BRIEF DESCRIPTION OF THE DRAWINGS
The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the drawings to reference like features and components.
FIG. 1 illustrates an exemplary network environment in which one or more threads are generated.
FIG. 2 illustrates an exemplary architecture for intercepting threads and capturing data associated with the threads.
FIG. 3 illustrates an exemplary computing-based device for intercepting threads and capturing data associated with the threads.
FIG. 4 illustrates an exemplary logical representation of an event block.
FIG. 5 illustrates an exemplary physical representation of an event block collection.
FIG. 6 illustrates an exemplary collection server.
FIG. 7 illustrates an exemplary analyzing server.
FIG. 8 illustrates an exemplary representation of one or more activity bursts.
FIG. 9 illustrates exemplary method(s) for intercepting threads and capturing data associated with the threads.
FIG. 10 illustrates exemplary method(s) for adding normalized events to an ordered event stream.
FIG. 11 illustrates exemplary method(s) for detecting leaked entries.
FIG. 12 illustrates exemplary method(s) for detecting common misconfigurations.
FIG. 13 illustrates exemplary method(s) for detecting one or more extensibility points.
FIG. 14 illustrates exemplary method(s) for analyzing one or more activity bursts.
FIG. 15 illustrates exemplary method(s) for prohibiting the execution of unauthorized interactions.
FIG. 16 illustrates exemplary method(s) for detecting rogue programs.
FIG. 17 illustrates an exemplary computer environment.