used as a platform for the data storage system 100. The computer system 500 may execute, by a processor or other hardware processing circuit, the methods, functions and other processes described herein. These methods, functions and other processes may be embodied as machine readable instructions stored on computer readable medium, which may be non-transitory, such as hardware storage devices (e.g., RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), hard drives, and flash memory).
[0042] The computer system 500 includes at least one processor 502 that may implement or execute machine readable instructions performing some or all of the methods, functions and other processes described herein. Commands and data from the processor 502 are communicated over a communication bus 504. The computer system 500 also includes a main memory 506, such as a random access memory (RAM), where the machine readable instructions and data for the processor 502 may reside during runtime, and a secondary data storage 508, which may be non-volatile and stores machine readable instructions and data. The partitioning module 122 and the query manager 124 may comprise machine readable instructions that reside in the memory 506 during runtime. Other components of the systems described herein may be embodied as machine readable instructions that are stored in the memory 506 during runtime. The memory and data storage are examples of non-volatile computer readable mediums. The secondary data storage 508 may store data used and machine readable instructions used by the systems.
[0043] The computer system 500 may include an I/O device 510, such as a keyboard, a mouse, a display, etc. The computer system 500 may include a
network interface 512 for connecting to a network. The data storage system 100 may be connected to the data sources 101 via a network and uses the network interface 512 to receive event data. Other known electronic components may be added or substituted in the computer system 500. Also, the data storage system 100 may be implemented in a distributed computing environment, such as a cloud system.
[0044] While the embodiments have been described with reference to examples, various modifications to the described embodiments may be made without departing from the scope of the claimed embodiments.
Claims
1. A data storage system comprising:
a partitioning module executed by at least one processor to determine a plurality of dimensions, partition event data across the plurality of dimensions simultaneously based on a sizing parameter for each dimension, and store a cluster including the partitioned event data and metadata including attributes identifying the cluster from a plurality of stored clusters.
2. The data storage system of claim 1 , wherein the partitioning module is to receive a batch of event data and determine a seed event from the batch of event data, and the sizing parameter for each dimension is a distance from the seed event.
3. The data storage system of claim 2, wherein the plurality of dimensions are time-based attributes of the event data, and the distance for each time- based attribute comprises a time period.
4. The data storage system of claim 3, wherein the time-based attributes comprise Manager Receipt Time (MRT) and Event End Time (ET), and the
MRT for each event in the event data is when the event is received by the data storage system and the ET for each event is when the event happened.
5. The data storage system of claim 3, wherein the partitioning module is to partition the event data across the plurality of dimensions simultaneously by determining for each event whether the time-based attributes for each event in the event data are all within the distances of the event seed, and including the event in the cluster if all the time-based attributes for the event are within the distances of the event seed.
6. The data storage system of claim 1 , wherein the partitioning module is to determine a plurality of clusters for received event data based on the plurality of dimensions, sizing parameters for the dimensions and events seeds for the clusters, wherein each event seed is selected from the received event data, and store the plurality of clusters and metadata for each cluster.
7. The data storage system of claim 6, comprising a query manager to receive a query, identify a cluster from the metadata for the clusters that includes data relevant to the query, and execute the query on the identified cluster.
8. The data storage system of claim 7, wherein the query manager is to provide results of the query to an event processing engine for a security information and event management system to correlate event data to identify network security threats.
9. The data storage system of claim 7, wherein the query manager is to provide results of the query via a user interface.
10. The data storage system of claim 1 , comprising:
a data storage device to store the cluster and metadata; and
a network interface to receive the event data from a data source over a network.
11. A security information and event management system comprising:
a partitioning module executed by at least one processor to determine a plurality of dimensions, partition event data across the plurality of dimensions simultaneously based on a sizing parameter for each dimension, and store a cluster including the partitioned event data;
a data storage device to store a plurality of clusters and metadata for each cluster, wherein the metadata for each cluster includes attributes identifying the cluster from other stored clusters;
a query manager to receive a query, identify a cluster from the metadata for the plurality of stored clusters that includes data relevant to the query, and execute the query on the identified cluster; and
an event processing engine to correlate query results from the executed query in accordance with rules, instructions or requests to identify network security threats.
12. The security information and event management system of claim 11 , wherein the partitioning module is to receive a batch of event data and determine a seed event from the batch of event data, and the sizing parameter for each dimension is a distance from the seed event.
13. The security information and event management system of claim 12, wherein the plurality of dimensions are time-based attributes of the event data, and the distance for each time-based attribute comprises a time period.
14. The security information and event management system of claim 13, wherein the partitioning module is to partition the event data across the plurality of dimensions simultaneously by determining for each event in the event data whether the time-based attributes for each event are all within the distances of the event seed, and including the event in the cluster if all the time-based attributes for the event are within the distances of the event seed.
