Methods for mapping IP addresses and domains to organizations using user activity data

ABSTRACT

A computer-implemented method is provided for mapping IP addresses and domain names to organizations. The method includes receiving, by a mapping system from an data provider, a dataset related to a plurality of users of the data provider. The dataset includes (a) an IP address for a user device of each user of the plurality of users, and (b) a domain name for a user account of each user of the plurality of users; enriching, by an analytics engine of the mapping system, the received dataset with enrichment data from an enrichment source; receiving, by the analytics engine from a storage medium, historical data relevant to the enriched dataset; and mapping, by the analytics engine, (i) the IP address and/or (ii) the domain name of each user of a portion of the plurality of users to an organization based on the enriched dataset and the historical data.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 16/543,075 filed Aug. 16, 2019 and titled “Methods for mappingIP addresses and domains to organizations using user activity data,”which claims priority to U.S. patent application Ser. No. 16/015,686filed Jun. 22, 2018 and titled “Methods for mapping IP addresses anddomains to organizations using user activity data,” which claimspriority to U.S. Provisional Application No. 62/523,416 filed Jun. 22,2017 and titled “Method for mapping IP addresses and domains toorganizations using user activity data,” the entireties of which areincorporated herein by reference.

TECHNICAL FIELD

The following disclosure is directed to methods and systems for mappingInternet Protocol (IP) addresses and domain names to organizations and,more specifically, methods and systems for mapping IP addresses and/ordomain names to organizations based on user activity data.

BACKGROUND

Large organizations, such as companies, which may have a significantnumber of users and network assets may wish to know and/or manage IPaddresses and/or domain names that are associated with theirorganizations or brand. This can be particularly true of largeconglomerates having multiple subsidiary companies. For example, largercompanies can be more subject to cyberattacks and typically have lessknowledge of the extent of their network footprint as compared tosmaller companies. By knowing more about the characteristics of theirnetworks, they can address security vulnerabilities and better protectthemselves from cyberattacks. Due to a large number of users in theirsystems, including guest and temporary users, there is a need forefficient discovery and management of network (and subnetwork) resourcesassociated with the organizations.

SUMMARY

The exemplary methods and systems described herein can discover, filter,and manage IP addresses and/or domain names that belong to organizationsor companies by unifying user-associated domain name information of anemail address with the observed IP address of that user's activity. Insome cases, by applying machine learning techniques and a series ofquality filters, and/or using a reference to discover the owner ofeither the domain or IP address, the exemplary mapping systems canassign the undiscovered resource to the organization. For instances whenthe IP addresses and domains are already known to belong to a particularorganization's network, this information can be used to understandcharacteristics of that network.

In a first aspect of the disclosure, a computer-implemented method isprovided for mapping Internet Protocol (IP) addresses and domain namesto organizations. The method includes receiving, by a mapping systemfrom an data provider, a dataset related to users of the data provider.The dataset includes (a) an IP address for a user device of each of theusers, and (b) a domain name for a user account of each of the users;enriching, by an analytics engine of the mapping system, the receiveddataset with enrichment data from an enrichment source; receiving, bythe analytics engine from a storage medium, historical data relevant tothe enriched dataset; and mapping, by the analytics engine, (i) the IPaddress and/or (ii) the domain name of each user of some or all of theusers to an organization based on the enriched dataset and thehistorical data.

-   -   Embodiments of the method can include one or more of the        following features. The data provider can be an email service        provider and the users are email users that send or receive        email through the email service provider. The enriching, by the        analytics engine of the mapping system, the received dataset        with enrichment data from the enrichment source can further        include determining whether a domain of the email service        provider is a free or paid email service provider domain and        adding information related to the determined domain to the        received dataset; and/or determining whether a network of an IP        address of the email user is of a cellular network or a guest        network and adding information related to the determined network        to the received dataset.

The data provider can be a messaging service provider and the users aremessaging users that send or receive messages through the messagingservice provider. The data provider can be a website that requiresregistration for use of the website by the users. The data provider canbe a cryptography-related service that provides at least one of the IPaddress or domain name of each of the users. The historical data caninclude at least one of previously mapped IP addresses or previouslymapped domain names of some or all of the users to the organization. Themethod can further include normalizing, by a collector of the mappingsystem, the received dataset.

Normalizing the received data can further include: (i) checkingintegrity of the dataset; (ii) reformatting some or all of the dataset;(iii) removing duplicates in the dataset; and/or (iv) removingirrelevant data from the dataset. The method can further includestoring, by the storage medium, the normalized dataset before enrichingby the analytics engine; and receiving, by the analytics engine, thenormalized dataset from the storage medium.

The method can further include receiving, by the analytics engine froman entity management system, information about existing associations oforganizations to IP addresses and domain names; and mapping, by theanalytics engine, the IP address and/or the domain name of some or allof the email users to the organization based on the information aboutexisting associations. The method can further include storing, by thestorage medium, the enriched data from the analytics engine. Thehistorical data can include a greater number of data points over timethan data points of the dataset. The method can further include applyinga predictive model of the mapping system to the processed dataset andthe historical data, and/or applying deterministic rules to theprocessed dataset and the historical data. The method can furtherinclude processing, by the predictive model, two or more datasets over atime period, the two or more datasets including data related to a commonset of users of the users; determining, by the predictive engine,whether the IP address of some or all of the common set of users areconsistent over the time period; and mapping, by the mapping system, theIP address of each of some or all of the common set of users to theorganization based on the determination. The deterministic rules caninclude a minimum number of unique mailboxes associated with an IPaddress. The method can further include mapping, by the mapping system,the IP address to the organization based whether one or more receiveddatasets have the minimum or greater number of unique mailboxesassociated with the IP address.

The dataset is a first dataset and the email users is a first set ofemail users, the method further includes receiving, by the analyticsengine, a second dataset associated with a second set of email users,the second set of email users mutually non-exclusive with the first setof email users; comparing, by the analytics engine, the second datasetto the first dataset, and terminating, by the analytics engine, one ormore existing mappings between the IP address and/or the domain name andthe organization based on the comparison. The terminating, by theanalytics engine, one or more existing mappings can be based on athreshold. The method can include storing, by the storage medium, themapping of the IP address and/or domain name to the organization.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of a network including an exemplary system formapping IP addresses and/or domain names to organizations using useractivity data.

FIG. 2 is a diagram illustrating the mapping system of FIG. 1interacting with one or more exemplary data sources.

FIG. 3 is a flowchart of an exemplary embodiment of acomputer-implemented method for mapping IP addresses and/or domain namesto organizations using user activity data.

FIG. 4 is a diagram of an example computer system that may be used inimplementing the mapping systems and methods described herein.

