Movatterモバイル変換


[0]ホーム

URL:


US20180255076A1 - System and Method for Cyber Security Threat Detection - Google Patents

System and Method for Cyber Security Threat Detection
Download PDF

Info

Publication number
US20180255076A1
US20180255076A1US15/699,765US201715699765AUS2018255076A1US 20180255076 A1US20180255076 A1US 20180255076A1US 201715699765 AUS201715699765 AUS 201715699765AUS 2018255076 A1US2018255076 A1US 2018255076A1
Authority
US
United States
Prior art keywords
endpoint
information
endpoints
activity
threat
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/699,765
Inventor
Jeffrey Paine
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Responsight Pty Ltd
Original Assignee
Responsight Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Responsight Pty LtdfiledCriticalResponsight Pty Ltd
Priority to US15/699,765priorityCriticalpatent/US20180255076A1/en
Assigned to ResponSight Pty LtdreassignmentResponSight Pty LtdASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PAINE, Jeffrey
Priority to US15/811,385prioritypatent/US10701089B2/en
Priority to PCT/IB2018/000396prioritypatent/WO2018158643A1/en
Publication of US20180255076A1publicationCriticalpatent/US20180255076A1/en
Priority to US16/909,627prioritypatent/US20200329058A1/en
Priority to US17/859,868prioritypatent/US20220353282A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system comprises a plurality of collector engines. Each of the collector engines is previously installed on an endpoint of a plurality of endpoints and configured to acquire statistical information at the endpoint. The statistical information includes behavioral information, resource information, and metric information associated with the endpoint. The system further comprises an aggregator engine configured to aggregate the statistical information from each of the endpoints into aggregated information. The system further comprises an analytics engine configured to receive the aggregated information, and to invoke learning models to output deviation information for each of the endpoints based on the aggregated information and expected fingerprints associated with the endpoints. The system further comprises an alerting engine configured to issue one or more alerts indicating one or more security threats have occurred for each of the endpoints in response to the deviation information for the endpoint.

Description

Claims (28)