15. A non-volatile computer readable medium including machine readable instructions executable by at least one processor to:
determine a plurality of dimensions;
partition event data across the plurality of dimensions simultaneously based on a sizing parameter for each dimension; and
store a cluster including the partitioned event data and metadata including attributes identifying the cluster from a plurality of stored clusters.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/237,192 US20140280075A1 (en) | 2011-08-26 | 2012-08-24 | Multidimension clusters for data partitioning |
EP12827937.9A EP2748732A4 (en) | 2011-08-26 | 2012-08-24 | Multidimension clusters for data partitioning |
CN201280041621.3A CN103782293B (en) | 2011-08-26 | 2012-08-24 | Multidimensional cluster for data partition |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161527933P | 2011-08-26 | 2011-08-26 | |
US61/527,933 | 2011-08-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013032911A1 true WO2013032911A1 (en) | 2013-03-07 |
Family
ID=47756755
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2012/052289 WO2013032911A1 (en) | 2011-08-26 | 2012-08-24 | Multidimension clusters for data partitioning |
Country Status (4)
Country | Link |
---|---|
US (1) | US20140280075A1 (en) |
EP (1) | EP2748732A4 (en) |
CN (1) | CN103782293B (en) |
WO (1) | WO2013032911A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015027831A1 (en) * | 2013-08-26 | 2015-03-05 | Tencent Technology (Shenzhen) Company Limited | Multidimensional data processing method and device |
EP2987090A1 (en) * | 2013-04-16 | 2016-02-24 | Hewlett-Packard Development Company, L.P. | Distributed event correlation system |
EP3126957A4 (en) * | 2014-03-31 | 2017-09-13 | Kofax, Inc. | Scalable business process intelligence and predictive analytics for distributed architectures |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9262712B2 (en) | 2013-03-08 | 2016-02-16 | International Business Machines Corporation | Structural descriptions for neurosynaptic networks |
US9430616B2 (en) | 2013-03-27 | 2016-08-30 | International Business Machines Corporation | Extracting clinical care pathways correlated with outcomes |
US10365945B2 (en) * | 2013-03-27 | 2019-07-30 | International Business Machines Corporation | Clustering based process deviation detection |
US9912474B2 (en) * | 2013-09-27 | 2018-03-06 | Intel Corporation | Performing telemetry, data gathering, and failure isolation using non-volatile memory |
US10296616B2 (en) * | 2014-07-31 | 2019-05-21 | Splunk Inc. | Generation of a search query to approximate replication of a cluster of events |
US9852370B2 (en) | 2014-10-30 | 2017-12-26 | International Business Machines Corporation | Mapping graphs onto core-based neuromorphic architectures |
US10204301B2 (en) | 2015-03-18 | 2019-02-12 | International Business Machines Corporation | Implementing a neural network algorithm on a neurosynaptic substrate based on criteria related to the neurosynaptic substrate |
US9971965B2 (en) | 2015-03-18 | 2018-05-15 | International Business Machines Corporation | Implementing a neural network algorithm on a neurosynaptic substrate based on metadata associated with the neural network algorithm |
US9984323B2 (en) * | 2015-03-26 | 2018-05-29 | International Business Machines Corporation | Compositional prototypes for scalable neurosynaptic networks |
CN106230907B (en) * | 2016-07-22 | 2019-05-14 | 华南理工大学 | A kind of social security big data method for visualizing and system |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11297080B2 (en) | 2018-06-06 | 2022-04-05 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11354168B2 (en) | 2019-01-18 | 2022-06-07 | Salesforce.Com, Inc. | Elastic data partitioning of a database |
US20200233848A1 (en) * | 2019-01-18 | 2020-07-23 | Salesforce.Com, Inc. | Elastic data partitioning of a database |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
CN110427377B (en) * | 2019-08-02 | 2023-12-26 | 北京博睿宏远数据科技股份有限公司 | Data processing method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6633882B1 (en) * | 2000-06-29 | 2003-10-14 | Microsoft Corporation | Multi-dimensional database record compression utilizing optimized cluster models |
US20060184338A1 (en) * | 2005-02-17 | 2006-08-17 | International Business Machines Corporation | Method, system and program for selection of database characteristics |
US20080133568A1 (en) * | 2006-11-30 | 2008-06-05 | Cognos Incorporated | Generation of a multidimensional dataset from an associative database |
US20100325142A1 (en) * | 2005-05-25 | 2010-12-23 | Experian Marketing Solutions, Inc. | Software and Metadata Structures for Distributed And Interactive Database Architecture For Parallel And Asynchronous Data Processing Of Complex Data And For Real-Time Query Processing |
KR20110024808A (en) * | 2009-09-03 | 2011-03-09 | 주식회사 케이티 | Method and apparatus for providing web storage service storing multimedia contents and metadata separately |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2319918A1 (en) * | 2000-09-18 | 2002-03-18 | Linmor Technologies Inc. | High performance relational database management system |