DETAILED DESCRIPTION Overview of Exemplary Mapping System and Method

FIG. 1 is a diagram of a network 100 including an exemplary system 102for mapping IP addresses and/or domain names to organizations using useractivity data. Organizations can include companies, businesses,not-for-profit organizations, groups, government entities, schools, etc.Mapping system 102 is illustrated as part of a network 100 that includesa data source 106 (e.g., an email service provider, website, etc.) andvarious user networks 108 a-108 d from which the data is drawn. Theseexemplary user networks 108 a-108 d can include a corporate network 108a, residential network 108 b, public network 108 c, and a cellularnetwork 108 d. User networks may include semi-public networks (such asnetworks with passwords provided to guests of a café or hotel), virtualnetworks, etc. For the purposes of illustrating networks 108 a-108 d,one or more representative users and one or more devices are shown foreach network. Activity data from some or all of these users arecollected by the email service provider 106, which can include itscustomers 110 that send email to users of the various networks 108 a-108d via one or more mail transfer agents (MTAs) or one or more emailservers 112. The provider 106 includes a data processor 114 thatprocesses incoming email from users in networks 108 a-108 d.Additionally, the data processor 114 outputs one or more datasets 115used by the mapping system 102.

The mapping system 102 includes collector 116 coupled to analyticsengine 118 and storage 120. Analytics engine 118 is coupled to storage120, and, optionally, enrichment module 122 and entity management system124. Each of the foregoing systems and data are described in greaterdetail below.

Data Sources

The exemplary methods and systems described herein are adapted toreceive and process one or more datasets that provide an associationbetween (1) an identifier (e.g., the domain component of a user's emailaddress) that identifies an organization (e.g., a business, a school, agroup, etc.) and (2) the IP address that is (a) assigned to the user'scomputer, device, or terminal, (b) assigned to an intermediary serverthat the user is implicitly or explicitly accessing and/or using, and/or(c) is the address that external third-parties would consider to be theuser's IP address.

Examples of datasets containing information about these associationsinclude, but are not limited to, the following.

-   -   Web-based user activity. In some embodiments, datasets used by        system 102 for mapping IP addresses and/or domains to        organizations can include web-based user activity. For example,        in some instances, websites request registration to access and        use personal accounts on the site. One component of web-based        user account information is the user's email address. When a        user logs into these websites, or accesses the websites if        already logged in, the website can determine the IP address of        the user is associated to the user account, and thus        subsequently the user's email address. In some embodiments, the        methods and systems described herein may not depend on a domain        name to associate with the organization if data originates from        a service that has already performed that matching or whose        business model revolves around providing a service to employees        of a business. For example, web applications offer a service to        the employees of the organization, and only those employees or        those affiliated with the organization use the product of a        particular web application. In this case, since the business        organization is known, a domain component is not required, and        the resulting pairs may be metadata about that customer and the        IP addresses observed using that service.    -   Email readability user activity. In some embodiments, datasets        used by system 102 for mapping IP addresses and/or domains to        organizations can include email readability user activity. Email        service providers, especially those offering email marketing        services, may offer readability or delivery metrics of emails        that their customers send to other users or organizations. This        feedback is valuable as it allows for adjustment to email        campaigns by third parties to improve their effectiveness. These        metrics may use an image or other remote resource (henceforth        known as “pixel”) embedded in the outgoing email that the        receiving client fetches when it opens or reads the email. This        provides information about the client to the email service        provider implying the acknowledgment that the email was opened,        thus allowing the email service provider to associate an IP        address of the client and the email address of the user. This        association can be accomplished in multiple ways. Typically, the        email service provider uses its own database to associate the        fetching of the pixel (which has a unique name) to a particular        email recipient. The provider can receive the IP address(es) of        the system that opened the mail and associate the received IP        address with system user's email address. The provider can then        provide this information (IP address or IP address and domain        name) to the mapping system.    -   Email access user activity. In some embodiments, datasets used        by system 102 for mapping IP addresses and/or domains to        organizations can include email access user activity. Email        service providers may have one or more methods that allow email        users to send email through their email service systems destined        to other users. Additionally, email service providers may allow        their users to fetch their own email from their systems. Much        like the previous dataset that focused on telemetry generated by        users reading mail sent by a third party. The email service        provider may gather the IP address, email address, and        associative information by users sending mail (e.g., through a        web browser or through the Simple Mail Transfer Protocol        (SMTP)), or managing or checking for new mail (e.g., through a        web browser, through the Internet Message Access Protocol (IMAP)        or through the Post Office Protocol version 3 (POP3)).    -   Chat-based user activity. In some embodiments, datasets used by        system 102 for mapping IP addresses and/or domains to        organizations can include chat-based user activity. Instant        messaging services (e.g., those that use the Extensible        Messaging and Presence Protocol (XMPP)) have user identifiers        that are similar in structure and purpose to an email address.        Instead of being used as an explicit mailbox, the prefix of the        account identifier uniquely identifies the user and, if        specified, the user's device. The suffix, or domain, can        represent the associative organization that the user's account        is managed by and defines how the user can be contacted. If a        user is interacting with a particular instant messaging service,        such as sending a message or checking to see if messages exist        that the client has not yet received, the user implicitly        provides its IP address as part of the network transactions.    -   Cryptography-related user activity. In some embodiments,        datasets used by system 102 for mapping IP addresses and/or        domains to organizations can include cryptography-related user        activity. For example, Pretty Good Privacy (PGP) keys and X.509        certificates are two methods for signing and encrypting email        for the purposes of proving authenticity of a user's account or        providing privacy protections for messages. These two methods        associate their keys or certificates to an email address. These        keys may also be used for other purposes, such as signing a        message to prove authenticity, or encrypt a file, unrelated to        email. If such a message is then posted privately or publicly,        the act of the user using this key, which is expected to remain        exclusive to this user, and the act of posting it to make it        available to one or more users, and thus providing the IP        address of the user to the service where it is posted, also        provides information used by the system described herein.

In some embodiments, two or more portions of datasets may be usedtogether or merged into one dataset. Specifically, the two or moreportions can be merged if they are of the same type. For example, theexemplary system may be able to receive telemetry from two or more emailservice providers for the “email readability user activity” dataset andbe able to join them with little cost to efficiency because, typically,there is a single origin to an email. In another example, for the “emailaccess user activity” dataset, because email is hosted and accessedwithin the context of one organization or set of email systems, a useris restricted to access his or her email via the specific email portalof the organization (i.e., a user cannot use Yahoo to access his or herGmail email).

In some embodiments, one or more privacy-enhancing transforms can beapplied to the dataset by the data provider and/or the mapping system.These transforms can include, but are not limited to, hashing themailbox portion of the email address, with or without using a privatesalt. This transform conceals the actual email addresses from themapping system, while allowing the mapping system to compute the numberof distinct email addresses.

Attributes of Datasets

The attributes of data within a dataset can vary depending on the methodused to collect that data. In datasets having email readability useractivity, client requests to email service provider readabilityresources may include a variety of information about the client, such asthe client IP address, location information, the mail client or browseruser agent, and/or the operating system and version. Other attributesmay include any information sent in the Hypertext Transfer Protocol(HTTP) headers, or that may be inferred through fingerprintingtechniques commonly used in the industry (e.g., fingerprints based oninstalled plugins, installed fonts, canvas information, time zone,location setting, etc.). The email service provider may associate therequest of the resource back to the original email message, for example,by embedding an identifier in the Uniform Resource Locator (URL) of theremote resource or through other means, which allows the provider tolink that client back to the user, and thus also the mailbox, emailaddress, and other metadata already known about the user.