What is claimed is:
1. A cyber security threat detection system for one or more endpoints within a computing environment, the system comprising:
a plurality of collector engines, each of the collector engines previously installed on an endpoint of a plurality of endpoints and configured to acquire statistical information at the endpoint, wherein the statistical information includes behavioral information and resource information associated with the endpoint;
an aggregator engine configured to aggregate the statistical information from each of the endpoints into aggregated information;
an analytics engine configured to receive the aggregated information, and to invoke learning models to output deviation information for each of the endpoints based on the aggregated information and expected fingerprints associated with the endpoints; and
an alerting engine configured to issue one or more alerts indicating one or more security threats have occurred for each of the endpoints in response to the deviation information for the endpoint.
2. The system ofclaim 1, wherein:
the analytics engine is further configured to generate a cumulative risk level based on the deviation information, and
the alerting engine is configured to issue the alerts in response to the cumulative risk level.
3. The system ofclaim 1, wherein:
the behavioral information includes activity events associated with the endpoint, and
the resource information includes central processing unit (CPU) utilization, memory footprint, disk free space, and network throughput of the endpoint.
4. The system ofclaim 1, wherein the analytics engine is implemented within a cloud service on one or more secure servers communicating within a network.
5. The system ofclaim 4, wherein the aggregated information is assembled in data bundles and transmitted by the aggregator engine to the analytics engine.
6. The system ofclaim 1, wherein the analytics engine comprises:
a behavioral analytics engine configured to invoke the analytics rules to output some information of the deviation information, and
a metric analytics engine configured to invoke the machine learning models to output other information of the deviation information.
7. The system ofclaim 1, wherein the analytics engine is further configured to perform individual metrics checking, historical and cross endpoint comparatives, and activity sequences using the aggregated information and the expected fingerprints associated with the endpoints.
8. The system ofclaim 1, wherein the analytics engine performs analysis of activity sequences from the behavioral information associated with the endpoint including a determination whether specific metrics are absent from any of the activity sequences.
9. The system ofclaim 1, wherein the analytics engine performs analysis of activity sequences from the behavior information associated with the endpoint including a determination whether one or more specific activities have occurred.
10. The system ofclaim 1, wherein to invoke the analytics rules and machine learning models to output the deviation information for each of the endpoints, the analytics engine further invokes a profile management handler that compares the aggregated information to the expected fingerprints and provides results of the comparison.
11. The system ofclaim 1, wherein:
the deviation information are associated with a plurality of categories of threat, each of the categories of threat associated with a specific risk value, and
some categories of threat comprise risk values that are weighted differently from risk values of other categories of threat.
12. The system ofclaim 1, wherein:
to issue the alerts indicating the security threats for each of the endpoints, the alerting system determines whether an alert is to be issued based on a cumulative risk level, the cumulative risk level being a summation of specific risk values associated with one or more categories of threat that are associated with the deviation information, wherein each category of threat is associated with one of the specific risk values that is registered each time an associated trigger event occurs, and
the alert is to be issued in response to a determination that the cumulative risk level exceeds a risk threshold.
13. The system ofclaim 12, wherein some categories of threat comprise risk values that are weighted differently from risk values of other categories of threat.
14. The system ofclaim 13, wherein:
a baseline level is computed over time for the cumulative risk level,
value excursions for the cumulative risk level with respect to the baseline level are tracked over time, and
the risk threshold is computed based on the tracked excursions.
15. The system ofclaim 1, wherein the behavioral information for the endpoint include at least one of the following: firewall metric, internet protocol (IP) address metric, activity counter metric, process information metric, keyboard metric, and mouse metric.
16. The system ofclaim 1, wherein the behavioral information for the endpoint include at least one of the following: mouse telemetry, keyboard connections and activations, process usage, and hot desk information.
17. The system ofclaim 1, wherein each of the security threats is classified as at least one of the following: manual or automated, malware or custom, hardware or software, and internal or external.
18. The system ofclaim 17, wherein the security threats that have occurred include security threats from different classifications that are concurrently present.
19. The system ofclaim 7, wherein the activity sequences include an activity sequence associated with an endpoint user remotely logging into the endpoint using stolen credentials.
20. The system ofclaim 7, wherein the activity sequences include an activity sequence associated with an endpoint user logging into the endpoint using stolen credentials or using an unlocked endpoint.
21. The system ofclaim 7, wherein the activity sequences include an activity sequence associated with a cyber attack using commands stored in a universal serial bus (USB) device.
22. The system ofclaim 7, wherein the activity sequences include an activity sequence associated with a cyber attack performed by attaching to a privileged process with reverse shell access.
23. The system ofclaim 1, wherein the alerting engine is further configured to issue no alert in response to a determination that an authorized user successfully answers a challenge sent out of band (OoB).
24. The system ofclaim 1, wherein:
the alerting engine is further configured to send a text message to a security administrator from a specific phone number, and
a mobile device of the security administrator is programmed to respond with a specific tone when a time critical alert is generated.
25. The system ofclaim 1, further comprising:
a prediction engine configured to predict patterns of a software application based on a determined probability and context of an endpoint user, and to traverse an alert threshold according to the determined probability when operating patterns of the software application diverge from the predicted patterns.
26. A method for detecting cyber security threat of one or more endpoints within a computing environment, the method comprising:
receiving aggregated information including statistical information from each of the endpoints, wherein the statistical information includes behavioral information and resource information associated with the endpoint;
invoking learning models to output deviation information for each of the endpoints based on the aggregated information and expected fingerprints associated with the endpoints; and
issuing one or more alerts indicating one or more security threats have occurred for each of the endpoints in response to the deviation information for the endpoint;
wherein issuing the alerts comprising:
determining whether an alert is to be issued based on a cumulative risk level, the cumulative risk level being a summation of specific risk values associated with one or more categories of threat that are associated with the deviation information, wherein each category of threat is associated with one of the specific risk values that is registered each time an associated trigger event occurs, and
issuing the alert in response to a determination that the cumulative risk level exceeds a risk threshold.
27. The method ofclaim 26, wherein some categories of threat comprise risk values that are weighted differently from risk values of other categories of threat.
28. The method ofclaim 27, further comprising:
computing a baseline level over time for the cumulative risk level,
tracking, over time, value excursions for the cumulative risk level with respect to the baseline level, and
computing the risk threshold based on the tracked excursions.
US15/699,7652017-03-022017-09-08System and Method for Cyber Security Threat DetectionAbandonedUS20180255076A1 (en)

Priority Applications (5)

Application NumberPriority DateFiling DateTitle
US15/699,765US20180255076A1 (en)2017-03-022017-09-08System and Method for Cyber Security Threat Detection
US15/811,385US10701089B2 (en)2017-03-022017-11-13System and method for cyber security threat detection
PCT/IB2018/000396WO2018158643A1 (en)2017-03-022018-03-01System and method for cyber security threat detection
US16/909,627US20200329058A1 (en)2017-03-022020-06-23System and Method for Cyber Security Threat Detection
US17/859,868US20220353282A1 (en)2017-03-022022-07-07System and Method for Cyber Security Threat Detection

