A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

 
Web www.patentalert.com

< Aglaonema plant named `TWYAG0009B`

> Optimizing branch condition expressions in a JIT compiler

~ 00476