Similar utilization of information is applicable to other types ofdatasets, such as web-based user activity and cryptography-related usedactivity, which also rely upon the HTTP protocol to exchange informationbetween the client and server. In the case of chat-based user activityor email access user activity, the information available to a serverreceiving client requests may be more limited as each of these datasetsrely upon other application-layer protocols.

The following are examples of data in the various types of datasetslisted above.

-   -   For email readability user activity datasets, exemplary datasets        from email service providers can include the domain of the        email's destination or “TO” email address (e.g. the        “example.com” of “user@example.com”) and can include /32 IPv4        address or /128 IPv6 address of the client requesting the pixel.        Note that, in some instances, this client may not necessarily be        the end user's IP address if the user's IP address is hidden        (e.g., by a proxy system) by the service provider. Exemplary        datasets from email service providers can include the domain of        the user's email address and can include /32 IPv4 address or        /128 IPv6 address of the client requesting the pixel.    -   For web-based user activity and email access user activity        datasets, exemplary datasets can include the domain of the        user's email address of the account and can include /32 IPv4        address or /128 IPv6 address of the user accessing the account        of the web-based service. Note that if the web-based data        provider does not have the user's full email address, it may        provide an indication of which user the IP addresses belong to;        for example, the provider may provide the administrator's email        address, domain of the organization, or other corporation or        organization identifier.    -   For chat-based user activity datasets, exemplary datasets can        include the domain of the user's contact address and can include        /32 IPv4 address or /128 IPv6 address of the user signing into        the chat service provider or sending chat messages.    -   For cryptography-related used activity datasets, exemplary        datasets can include the domain of the email address associated        to the cryptographic key(s) and include /32 IPv4 address or /128        IPv6 address of the user posting signed or encrypted content. In        some instances, the IP address(es) are associated with the        identity of the cryptographic key material. This cryptographic        key material can be associated with the user's email address via        the enrichment by the mapping system, as described further        below.    -   Exemplary datasets can include a measurement of time indicative        of the client request.

In some embodiments, further to collecting data as discussed above, somedata of one or more of the datasets can be processed by the dataprovider as in the following. The below-discussed processing can ensurequality of the output of the analytics engine, as further discussedbelow.

-   -   The exemplary processing can include, in addition to the domain        of the email address, a hash of the combination of the        destination (or “TO”) email address or similar data structure,        the IP address of the client request, and a secret salt. This        processing permits the disambiguation of multiple users at a        company at a specific IP address.    -   The exemplary processing can include a hash of the combination        of an email identifier (for example, a series of alphanumerical        characters), the IP address of the client request, and a secret        salt. This processing permits the disambiguation of one user        repeatedly opening the same email, or multiple people opening        the same email, and is specific to the email readability user        activity dataset.    -   The exemplary processing can include a timestamp that can        include an hour and minute. This processing permits for greater        resolution in the eventual modeling of the data in the datasets.

In some embodiments, additional contextual information about the clientcan be provided depending on the source dataset. For example, in thecase of email readability user activity and web-based user activity, thefollowing additional contextual information can be provided:

-   -   HTTP cookie provided by the client which allows for discovering        related networks; and/or    -   User-agent (i.e., a software agent acting on behalf of the user)        provided by the client that describes characteristics of the        user's device.

In some embodiments, any subset of the above-described attributes can becollected as long as the likelihood of false positive results are keptlow. For example, an acceptable rate of false positive results is lessthan or equal to one in five hundred. In some embodiments, the systemcan associate an IP address or domain to an organization using datadirectly from the above-described datasets, without relying on extractedattributes.

Exemplary Mapping Methods

Exemplary mapping system 102 is described herein in the context of anexample for the purposes of illustrating the functionality of system102. The examples provided herein are not intended to limit thefunctionality of the mapping system or steps of the mapping method. Theexample scenario depicted in FIG. 1 illustrates email being sent bymultiple parties to an organization, “Example, Inc.,” with the emaildomain “example.com” with the aim of identifying the IP addressesassociated to “Example, Inc.” In an exemplary embodiment, once IPaddress(es) are mapped to an organization, the mapping method describedcan be repeated such that new domain names are discovered (and, ifappropriate, subsequently mapped) from the given IP address(es). Thus,the mapping method works in either direction: given domains, the methodcan discover IP addresses (for mapping, if appropriate) and given IPaddresses, it can discover domains (for mapping, if appropriate). Forease of explanation, the example data and text contains mailbox namesand email identifier in plain text.

In the example scenario, customer 110, associated with email serviceprovider 106, sends an email 124 to a user at an organization, the userhaving the email address “user1@example.com.” User 1 is physicallypresent at the offices of company “Example, Inc.” and their devices(devices 1 a and 1 b) are on the organization's network 108 a. Thisemail can be initiated manually through the customer's email client(i.e., typed by the customer 110), an automated notification (i.e., analert), as part of a broader email campaign generated through the emailservice provider's platform (i.e., marketing campaign), etc. Asspecified by the customer 110, the email service provider 106 sends theemail to the appropriate recipients through one or more MTAs or emailservers 112. This email is received by the individual user's emailservice provider (not shown in FIG. 1) before being delivered into theuser's mailbox.

The user (in this example, any one of User 1, 2, 8, and/or 9) is able toaccess his or her email through any client on any device. For example,the user may be using their web browser to access her email (e.g., Gmailor Yahoo Mail), or the user may be using a dedicated email client (e.g.,Apple Mail, Microsoft Outlook, or Thunderbird). The user may be readingtheir email on a laptop, notebook computer, tablet, mobile device,smartwatch, or any electronic device capable of accessing email. Oncethe user opens the email, the user may load, via the HTTP protocol,embedded remote resources in the email 124 that can ultimately informthe originating email service provider 106 that the user opened theemail. Specifically, this information 126 is sent to and consumed bydata processing system 114 at the email service provider 106 thatprocesses and keeps track of qualitative metrics of information 126.These resources may be embedded into content within the email, such aslinks to remote attachments or advertisements. Telemetry generated byinteraction with those resources, such as the user clicking on URLs toaccess the content, can be processed by the data processor 114 and/ortransmitted to the mapping system 102 for processing.

Note that one or more users having devices connected to the sameorganization's network 108 a can be sent email from customer 110. Whenany of these users (for example, User 1 or 2) opens his or her email, aremote resource is retrieved and information 126 is provided to the dataprocessor 114 at the email service provider 106.

Customer(s) 110 can send email 124 to User 8, at “user8@example.com”,who is working remotely from his or her residence. User 8 has device 8 aconnected to the residence network 108 b. When User 8 opens the email124, the act of doing so causes a remote resource to be retrieved but,instead of including information about the organization's network, itincludes information 128 about User 8's present network, which isresidential network 108 b. In some embodiments, information 128 isfiltered out the datasets used by the mapping system 102 as theresidential networks are not typically of interest for mapping IPaddresses and/or domain names to a specific organization (in thisexample, “Example, Inc.”).

Customer(s) 110 can send email 124 to User 9, at “user9@example.com”,who is working remotely from a public cafe or park and are connected tothe city's public WiFi network 108 c. When User 9 opens email 124, theact of doing so causes a remote resource to be retrieved and information130 about the public network 108 c is obtained by the data processingsystem 114. In some embodiments, information 130 is filtered out thedatasets used by the mapping system 102 as the public networks are nottypically of interest for mapping IP addresses and/or domain names to aspecific organization (in this example, “Example, Inc.”).

In this example scenario, User 1 leaves the Example, Inc.'s office totake a meeting at another location. While on the way to the meeting,User 1 opens previously received email on her mobile device 1 bconnected to a cellular network 108 d. The act of doing so causes thosesame remote resources to be retrieved and thus information 132 about thecellular network 108 d is obtained by the data processing system 114. Insome embodiments, information 132 is filtered out the datasets used bythe mapping system 102 as cellular networks are not typically ofinterest for mapping IP addresses and/or domain names to a specificorganization (in this example, “Example, Inc.”).

In some embodiments, the information received by the data processingsystem 114 at the email service provider 106 can be processed andprovided as quantitative metrics 134 for their customers (#11). In someembodiments, the provider 106 may use metrics 134 for internalbenchmarking or, for example, to determine whether its customers may beusing its services to spam users. In some cases, the provider 106 mayselectively include the remote resource in emails to users for aparticular customer and/or in particular circumstances.

In an exemplary embodiment, mapping system 102 receives one or moredatasets 115 from the email service provider 106, the datasets 115having some or all of the attributes described in detail above. In someembodiments, the mapping system 102 receives the datasets 115 in aspecific format from the processor 114. The example dataset 115 showsthe fields that can include:

-   -   timestamp, email identifier, mailbox name, email domain, IP        address        For example, an example entry in the dataset 115 is:    -   151218010, 3872, user1, example.com, 192.0.2.81        In some embodiments, there can be other datum in this dataset,        including those of users belonging to different organizations        accessing email from the public city network.

FIG. 3 is a flowchart of an exemplary method for mapping IP addressesand/or domain names to organizations using user activity data. Inexemplary step 302, dataset(s) 115 can be provided by data provider 106(such as an email service provider, a messaging service provider, awebsite, and/or a cryptography-related service) directly to thecollector 116, or can be fetched from provider 106 by the collector 116.The dataset(s) 115 can include (a) an IP address for a user device ofeach user of the plurality of users, and/or (b) a domain name a useraccount of each email user of the plurality of email users. Collector116 and subsequent downstream processing steps can be configured tooperate on data delivered in an stream format (e.g., real-time or assoon as the upstream provider has data to produce) or data in aggregatedfiles at arbitrary intervals. In exemplary step 304, collector 116 maynormalize the dataset(s) to perform basic integrity checks on thedataset to ensure, or change to, expected format and size, and performdeduplication, if necessary. For example, collector 116 can beconfigured to clean datasets having irrelevant information such as thesame user opening the same email repeatedly.

In some embodiment, collector 116 passes the normalized dataset(s) intothe analytics engine 118 or into a storage medium 120, from whichanalytics engine 118 can retrieve the normalized dataset(s). Analyticsengine 118 may begin by processing the datasets(s) and, in exemplarystep 306, begin enriching the dataset(s) with other known informationabout the domains in the dataset(s) (i.e., whether the domains are freeor paid email service provider email domains), or about the IP addressesin the dataset(s) (e.g., whether the IP addresses are cellular networksor if they are known guest or captive portal networks). In someembodiments, analytics engine 118 may engage with an entity managementsystem 124, which stores information about existing associations(obtained from the analytics engine 118 or from another source) ofdomain names and IP addresses to organizations, to pull in informationabout known organizations. Analytics engine 118 may store the processeddataset(s) (including any additional information from the entitymanagement system 124) in a storage medium 120. In exemplary step 308,analytics engine 118 may receive or retrieve historical data fromstorage medium 120 (having existing telemetry) or a caching layer, toprovide additional historical context for the information in thedatasets. Historical data can include data generated from priorprocessing of datasets, including any mapping of IP addresses and/ordomains to organizations. This can be beneficial because some of theimproved data quality attributes are dependent on time-seriesinformation larger than the collection period. For example, this isespecially helpful for incoming data representing a real-time datastream, while some data quality methods may operate best with at least24 hours of data for a given association to ensure a full business dayhas been collected.

In exemplary step 310, analytics engine 118 is configured to map atleast one of (i) the IP address or (ii) the domain name of a portion ofthe plurality of users to an organization based on the enriched datasetand the historical data. Analytics engine 118 is configured to determinea confidence of the assigned IP address and domain name to theorganization. Analytics engine 118 is configured to evaluate some or allof the data quality considerations and attributes, by itself or incombination with a developed machine learning model and/or deterministicrules to assess the confidence of a given domain and IP address to agiven organization for a specified time period, as described in furtherdetail below. In some embodiments, the analytics engine 118 isconfigured to assess whether existing associations should be terminatedbased on any new information that has been collected from incomingdataset(s) 115. The analytics engine 118 can store new associations intothe entity management system 124 and can store residual conclusions andexisting telemetry back into a storage medium 120. Residual conclusionscan include those data that do not meet data quality threshold(s) due tothe amount of data collected or due to another measure of quality. Evenif the residual conclusions are not used for mapping purposes at aparticular time, they may have value for future processing and/ormapping. In some embodiments, the analytics engine 118 can store updatedenrichment data to be stored for future and ongoing enrichmentactivities in the enrichment unit 122. Enrichment can include otherknown information about the domains in the dataset(s) (i.e., whether thedomains are free or paid email service provider email domains), or aboutthe IP addresses in the dataset(s) (e.g., whether the IP addresses arecellular networks or if they are known guest or captive portalnetworks). Enrichment can also include data about IP address(es) (e.g.,geolocation information, whether the address is a guest network, etc.),domain names (e.g., registration information, whether the email serviceprovider is a free or paid service provider, etc.), timestamps (e.g.,date, time, seasonal events, holidays in one or more countries, etc.),network characteristics of an IP address of the user (e.g., any presentservice set identifier (SSID) and basic service set identifier (BSSID),explicit proxies, known workstation and mobile devices, associated IPv4or IPv6 addresses, domain name system (DNS) records, or data other thanthe datasets described above under headings “Datasets” and “Attributesof Datasets.”

Predictive Modeling of Datasets

FIG. 2 is a diagram illustrating an exemplary embodiment of a mappingsystem 200 including a predictive model 202 and model trainer 204. Themodel trainer 204 may train the predictive model 202 to evaluate thedatasets. The predictive model 202 may apply one or more supervised ormachine learning techniques to the datasets, such as: support vectormachines, classification and regression trees, logistic regression,linear regression and/or another (linear or nonlinear)supervised-learning technique. In some embodiments, one or more of theabove-described datasets may be processed by the mapping system 200using a predictive model 202 (i.e., machine learning techniques) bybuilding a model or classifier that appropriately identifiessignificantly more reliable results using one or more of the followingquality considerations and enrichment strategies. In some embodiments,the model or classifier can join the raw dataset with other metadata. Insome embodiments, one or more of the following considerations can becombined with explicit rules which can be manually tuned to enable moredeterministic behaviors of the model or classifier. Exemplaryconsiderations include:

-   -   Mapping system 200 can normalize mailbox names or user names        against suffixes that are added by the user for categorization,        device identification, or other purposes before hashing or        performing other processing by the exemplary mapping system        (e.g., email systems treat “user+bank” and “user+retail” as the        same user mailbox, and can be normalized to “user”). This        minimizes the instances of the system overestimating the user        population.    -   Mapping system 200 can establish a minimum number of unique        mailboxes (i.e., usernames) present on each IP address before        associating a given IP address to an organization. For example,        this can prevent associating IP addresses or domains to        companies due to users who are reading emails away from the        office or business location, such as at home or in a coffee        shop.    -   Mapping system 200 can observe the number of unique mailboxes        over a continuous period before mapping occurs to a particular        organization. This can prevent associating an IP address due to        employees traveling to a new location on a temporary basis.        However, these IP addresses or domains may still be assigned to        a company if these behaviors are to be captured, particularly if        the user was an exclusive user of the IP address during this        time, such as a remote office whose employees are infrequently        present.    -   Mapping system 200 can enrich and/or classify domains under the        categories of: (a) organizational, company, or unknown domain        names, or (b) domains that are associated to public or private        email service providers. Mapping system 200 can monitor domains        reported on an IP address. Further, the system can compare        addresses (e.g., “mailbox@example.com”) to a threshold comparing        the number of free or paid email service addresses (e.g.,        “example1@gmail.com,” “example2@hotmail.com,” etc.) to the        number of addresses at the target domain (e.g.,        “user@example.com”). Ratios that are excessively high of free or        paid email service domains typically imply non-commercial or        non-business activities occurring that involves a high number of        outsiders with respect to an organization. For example, a high        number of outsiders can occur if an organization is hosting a        conference, training seminars, etc. Thus, in some embodiments,        for a target domain to be considered for mapping to an        organization, the target domain (“example.com”) should represent        at least 40% of the dataset(s) received by the mapping system.        In other embodiments, the target domain should represent at        least 50%, at least 60%, or more of the dataset(s). In other        embodiments, there are cases in which a target domain represents        a lower amount (e.g., less than 40%, less than 30%, or less) of        the dataset(s) received by the mapping system. For example,        there may exist organizations (e.g., manufacturing or        warehousing companies) that have a set of employees (e.g., line        personnel, factory floor workers, pickers, packers, etc.) that        do not utilize their corporate email addresses but do utilize        personal email address (e.g., free or paid email service). In        such a case, the target domain related to such an company would        represent less than what is expected for other organizations,        such as one having office workers that frequently utilize their        corporate email address.    -   Mapping system 200 can join one or more other datasets to enrich        information about a given IP address that can help improve and        increase quality of the outputted association to an        organization. For example, another dataset may reveal        information about which IP addresses have captive portals        present on them, which could identify a possible guest network.        If such information exists, then adjustments can be made to        rules for assessing an IP address, such as the concentration        required for the number of unique mailboxes of a particular        domain across all mailboxes observed on that IP address for a        certain duration of time.    -   Mapping system 200 can aggregate multiple domains known to        exclusively belong to an organization and treat these domains as        one pseudo-domain. For example, an organization using        “example.com” and “example.io” as email domains are considered        as one domain. Similarly, parent and subsidiary domains may also        be aggregated by the system as one pseudo-domain.    -   Mapping system 200 can monitor unique domains on an IP address        for domains that map to organizations other than the target        organization. The IP address may be associated with the domain        with the highest number of unique mailboxes.    -   If an IP address is already known to conclusively belong to a        particular company or organization, other characteristics of the        target network may be inferred. For example, if the lifespan of        domain observations on an IP address are brief, or the domains        themselves vary, mapping system 200 can determine that the IP        address is used as part of an open or shared network, such as        those at cafes or hotels, or guest networks within        organizations.    -   Any threshold used by mapping system 200 to determine a        candidate association, terminate an existing candidate        association, etc., considers the variance within the entire        population of events, as the characteristics of these datasets        (volume, frequency, etc.) is dependent on the actions of the        customers of the email service provider or the users themselves.        These actions may depend on real-world events, holidays,        promotions, etc. For example, if it is a holiday for an IP        address that geolocates to the United States, then there may be        a significant variance between telemetry (received dataset(s))        between the days preceding and after the holiday, if, for        instance, employees are allowed to take the day off from work on        the holiday or observed holiday. As such, no telemetry may be        received on the holiday for the given association, which is        unusual but understandably expected for a system having context        in these scenarios.

In some embodiments, mapping system 200 can use a training dataset thatincludes one or more elements of the attributes described above toidentify a pattern. The system may accept or reject the attribute basedon the identified pattern. For example, telemetry from networks known tobe public access networks can be trained in a predictive model that canbe then used to identify other public access network candidates. Thesepublic access network candidates can be treated differently by themapping system such that they are associated or not associated with aparticular organization. Feedback from third parties, such as thoseorganizations to which the IP addresses or domains are being associatedcan be injected back into the training dataset to allow the feedback topropagate to other organizations. For example, a company could provideinformation regarding the access characterizations of their network,such as the IP addresses reserved for employee devices, or those IPaddresses associated with a sales office of the company. Thisinformation can then be used to identify other candidates fitting thoseattributes belonging to other organizations.

In some embodiments, once a candidate relationship between an IP addressand a domain is established, one or more of the following actions may beused to confirm and map the IP or domain to an organization into asecurity risk management system, such as one described in commonly ownedU.S. Pat. No. 9,438,615, issued Sep. 6, 2016 and titled “Security RiskManagement,” which is incorporated herein in its entirety. The actionsby mapping system 200 can include:

-   -   If the domain is known to belong to a company within the context        of previously identified organization mappings, the domain can        be referenced in an existing database that includes        domain-to-organization relationships, and the IP address can be        added to the map of the one or more organizations returned.    -   If the IP address is known to belong to an organization within        the context of the existing organization map, the IP address can        be referenced in the existing database consisting of        IP-to-organization relationships, and then the domain could be        added to the mapping of the one or more organizations returned.    -   If neither the domain nor the IP address are known to belong to        an organization within the context of the existing company maps,        a new company may be initiated and associated with the domain,        and the IP address associated to that company.

In other embodiments, the candidate association (IP address or domain)may not be immediately added to an organization map, but continuouslymonitored for changes or for confidence-building metrics as describedearlier.

In some embodiments, once an IP address or domain is associated to anorganization, a timestamp can be used to indicate the start of thatassociation, which is known as the “start date.” The specific value ofthe “start date” may depend on the quality metrics described above. Insome embodiments, the exemplary system may continuously monitor thedataset(s), thus facilitating continual identification of candidates,including monitoring for candidates that have already been added to thesystem. In some embodiments, after some period of not observing acandidate data in the received dataset(s) an “end date” can be appliedto the candidate data to mark the termination of use of that IP addressor domain by that organization. A threshold for the period of inactivitymay depend on the organization. For example, for a company, thethreshold may depend on the employee count or number of unique mailboxesobserved before the company was added to the mapping system.

In embodiments in which the IP address and domain are already known tobe associated to an organization, the above-described techniques mayreveal attributes about the target networks (that include theorganization and users) that may have been previously unknown. Forexample, the exemplary system can determine whether an IP address ispredominantly used as a guest network by assessing the diversity ofdomains known to belong to other organizations making requests from thatIP address.

In some embodiments, even if an organization is not associated with anIP address or domain name, these methods and systems described hereincan learn characteristics of those networks or domains. For example, theeven or strong presence of free or paid email service provider addressesrelative to organization addresses, while the absolute count isrelatively low, may reveal that the network is of an individualresidence. For example, if the mapping system is able to identify (a)two distinct free or paid email service provider addresses and (b) oneor two different addresses belonging to two different organizations,then the network may be considered a residence. The data pointsbelonging to such a network could then subsequently be excluded infuture analytic runs to improve efficiency of the exemplary system. Insome embodiments, these networks could be labeled as residential andthis information can be used as an input to, for example, improveefficiency in processing. Alternatively, a network with very highabsolute number of mailbox and domain pairs in which no particularorganization domain is prominent, in addition to a high concentration offree or paid email service provider addresses, may reveal a commontransit network for a service provider, such as cellular networks orpublic Virtual Private Network (VPN) provider. This can be function ofthe number of users on the particular network. For example, an airportthat services 10,000 passengers a day, in which 1,000 are connected tothe Wi-Fi network may each work at different companies, but mayadditionally each own a personal email address on a free or paid emailservice. In this case, the maximum number of addresses for a giventarget organization domain is one.

Computer-Based Implementations

In some examples, some or all of the processing described above can becarried out on a personal computing device, on one or more centralizedcomputing devices, or via cloud-based processing by one or more servers.In some examples, some types of processing occur on one device and othertypes of processing occur on another device. In some examples, some orall of the data described above can be stored on a personal computingdevice, in data storage hosted on one or more centralized computingdevices, or via cloud-based storage. In some examples, some data arestored in one location and other data are stored in another location. Insome examples, quantum computing can be used. In some examples,functional programming languages can be used. In some examples,electrical memory, such as flash-based memory, can be used.

FIG. 4 is a block diagram of an example computer system 400 that may beused in implementing the technology described in this document.General-purpose computers, network appliances, mobile devices, or otherelectronic systems may also include at least portions of the system 400.The system 400 includes a processor 410, a memory 420, a storage device430, and an input/output device 440. Each of the components 410, 420,430, and 440 may be interconnected, for example, using a system bus 450.The processor 410 is capable of processing instructions for executionwithin the system 400. In some implementations, the processor 410 is asingle-threaded processor. In some implementations, the processor 610 isa multi-threaded processor. The processor 410 is capable of processinginstructions stored in the memory 420 or on the storage device 430.

The memory 420 stores information within the system 400. In someimplementations, the memory 420 is a non-transitory computer-readablemedium. In some implementations, the memory 420 is a volatile memoryunit. In some implementations, the memory 420 is a nonvolatile memoryunit.

The storage device 430 is capable of providing mass storage for thesystem 400. In some implementations, the storage device 430 is anon-transitory computer-readable medium. In various differentimplementations, the storage device 430 may include, for example, a harddisk device, an optical disk device, a solid-date drive, a flash drive,or some other large capacity storage device. For example, the storagedevice may store long-term data (e.g., database data, file system data,etc.). The input/output device 440 provides input/output operations forthe system 400. In some implementations, the input/output device 440 mayinclude one or more of a network interface devices, e.g., an Ethernetcard, a serial communication device, e.g., an RS-232 port, and/or awireless interface device, e.g., an 802.11 card, a 3G wireless modem, ora 4G wireless modem. In some implementations, the input/output devicemay include driver devices configured to receive input data and sendoutput data to other input/output devices, e.g., keyboard, printer anddisplay devices 460. In some examples, mobile computing devices, mobilecommunication devices, and other devices may be used.

In some implementations, at least a portion of the approaches describedabove may be realized by instructions that upon execution cause one ormore processing devices to carry out the processes and functionsdescribed above. Such instructions may include, for example, interpretedinstructions such as script instructions, or executable code, or otherinstructions stored in a non-transitory computer readable medium. Thestorage device 430 may be implemented in a distributed way over anetwork, such as a server farm or a set of widely distributed servers,or may be implemented in a single computing device.

Although an example processing system has been described in FIG. 4,embodiments of the subject matter, functional operations and processesdescribed in this specification can be implemented in other types ofdigital electronic circuitry, in tangibly-embodied computer software orfirmware, in computer hardware, including the structures disclosed inthis specification and their structural equivalents, or in combinationsof one or more of them. Embodiments of the subject matter described inthis specification can be implemented as one or more computer programs,i.e., one or more modules of computer program instructions encoded on atangible nonvolatile program carrier for execution by, or to control theoperation of, data processing apparatus. Alternatively or in addition,the program instructions can be encoded on an artificially generatedpropagated signal, e.g., a machine-generated electrical, optical, orelectromagnetic signal that is generated to encode information fortransmission to suitable receiver apparatus for execution by a dataprocessing apparatus. The computer storage medium can be amachine-readable storage device, a machine-readable storage substrate, arandom or serial access memory device, or a combination of one or moreof them.

The term “system” may encompass all kinds of apparatus, devices, andmachines for processing data, including by way of example a programmableprocessor, a computer, or multiple processors or computers. A processingsystem may include special purpose logic circuitry, e.g., an FPGA (fieldprogrammable gate array) or an ASIC (application specific integratedcircuit). A processing system may include, in addition to hardware, codethat creates an execution environment for the computer program inquestion, e.g., code that constitutes processor firmware, a protocolstack, a database management system, an operating system, or acombination of one or more of them.

A computer program (which may also be referred to or described as aprogram, software, a software application, a module, a software module,a script, or code) can be written in any form of programming language,including compiled or interpreted languages, or declarative orprocedural languages, and it can be deployed in any form, including as astandalone program or as a module, component, subroutine, or other unitsuitable for use in a computing environment. A computer program may, butneed not, correspond to a file in a file system. A program can be storedin a portion of a file that holds other programs or data (e.g., one ormore scripts stored in a markup language document), in a single filededicated to the program in question, or in multiple coordinated files(e.g., files that store one or more modules, sub programs, or portionsof code). A computer program can be deployed to be executed on onecomputer or on multiple computers that are located at one site ordistributed across multiple sites and interconnected by a communicationnetwork.

The processes and logic flows described in this specification can beperformed by one or more programmable computers executing one or morecomputer programs to perform functions by operating on input data andgenerating output. The processes and logic flows can also be performedby, and apparatus can also be implemented as, special purpose logiccircuitry, e.g., an FPGA (field programmable gate array) or an ASIC(application specific integrated circuit).

Computers suitable for the execution of a computer program can include,by way of example, general or special purpose microprocessors or both,or any other kind of central processing unit. Generally, a centralprocessing unit will receive instructions and data from a read-onlymemory or a random access memory or both. A computer generally includesa central processing unit for performing or executing instructions andone or more memory devices for storing instructions and data. Generally,a computer will also include, or be operatively coupled to receive datafrom or transfer data to, or both, one or more mass storage devices forstoring data, e.g., magnetic, magneto optical disks, or optical disks.However, a computer need not have such devices. Moreover, a computer canbe embedded in another device, e.g., a mobile telephone, a personaldigital assistant (PDA), a mobile audio or video player, a game console,a Global Positioning System (GPS) receiver, or a portable storage device(e.g., a universal serial bus (USB) flash drive), to name just a few.

Computer readable media suitable for storing computer programinstructions and data include all forms of nonvolatile memory, media andmemory devices, including by way of example semiconductor memorydevices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks,e.g., internal hard disks or removable disks; magneto optical disks; andCD-ROM and DVD-ROM disks. The processor and the memory can besupplemented by, or incorporated in, special purpose logic circuitry.

To provide for interaction with a user, embodiments of the subjectmatter described in this specification can be implemented on a computerhaving a display device, e.g., a CRT (cathode ray tube) or LCD (liquidcrystal display) monitor, for displaying information to the user and akeyboard and a pointing device, e.g., a mouse or a trackball, by whichthe user can provide input to the computer. Other kinds of devices canbe used to provide for interaction with a user as well; for example,feedback provided to the user can be any form of sensory feedback, e.g.,visual feedback, auditory feedback, or tactile feedback; and input fromthe user can be received in any form, including acoustic, speech, ortactile input. In addition, a computer can interact with a user bysending documents to and receiving documents from a device that is usedby the user; for example, by sending web pages to a web browser on auser's user device in response to requests received from the webbrowser.

Embodiments of the subject matter described in this specification can beimplemented in a computing system that includes a back end component,e.g., as a data server, or that includes a middleware component, e.g.,an application server, or that includes a front end component, e.g., aclient computer having a graphical user interface or a Web browserthrough which a user can interact with an implementation of the subjectmatter described in this specification, or any combination of one ormore such back end, middleware, or front end components. The componentsof the system can be interconnected by any form or medium of digitaldata communication, e.g., a communication network. Examples ofcommunication networks include a local area network (“LAN”) and a widearea network (“WAN”), e.g., the Internet.

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other.

While this specification contains many specific implementation details,these should not be construed as limitations on the scope of what may beclaimed, but rather as descriptions of features that may be specific toparticular embodiments. Certain features that are described in thisspecification in the context of separate embodiments can also beimplemented in combination in a single embodiment. Conversely, variousfeatures that are described in the context of a single embodiment canalso be implemented in multiple embodiments separately or in anysuitable sub-combination. Moreover, although features may be describedabove as acting in certain combinations and even initially claimed assuch, one or more features from a claimed combination can in some casesbe excised from the combination, and the claimed combination may bedirected to a sub-combination or variation of a sub-combination.

Similarly, while operations are depicted in the drawings in a particularorder, this should not be understood as requiring that such operationsbe performed in the particular order shown or in sequential order, orthat all illustrated operations be performed, to achieve desirableresults. In certain circumstances, multitasking and parallel processingmay be advantageous. Moreover, the separation of various systemcomponents in the embodiments described above should not be understoodas requiring such separation in all embodiments, and it should beunderstood that the described program components and systems cangenerally be integrated together in a single software product orpackaged into multiple software products.

Particular embodiments of the subject matter have been described. Otherembodiments are within the scope of the following claims. For example,the actions recited in the claims can be performed in a different orderand still achieve desirable results. As one example, the processesdepicted in the accompanying figures do not necessarily require theparticular order shown, or sequential order, to achieve desirableresults. In certain implementations, multitasking and parallelprocessing may be advantageous. Other steps or stages may be provided,or steps or stages may be eliminated, from the described processes.Accordingly, other implementations are within the scope of the followingclaims.

Terminology

The phraseology and terminology used herein is for the purpose ofdescription and should not be regarded as limiting.

The term “approximately”, the phrase “approximately equal to”, and othersimilar phrases, as used in the specification and the claims (e.g., “Xhas a value of approximately Y” or “X is approximately equal to Y”),should be understood to mean that one value (X) is within apredetermined range of another value (Y). The predetermined range may beplus or minus 20%, 10%, 5%, 3%, 1%, 0.1%, or less than 0.1%, unlessotherwise indicated. The indefinite articles “a” and “an,” as used inthe specification and in the claims, unless clearly indicated to thecontrary, should be understood to mean “at least one.” The phrase“and/or,” as used in the specification and in the claims, should beunderstood to mean “either or both” of the elements so conjoined, i.e.,elements that are conjunctively present in some cases and disjunctivelypresent in other cases. Multiple elements listed with “and/or” should beconstrued in the same fashion, i.e., “one or more” of the elements soconjoined. Other elements may optionally be present other than theelements specifically identified by the “and/or” clause, whether relatedor unrelated to those elements specifically identified. Thus, as anon-limiting example, a reference to “A and/or B”, when used inconjunction with open-ended language such as “comprising” can refer, inone embodiment, to A only (optionally including elements other than B);in another embodiment, to B only (optionally including elements otherthan A); in yet another embodiment, to both A and B (optionallyincluding other elements); etc.

As used in the specification and in the claims, “or” should beunderstood to have the same meaning as “and/or” as defined above. Forexample, when separating items in a list, “or” or “and/or” shall beinterpreted as being inclusive, i.e., the inclusion of at least one, butalso including more than one, of a number or list of elements, and,optionally, additional unlisted items. Only terms clearly indicated tothe contrary, such as “only one of” or “exactly one of,” or, when usedin the claims, “consisting of,” will refer to the inclusion of exactlyone element of a number or list of elements. In general, the term “or”as used shall only be interpreted as indicating exclusive alternatives(i.e. “one or the other but not both”) when preceded by terms ofexclusivity, such as “either,” “one of,” “only one of,” or “exactly oneof.” “Consisting essentially of,” when used in the claims, shall haveits ordinary meaning as used in the field of patent law.

As used in the specification and in the claims, the phrase “at leastone,” in reference to a list of one or more elements, should beunderstood to mean at least one element selected from any one or more ofthe elements in the list of elements, but not necessarily including atleast one of each and every element specifically listed within the listof elements and not excluding any combinations of elements in the listof elements. This definition also allows that elements may optionally bepresent other than the elements specifically identified within the listof elements to which the phrase “at least one” refers, whether relatedor unrelated to those elements specifically identified. Thus, as anon-limiting example, “at least one of A and B” (or, equivalently, “atleast one of A or B,” or, equivalently “at least one of A and/or B”) canrefer, in one embodiment, to at least one, optionally including morethan one, A, with no B present (and optionally including elements otherthan B); in another embodiment, to at least one, optionally includingmore than one, B, with no A present (and optionally including elementsother than A); in yet another embodiment, to at least one, optionallyincluding more than one, A, and at least one, optionally including morethan one, B (and optionally including other elements); etc.

The use of “including,” “comprising,” “having,” “containing,”“involving,” and variations thereof, is meant to encompass the itemslisted thereafter and additional items.

Use of ordinal terms such as “first,” “second,” “third,” etc., in theclaims to modify a claim element does not by itself connote anypriority, precedence, or order of one claim element over another or thetemporal order in which acts of a method are performed. Ordinal termsare used merely as labels to distinguish one claim element having acertain name from another element having a same name (but for use of theordinal term), to distinguish the claim elements.

What is claimed is:
 1. A computer-implemented method for mappingInternet Protocol (IP) addresses and domain names to organizations, themethod comprising: receiving, by a mapping system from a data provider,a dataset related to a plurality of users of the data provider, thedataset having at least one of: (a) an IP address for a user device ofeach user of the plurality of users, or (b) a domain name for a useraccount of each user of the plurality of users; enriching, by ananalytics engine of the mapping system, the received dataset withenrichment data from an enrichment source, wherein enriching thereceived dataset comprises: determining whether a network of an IPaddress of the user is (i) of a cellular network or a guest network, and(ii) whether the domain of the email service provider is a free or paidemail service provider domain, and adding information related to thedetermined network and domain to the received dataset; receiving, by theanalytics engine from a storage medium, historical data relevant to theenriched dataset; and mapping, by the analytics engine, at least one of(i) the IP address or (ii) the domain name of each user of a portion ofthe plurality of users to an organization based on the enriched datasetand the historical data.
 2. The method of claim 1, wherein the dataprovider is an email service provider and the plurality of users is aplurality of email users that send or receive email through the emailservice provider.
 3. The method of claim 1, wherein the data provider isa messaging service provider and the plurality of users is a pluralityof messaging users that send or receive messages through the messagingservice provider.
 4. The method of claim 1, wherein the data provider isa website that requires registration for use of the website by theplurality of users.
 5. The method of claim 1, wherein the data provideris a cryptography-related service that provides at least one of the IPaddress or domain name of each of the plurality of users.
 6. The methodof claim 1, wherein the historical data includes at least one ofpreviously mapped IP addresses or previously mapped domain names of atleast a portion of the plurality of users to the organization.
 7. Themethod of claim 1, further comprising: normalizing, by a collector ofthe mapping system, the received dataset.
 8. The method of claim 7,wherein normalizing the received data further comprises at least one of:(i) checking integrity of the dataset; (ii) reformatting a portion ofthe dataset; (iii) removing duplicates in the dataset; or (iv) removingirrelevant data from the dataset.
 9. The method of claim 7, furthercomprising: storing, by the storage medium, the normalized datasetbefore enriching by the analytics engine; and receiving, by theanalytics engine, the normalized dataset from the storage medium. 10.The method of claim 1, further comprising: receiving, by the analyticsengine from an entity management system, information about existingassociations of organizations to IP addresses and domain names; andmapping, by the analytics engine, at least one of (i) the IP address or(ii) the domain name of a portion of the plurality of users to theorganization based on the information about existing associations. 11.The method of claim 1, further comprising: storing, by the storagemedium, the enriched data from the analytics engine.
 12. The method ofclaim 1, wherein the historical data includes a greater number of datapoints over time than data points of the dataset.
 13. The method ofclaim 1, further comprising: applying a predictive model of the mappingsystem to the processed dataset and the historical data.
 14. The methodof claim 13, further comprising: processing, by the predictive model,two or more datasets over a time period, the two or more datasetsincluding data related to a common set of users of the plurality ofusers; determining, by the predictive model, whether the IP address ofeach of at least a portion of the common set of users are consistentover the time period; and mapping, by the mapping system, the IP addressof each of the at least the portion of the common set of users to theorganization based on the determination.
 15. A computer-implementedmethod for mapping Internet Protocol (IP) addresses and domain names toorganizations, the method comprising: receiving, by a mapping systemfrom a data provider, a dataset related to a plurality of users of thedata provider, the dataset having at least one of: (a) an IP address fora user device of each user of the plurality of users, or (b) a domainname for a user account of each user of the plurality of users;enriching, by an analytics engine of the mapping system, the receiveddataset with enrichment data from an enrichment source, whereinenriching the received dataset comprises: determining whether a networkof an IP address of the user is (i) of a cellular network or a guestnetwork and adding information related to the determined network to thereceived dataset; receiving, by the analytics engine from a storagemedium, historical data relevant to the enriched dataset; mapping, bythe analytics engine, at least one of (i) the IP address or (ii) thedomain name of each user of a portion of the plurality of users to anorganization based on the enriched dataset and the historical data; andapplying deterministic rules to the enriched dataset and the historicaldata.
 16. The method of claim 1, wherein the dataset is a first datasetand the plurality of email users is a first plurality of email users,the method further comprising: receiving, by the analytics engine, asecond dataset associated with a second plurality of email users, thesecond plurality of email users mutually non-exclusive with the firstplurality of email users; comparing, by the analytics engine, the seconddataset to the first dataset; and terminating, by the analytics engine,one or more existing mappings between the at least one of (i) the IPaddress or (ii) the domain name and the organization based on thecomparison.
 17. The method of claim 16, wherein the terminating, by theanalytics engine, one or more existing mappings is based on a threshold.18. The method of claim 1, further comprising: storing, by the storagemedium, the mapping of the IP address and domain name to theorganization.
 19. The method of claim 1, wherein information related tothe determined network comprises at least one of: (i) a service setidentifier (SSID); (ii) a basic SSID (BSSID); (iii) a proxy, (iv) one ormore associated devices; (v) associated IPv4 address or IPv6 address; or(vi) domain name system (DNS) record.
 20. The method of claim 15,wherein the deterministic rules comprise a minimum number of uniquemailboxes associated with an IP address, the method further comprising:mapping, by the mapping system, the IP address to the organization basedwhether one or more received datasets have the minimum or greater numberof unique mailboxes associated with the IP address.