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201762466279P2017-03-022017-03-02
US15/699,765US20180255076A1 (en)2017-03-022017-09-08System and Method for Cyber Security Threat Detection

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/811,385ContinuationUS10701089B2 (en)2017-03-022017-11-13System and method for cyber security threat detection

Publications (1)

Publication NumberPublication Date
US20180255076A1true US20180255076A1 (en)2018-09-06

Family

ID=63355377

Family Applications (8)

Application NumberTitlePriority DateFiling Date
US15/699,777Active2038-04-19US10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection
US15/699,765AbandonedUS20180255076A1 (en)2017-03-022017-09-08System and Method for Cyber Security Threat Detection
US15/811,385Active2038-03-11US10701089B2 (en)2017-03-022017-11-13System and method for cyber security threat detection
US15/905,686AbandonedUS20180255080A1 (en)2017-03-022018-02-26System and Method for Cyber Security Threat Detection
US16/909,627AbandonedUS20200329058A1 (en)2017-03-022020-06-23System and Method for Cyber Security Threat Detection
US16/926,507AbandonedUS20200412747A1 (en)2017-03-022020-07-10System and Method for Cyber Security Threat Detection
US17/859,868AbandonedUS20220353282A1 (en)2017-03-022022-07-07System and Method for Cyber Security Threat Detection
US17/868,602AbandonedUS20220368707A1 (en)2017-03-022022-07-19System and Method for Cyber Security Threat Detection

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US15/699,777Active2038-04-19US10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection

Family Applications After (6)

Application NumberTitlePriority DateFiling Date
US15/811,385Active2038-03-11US10701089B2 (en)2017-03-022017-11-13System and method for cyber security threat detection
US15/905,686AbandonedUS20180255080A1 (en)2017-03-022018-02-26System and Method for Cyber Security Threat Detection
US16/909,627AbandonedUS20200329058A1 (en)2017-03-022020-06-23System and Method for Cyber Security Threat Detection
US16/926,507AbandonedUS20200412747A1 (en)2017-03-022020-07-10System and Method for Cyber Security Threat Detection
US17/859,868AbandonedUS20220353282A1 (en)2017-03-022022-07-07System and Method for Cyber Security Threat Detection
US17/868,602AbandonedUS20220368707A1 (en)2017-03-022022-07-19System and Method for Cyber Security Threat Detection

Country Status (2)

CountryLink
US (8)US10728261B2 (en)
WO (1)WO2018158643A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110912906A (en)*2019-11-282020-03-24南方电网科学研究院有限责任公司 A method for identifying malicious nodes in edge computing
US10673886B1 (en)*2019-09-262020-06-02Packetsled, Inc.Assigning and representing security risks on a computer network
US10922409B2 (en)*2018-04-102021-02-16Microsoft Technology Licensing, LlcDeep reinforcement learning technologies for detecting malware
US11204994B2 (en)*2019-05-092021-12-21International Business Machines CorporationInjection attack identification and mitigation
WO2022027572A1 (en)*2020-08-072022-02-10Nokia Shanghai Bell Co., Ltd.Security management service in management plane
US11265339B1 (en)2020-12-152022-03-01Senseon Tech LtdNetwork traffic monitoring
US20220075872A1 (en)*2020-01-272022-03-10Limited Liability Company "Group Ib Tds"Method and system for detecting malicious infrastructure
US11438357B2 (en)2018-06-222022-09-06Senseon Tech LtdEndpoint network sensor and related cybersecurity infrastructure
US11477219B2 (en)*2018-02-202022-10-18Darktrace Holdings LimitedEndpoint agent and system
US11483326B2 (en)*2019-08-302022-10-25Palo Alto Networks, Inc.Context informed abnormal endpoint behavior detection
US11516233B2 (en)2018-06-222022-11-29Senseon Tech LtdCyber defense system
US11522895B2 (en)2019-10-222022-12-06Senseon Tech LtdAnomaly detection
NL2030861A (en)*2021-06-012022-12-08Trust LtdSystem and method for external monitoring a cyberattack surface
JP2023060953A (en)*2021-10-192023-05-01株式会社日立製作所 Attack scenario analysis device and attack scenario analysis method
US20240031393A1 (en)*2022-07-222024-01-25Astron Security Inc.Ai-based security risk prediction system and method for targets to be protected in cloud environment
US20240089091A1 (en)*2022-09-132024-03-14Capital One Services, LlcSecure cryptographic transfer using multiparty computation
US11962552B2 (en)2018-02-202024-04-16Darktrace Holdings LimitedEndpoint agent extension of a machine learning cyber defense system for email
US12088606B2 (en)2021-06-102024-09-10F.A.C.C.T. Network Security LlcSystem and method for detection of malicious network resources
US12143404B2 (en)2018-07-262024-11-12Senseon Tech LtdCyber defence system
US20240430285A1 (en)*2023-06-212024-12-26Saudi Arabian Oil CompanyMethod and system for integrated cybersecurity operations
US20250080553A1 (en)*2023-08-302025-03-06Expel, Inc.Systems, methods, and graphical user interfaces for configuring and executing one or more computer-executable threat hunting protocols in a cybersecurity threat detection and mitigation platform

Families Citing this family (96)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10902114B1 (en)*2015-09-092021-01-26ThreatQuotient, Inc.Automated cybersecurity threat detection with aggregation and analysis
US10931685B2 (en)*2016-12-122021-02-23Ut-Battelle, LlcMalware analysis and recovery
US10594576B2 (en)2017-01-312020-03-17Splunk Inc.Visualizing network activity involving networked computing devices distributed across network address spaces
DE212017000015U1 (en)*2017-03-032018-02-27Google Llc Systems for detecting inadvertent implementation of presentation of content items by applications running on client devices
US10943019B2 (en)2017-05-152021-03-09Forcepoint, LLCAdaptive trust profile endpoint
US10623431B2 (en)2017-05-152020-04-14Forcepoint LlcDiscerning psychological state from correlated user behavior and contextual information
US10129269B1 (en)2017-05-152018-11-13Forcepoint, LLCManaging blockchain access to user profile information
US10999296B2 (en)2017-05-152021-05-04Forcepoint, LLCGenerating adaptive trust profiles using information derived from similarly situated organizations
US9882918B1 (en)2017-05-152018-01-30Forcepoint, LLCUser behavior profile in a blockchain
US10447718B2 (en)2017-05-152019-10-15Forcepoint LlcUser profile definition and management
US10999297B2 (en)2017-05-152021-05-04Forcepoint, LLCUsing expected behavior of an entity when prepopulating an adaptive trust profile
US10917423B2 (en)2017-05-152021-02-09Forcepoint, LLCIntelligently differentiating between different types of states and attributes when using an adaptive trust profile
US10862927B2 (en)2017-05-152020-12-08Forcepoint, LLCDividing events into sessions during adaptive trust profile operations
JP6834768B2 (en)*2017-05-172021-02-24富士通株式会社 Attack detection method, attack detection program and relay device
US10540496B2 (en)*2017-09-292020-01-21International Business Machines CorporationDynamic re-composition of patch groups using stream clustering
US10757123B2 (en)*2018-01-252020-08-25Bank Of America CorporationDynamic record identification and analysis computer system with event monitoring components
US11347861B2 (en)2018-04-102022-05-31Raytheon CompanyControlling security state of commercial off the shelf (COTS) system
WO2020006562A1 (en)*2018-06-292020-01-02Rocus Group, LlcIntegrated security and threat prevention and detection device
US11423150B2 (en)2018-09-072022-08-23Raytheon CompanySystem and method for booting processors with encrypted boot image
US11178159B2 (en)*2018-09-072021-11-16Raytheon CompanyCross-domain solution using network-connected hardware root-of-trust device
US11916953B2 (en)*2018-09-242024-02-27Cybereason, Inc.Method and mechanism for detection of pass-the-hash attacks
US11868479B2 (en)*2018-11-022024-01-09Arizona Board Of Regents On Behalf Of The University Of ArizonaRuntime adaptive risk assessment and automated mitigation
US10630718B2 (en)*2018-11-272020-04-21BehavioSec IncDetection of remote fraudulent activity in a client-server-system
US11159555B2 (en)2018-12-032021-10-26Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11184385B2 (en)2018-12-032021-11-23Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11283825B2 (en)2018-12-032022-03-22Accenture Global Solutions LimitedLeveraging attack graphs of agile security platform
US11281806B2 (en)2018-12-032022-03-22Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11277432B2 (en)*2018-12-032022-03-15Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11048811B2 (en)*2018-12-192021-06-29Jpmorgan Chase Bank, N. A.Methods for big data usage monitoring, entitlements and exception analysis
CN111381567B (en)*2018-12-272021-11-05北京安控科技股份有限公司Safety detection system and method for industrial control system
US11431735B2 (en)2019-01-282022-08-30Orca Security LTD.Techniques for securing virtual machines
US11190488B1 (en)*2019-03-072021-11-30NortonLifeLock Inc.Adaptive security filtering on a client device
US11481486B2 (en)*2019-03-272022-10-25Webroot Inc.Behavioral threat detection engine
US11080391B2 (en)2019-03-272021-08-03Webroot Inc.Behavioral threat detection definition and compilation
US11080394B2 (en)2019-03-272021-08-03Webroot Inc.Behavioral threat detection virtual machine
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
US11363036B2 (en)*2019-03-282022-06-14Microsoft Technology Licensing, LlcDetecting a missing security alert using a machine learning model
WO2020205497A1 (en)2019-04-012020-10-08Raytheon CompanyRoot of trust assisted access control of secure encrypted drives
EP3948608B1 (en)2019-04-012023-04-26Raytheon CompanyAdaptive, multi-layer enterprise data protection & resiliency platform
US10853496B2 (en)2019-04-262020-12-01Forcepoint, LLCAdaptive trust profile behavioral fingerprint
US11245702B2 (en)2019-05-082022-02-08Red Hat, Inc.Security vulnerability assessment for users of a cloud computing environment
US10440011B1 (en)*2019-05-292019-10-08Capital One Services, LlcPassword protection in a computing environment
US11695795B2 (en)2019-07-122023-07-04Accenture Global Solutions LimitedEvaluating effectiveness of security controls in enterprise networks using graph values
RU2750629C2 (en)*2019-07-172021-06-30Акционерное общество "Лаборатория Касперского"System and method for detecting anomalies in a technological system
US10986023B2 (en)*2019-07-192021-04-20Cisco Technology, Inc.Using machine learning to detect slow drain conditions in a storage area network
US11379588B2 (en)2019-12-202022-07-05Raytheon CompanySystem validation by hardware root of trust (HRoT) device and system management mode (SMM)
US11470114B2 (en)*2019-12-272022-10-11Paypal, Inc.Malware and phishing detection and mediation platform
US12021894B2 (en)2019-12-272024-06-25Paypal, Inc.Phishing detection based on modeling of web page content
US11671448B2 (en)2019-12-272023-06-06Paypal, Inc.Phishing detection using uniform resource locators
US11477228B2 (en)*2020-01-032022-10-18Saudi Arabian Oil CompanyMethod and system for blockchain accreditation mechanism based on cybersecurity risk
US11601461B2 (en)*2020-01-132023-03-07Vmware, Inc.Risk-based cloud profile management for VDI in the cloud
US11379459B1 (en)*2020-01-312022-07-05Snowflake Inc.Alerts based on historical event-occurrence data
US10846702B1 (en)2020-02-052020-11-24Capital One Services, LlcSystem and method for modifying payment processing times upon suspicion of fraud
US12216791B2 (en)2020-02-242025-02-04Forcepoint LlcRe-identifying pseudonymized or de-identified data utilizing distributed ledger technology
EP3872665A1 (en)2020-02-282021-09-01Accenture Global Solutions LimitedCyber digital twin simulator for security controls requirements
US11444980B2 (en)2020-04-152022-09-13T-Mobile Usa, Inc.On-demand wireless device centric security for a 5G wireless network
US11824881B2 (en)2020-04-152023-11-21T-Mobile Usa, Inc.On-demand security layer for a 5G wireless network
US11799878B2 (en)2020-04-152023-10-24T-Mobile Usa, Inc.On-demand software-defined security service orchestration for a 5G wireless network
US11070982B1 (en)2020-04-152021-07-20T-Mobile Usa, Inc.Self-cleaning function for a network access node of a network
US11115824B1 (en)2020-05-142021-09-07T-Mobile Usa, Inc.5G cybersecurity protection system
US11057774B1 (en)2020-05-142021-07-06T-Mobile Usa, Inc.Intelligent GNODEB cybersecurity protection system
US11206542B2 (en)2020-05-142021-12-21T-Mobile Usa, Inc.5G cybersecurity protection system using personalized signatures
US11876824B2 (en)2020-06-252024-01-16Accenture Global Solutions LimitedExtracting process aware analytical attack graphs through logical network analysis
US11483213B2 (en)2020-07-092022-10-25Accenture Global Solutions LimitedEnterprise process discovery through network traffic patterns
US11411976B2 (en)2020-07-092022-08-09Accenture Global Solutions LimitedResource-efficient generation of analytical attack graphs
US12278729B2 (en)*2020-07-242025-04-15Skyhigh Security LlcSystems, methods, and media for monitoring cloud configuration settings
US11722510B2 (en)2020-08-102023-08-08Bank Of America CorporationMonitoring and preventing remote user automated cyber attacks
US12034756B2 (en)2020-08-282024-07-09Accenture Global Solutions LimitedAnalytical attack graph differencing
US11144862B1 (en)2020-09-022021-10-12Bank Of America CorporationApplication mapping and alerting based on data dependencies
CN112181781B (en)*2020-10-152022-09-20新华三信息安全技术有限公司Host security threat degree warning method, device, equipment and storage medium
US11831675B2 (en)2020-10-262023-11-28Accenture Global Solutions LimitedProcess risk calculation based on hardness of attack paths
US11973790B2 (en)2020-11-102024-04-30Accenture Global Solutions LimitedCyber digital twin simulator for automotive security assessment based on attack graphs
US20220159029A1 (en)*2020-11-132022-05-19Cyberark Software Ltd.Detection of security risks based on secretless connection data
EP4047870B1 (en)2021-02-182024-11-13Accenture Global Solutions LimitedAutomated prioritization of process-aware cyber risk mitigation
US11870788B2 (en)*2021-04-282024-01-09Accenture Global Solutions LimitedUtilizing a machine learning model to determine real-time security intelligence based on operational technology data and information technology data
US11880250B2 (en)2021-07-212024-01-23Accenture Global Solutions LimitedOptimizing energy consumption of production lines using intelligent digital twins
CN113691498B (en)*2021-07-232023-03-14全球能源互联网研究院有限公司Electric power internet of things terminal safety state evaluation method and device and storage medium
US11895150B2 (en)2021-07-282024-02-06Accenture Global Solutions LimitedDiscovering cyber-attack process model based on analytical attack graphs
US12032683B2 (en)2021-07-292024-07-09Micro Focus LlcAbnormality detection in log entry collection
US12231461B2 (en)2021-08-122025-02-18Accenture Global Solutions LimitedPrioritizing security controls using a cyber digital twin simulator
US12355798B2 (en)2021-08-252025-07-08Accenture Global Solutions LimitedAutomated prioritization of cyber risk mitigation by simulating exploits
US12034751B2 (en)*2021-10-012024-07-09Secureworks Corp.Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
US12010152B2 (en)2021-12-082024-06-11Bank Of America CorporationInformation security systems and methods for cyber threat event prediction and mitigation
US11949696B2 (en)2021-12-172024-04-02Bank Of America CorporationData security system with dynamic intervention response
US12118560B2 (en)2022-02-152024-10-15Paypal, Inc.Pointer movement modelling for entity classification
US12432244B2 (en)*2022-03-242025-09-30At&T Intellectual Property I, L.P.Home gateway monitoring for vulnerable home internet of things devices
US12289336B2 (en)2022-04-082025-04-29Accenture Global Solutions LimitedOntology-based risk propagation over digital twins
US12255885B2 (en)*2022-05-312025-03-18Acronis International GmbhUser in group behavior signature monitor
US12348552B2 (en)2022-06-152025-07-01Accenture Global Solutions LimitedAutomated prediction of cyber-security attack techniques using knowledge mesh
US20240070268A1 (en)*2022-08-232024-02-29Bitdefender IPR Management Ltd.Aggregate Event Profiles for Detecting Malicious Mobile Applications
US12294600B2 (en)*2022-08-302025-05-06International Business Machines CorporationReal time behavioral alert processing in computing environments
WO2024063714A1 (en)*2022-09-232024-03-28Binalyze Yazilim A.S.Method for measuring security operation center
US12386986B1 (en)*2022-10-122025-08-12Wells Fargo Bank, N.A.Endpoint security synchronization
US12316661B2 (en)2022-10-312025-05-27International Business Machines CorporationAuto-detection of observables and auto-disposition of alerts in an endpoint detection and response (EDR) system using machine learning
US20240411869A1 (en)*2023-06-072024-12-12Bank Of America CorporationCollaborative alert platform using distributed ledger technology
US20250141929A1 (en)*2023-10-312025-05-01Dell Products L.P.Managing an endpoint detection and response framework using out of band communication channels