CA2419502A1 (en) * | 2003-02-21 | 2004-08-21 | Cognos Incorporated | Time-based partitioned cube |
US8711925B2 (en) * | 2006-05-05 | 2014-04-29 | Microsoft Corporation | Flexible quantization |
US8762395B2 (en) * | 2006-05-19 | 2014-06-24 | Oracle International Corporation | Evaluating event-generated data using append-only tables |
US20080033958A1 (en) * | 2006-08-07 | 2008-02-07 | Bea Systems, Inc. | Distributed search system with security |
US9824107B2 (en) * | 2006-10-25 | 2017-11-21 | Entit Software Llc | Tracking changing state data to assist in computer network security |
CA2669197A1 (en) * | 2006-12-28 | 2008-07-10 | Arcsight, Inc. | Storing log data efficiently while supporting querying to assist in computer network security |
US8600998B1 (en) * | 2010-02-17 | 2013-12-03 | Netapp, Inc. | Method and system for managing metadata in a cluster based storage environment |
CN101916261B (en) * | 2010-07-28 | 2013-07-17 | 北京播思软件技术有限公司 | Data partitioning method for distributed parallel database system |
-
2012
- 2012-08-24 WO PCT/US2012/052289 patent/WO2013032911A1/en active Application Filing
- 2012-08-24 EP EP12827937.9A patent/EP2748732A4/en not_active Ceased
- 2012-08-24 CN CN201280041621.3A patent/CN103782293B/en not_active Expired - Fee Related
- 2012-08-24 US US14/237,192 patent/US20140280075A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6633882B1 (en) * | 2000-06-29 | 2003-10-14 | Microsoft Corporation | Multi-dimensional database record compression utilizing optimized cluster models |
US20060184338A1 (en) * | 2005-02-17 | 2006-08-17 | International Business Machines Corporation | Method, system and program for selection of database characteristics |
US20100325142A1 (en) * | 2005-05-25 | 2010-12-23 | Experian Marketing Solutions, Inc. | Software and Metadata Structures for Distributed And Interactive Database Architecture For Parallel And Asynchronous Data Processing Of Complex Data And For Real-Time Query Processing |
US20080133568A1 (en) * | 2006-11-30 | 2008-06-05 | Cognos Incorporated | Generation of a multidimensional dataset from an associative database |
KR20110024808A (en) * | 2009-09-03 | 2011-03-09 | 주식회사 케이티 | Method and apparatus for providing web storage service storing multimedia contents and metadata separately |
Non-Patent Citations (1)
Title |
---|
See also references of EP2748732A4 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2987090A1 (en) * | 2013-04-16 | 2016-02-24 | Hewlett-Packard Development Company, L.P. | Distributed event correlation system |
EP2987090A4 (en) * | 2013-04-16 | 2017-05-03 | Hewlett-Packard Enterprise Development LP | Distributed event correlation system |
US10013318B2 (en) | 2013-04-16 | 2018-07-03 | Entit Software Llc | Distributed event correlation system |
WO2015027831A1 (en) * | 2013-08-26 | 2015-03-05 | Tencent Technology (Shenzhen) Company Limited | Multidimensional data processing method and device |
EP3126957A4 (en) * | 2014-03-31 | 2017-09-13 | Kofax, Inc. | Scalable business process intelligence and predictive analytics for distributed architectures |
Also Published As
Publication number | Publication date |
---|---|
CN103782293A (en) | 2014-05-07 |
EP2748732A4 (en) | 2015-09-23 |
CN103782293B (en) | 2018-10-12 |
US20140280075A1 (en) | 2014-09-18 |
EP2748732A1 (en) | 2014-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20140280075A1 (en) | Multidimension clusters for data partitioning | |
US20140195502A1 (en) | Multidimension column-based partitioning and storage | |
US10013318B2 (en) | Distributed event correlation system | |
US20140189870A1 (en) | Visual component and drill down mapping | |
US10296739B2 (en) | Event correlation based on confidence factor | |
US20160164893A1 (en) | Event management systems | |
US9531755B2 (en) | Field selection for pattern discovery | |
US9535961B2 (en) | Query summary generation using row-column data storage | |
US9438616B2 (en) | Network asset information management | |
US20120311562A1 (en) | Extendable event processing | |
US20130081065A1 (en) | Dynamic Multidimensional Schemas for Event Monitoring | |
US20130198168A1 (en) | Data storage combining row-oriented and column-oriented tables | |
US10027686B2 (en) | Parameter adjustment for pattern discovery | |
US8745010B2 (en) | Data storage and archiving spanning multiple data storage systems | |
US11362881B2 (en) | Distributed system for self updating agents and provides security | |
CN114666128B (en) | Honeypot threat information sharing method, device and equipment and readable storage medium | |
Singh et al. | A clustering based intrusion detection system for storage area network | |
Zhang | On the Effective Use of Data Dependency for Reliable Cloud Service Monitoring | |
Barakat | A New Framework to Hunt Threats Targeting MS Active Directory Using Machine Learning Techniques | |
Kumar | Distributed Intrusion Detection System Scalability Enhancement using Cloud Computing. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12827937 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012827937 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14237192 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |