Skip to Content
Find More Like This
Return to Search


United States Patent Application

View the Complete Application at the US Patent & Trademark Office
Los Alamos National Laboratory - Visit the Technology Transfer Division Website
Significant and aggregate user authentication activity may be analyzed across a population of users and computers in one or more networks to differentiate between authorized users and intruders in a network, and/or to detect inappropriate behavior by otherwise authorized users. Dynamic graphs and graph models over user and computer authentication activity, including time-constrained models, may be used for the purposes of profiling and analyzing user behavior in computer networks. More specifically, an edge-based breadth first search of graphs may be used that enforces time-constraints while maintaining traditional breadth first search computational complexity equivalence.
Kent, Alexander (Los Alamos, NM), Neil, Joshua (Los Alamos, NM), Liebrock, Lorie (Socorro, NM)
Los Alamos National Security, LLC (Los Alamos NM), New Mexico Tech Research Foundation (Socorro NM)
15/ 099,898
April 15, 2016
STATEMENT OF FEDERAL RIGHTS [0002] The United States government has rights in this invention pursuant to Contract No. DE-AC52-06NA25396 between the United States Department of Energy and Los Alamos National Security, LLC for the operation of Los Alamos National Laboratory.