Citations (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020082886A1 (en)*2000-09-062002-06-27Stefanos ManganarisMethod and system for detecting unusual events and application thereof in computer intrusion detection
US20050001717A1 (en)*2003-03-062005-01-06Lucien BohbotSecurity system
US8280833B2 (en)*2008-06-122012-10-02Guardian Analytics, Inc.Fraud detection and analysis
US20130246605A1 (en)*2011-04-272013-09-19Mcafee, Inc.Local reputation to adjust sensitivity of behavioral detection system
US8555385B1 (en)*2011-03-142013-10-08Symantec CorporationTechniques for behavior based malware analysis
US20140282964A1 (en)*2013-03-152014-09-18Telesign CorporationSystem and method for utilizing behavioral characteristics in authentication and fraud prevention
US20150310196A1 (en)*2010-11-292015-10-29Biocatch Ltd.Device, method, and system of detecting remote access users and differentiating among users
US20160196454A1 (en)*2015-01-022016-07-07Hi Sec Labs LTD.Usb security device, apparatus, method and system
US20160234251A1 (en)*2015-02-062016-08-11Honeywell International Inc.Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
US20170006051A1 (en)*2015-06-302017-01-05K4Connect Inc.Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods
US20170140154A1 (en)*2015-11-172017-05-18Honeywell International Inc.Deployment assurance checks for monitoring industrial control systems
US20170208086A1 (en)*2016-01-192017-07-20Honeywell International Inc.Near-real-time export of cyber-security risk information
US20170295188A1 (en)*2016-04-062017-10-12Karamba SecurityAutomated security policy generation for controllers
US20170339166A1 (en)*2016-05-182017-11-23Salesforce.Com, Inc.Reverse shell network intrusion detection
US20180075239A1 (en)*2016-09-152018-03-15Paypal, Inc.Techniques for Ransomware Detection and Mitigation
US20180077187A1 (en)*2016-09-142018-03-15Carbon Black, Inc.Cybersecurity incident detection systems and techniques
US20180075234A1 (en)*2016-09-152018-03-15Paypal, Inc.Techniques for Detecting Encryption

Family Cites Families (70)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6405318B1 (en)1999-03-122002-06-11Psionic Software, Inc.Intrusion detection system
US7124438B2 (en)2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US8046835B2 (en)2002-10-232011-10-25Frederick S. M. HerzDistributed computer network security activity model SDI-SCAM
US20060132302A1 (en)*2003-02-032006-06-22Stilp Louis APower management of transponders and sensors in an RFID security network
US7373524B2 (en)*2004-02-242008-05-13Covelight Systems, Inc.Methods, systems and computer program products for monitoring user behavior for a server application
US7752671B2 (en)*2004-10-042010-07-06Promisec Ltd.Method and device for questioning a plurality of computerized devices
JP4742144B2 (en)2005-06-062011-08-10インターナショナル・ビジネス・マシーンズ・コーポレーション Method and computer program for identifying a device attempting to penetrate a TCP / IP protocol based network
US20070174910A1 (en)*2005-12-132007-07-26Zachman Frederick JComputer memory security platform
US8230505B1 (en)2006-08-112012-07-24Avaya Inc.Method for cooperative intrusion prevention through collaborative inference
EP2223460A4 (en)*2007-12-202011-12-28Bce IncContact-less tag with signature, and applications thereof
US9231964B2 (en)2009-04-142016-01-05Microsoft CorporationVulnerability detection based on aggregated primitives
EP2299650A1 (en)2009-09-212011-03-23Siemens AktiengesellschaftMethod for recognising anomalies in a control network
US8359652B2 (en)*2009-10-312013-01-22Microsoft CorporationDetecting anomalies in access control lists
US8607339B2 (en)*2009-11-022013-12-10Red Hat, Inc.Systems and methods for improved identification and analysis of threats to a computing system
US8489635B1 (en)*2010-01-132013-07-16Louisiana Tech University Research Foundation, A Division Of Louisiana Tech University Foundation, Inc.Method and system of identifying users based upon free text keystroke patterns
WO2011149558A2 (en)*2010-05-282011-12-01Abelow Daniel HReality alternate
US8621629B2 (en)2010-08-312013-12-31General Electric CompanySystem, method, and computer software code for detecting a computer network intrusion in an infrastructure element of a high value target
US10586036B2 (en)*2010-11-292020-03-10Biocatch Ltd.System, device, and method of recovery and resetting of user authentication factor
US10164985B2 (en)*2010-11-292018-12-25Biocatch Ltd.Device, system, and method of recovery and resetting of user authentication factor
US8881289B2 (en)*2011-10-182014-11-04Mcafee, Inc.User behavioral risk assessment
US8739281B2 (en)2011-12-062014-05-27At&T Intellectual Property I, L.P.Multilayered deception for intrusion detection and prevention
US9137258B2 (en)*2012-02-012015-09-15Brightpoint Security, Inc.Techniques for sharing network security event information
US10270739B2 (en)*2012-02-282019-04-23Raytheon Bbn Technologies Corp.System and method for protecting service-level entities
US8904497B2 (en)*2012-08-032014-12-02Honeywell International Inc.Providing an operational dashboard
US8938805B1 (en)2012-09-242015-01-20Emc CorporationDetection of tampering with software installed on a processing device
US9177139B2 (en)2012-12-302015-11-03Honeywell International Inc.Control system cyber security
US8813236B1 (en)2013-01-072014-08-19Narus, Inc.Detecting malicious endpoints using network connectivity and flow information
US20160110551A1 (en)*2013-02-142016-04-21The United States Of America As Represented By The Secretary Of The NavyComputer System Anomaly Detection Using Human Responses to Ambient Representations of Hidden Computing System and Process Metadata
US9620959B2 (en)2013-03-152017-04-11Accenture Global Services LimitedEnhanced grid reliability through predictive analysis and dynamic action for stable power distribution
US10026049B2 (en)*2013-05-092018-07-17Rockwell Automation Technologies, Inc.Risk assessment for industrial systems using big data
US9319423B2 (en)*2013-11-042016-04-19At&T Intellectual Property I, L.P.Malware and anomaly detection via activity recognition based on sensor data
US9848036B1 (en)*2013-12-032017-12-19Google Inc.Systems, methods, and media for causing an action to be performed on a user device
US10122747B2 (en)*2013-12-062018-11-06Lookout, Inc.Response generation after distributed monitoring and evaluation of multiple devices
US9350748B1 (en)2013-12-162016-05-24Amazon Technologies, Inc.Countering service enumeration through optimistic response
US8984643B1 (en)*2014-02-142015-03-17Risk I/O, Inc.Ordered computer vulnerability remediation reporting
US9225730B1 (en)*2014-03-192015-12-29Amazon Technologies, Inc.Graph based detection of anomalous activity
US20160078365A1 (en)2014-03-212016-03-17Philippe BaumardAutonomous detection of incongruous behaviors
WO2015168203A1 (en)*2014-04-292015-11-05PEGRight, Inc.Characterizing user behavior via intelligent identity analytics
KR102118159B1 (en)*2014-05-202020-06-03삼성전자주식회사Semiconductor Device and Method of fabricating the same
US9210181B1 (en)*2014-05-262015-12-08Solana Networks Inc.Detection of anomaly in network flow data
GB2529150B (en)*2014-08-042022-03-30Darktrace LtdCyber security
US9930058B2 (en)*2014-08-132018-03-27Honeywell International Inc.Analyzing cyber-security risks in an industrial control environment
US9323930B1 (en)2014-08-192016-04-26Symantec CorporationSystems and methods for reporting security vulnerabilities
US10162969B2 (en)*2014-09-102018-12-25Honeywell International Inc.Dynamic quantification of cyber-security risks in a control system
US9690928B2 (en)*2014-10-252017-06-27Mcafee, Inc.Computing platform security methods and apparatus
US9690933B1 (en)*2014-12-222017-06-27Fireeye, Inc.Framework for classifying an object as malicious with machine learning for deploying updated predictive models
CN104601568B (en)*2015-01-132019-05-21深信服科技股份有限公司Virtualization security isolation method and device
EP3262815B1 (en)2015-02-242020-10-14Cisco Technology, Inc.System and method for securing an enterprise computing environment
US9910984B2 (en)*2015-02-272018-03-06Qualcomm IncorporatedMethods and systems for on-device high-granularity classification of device behaviors using multi-label models
US9350750B1 (en)2015-04-032016-05-24Area 1 Security, Inc.Distribution of security rules among sensor computers
US10142353B2 (en)2015-06-052018-11-27Cisco Technology, Inc.System for monitoring and managing datacenters
US9565192B2 (en)*2015-06-232017-02-07Symantec CorporationRouter based securing of internet of things devices on local area networks
CN106470115B (en)*2015-08-202021-01-29斑马智行网络(香港)有限公司Security configuration method, related device and system
US9825989B1 (en)*2015-09-302017-11-21Fireeye, Inc.Cyber attack early warning system
US9607144B1 (en)*2015-11-302017-03-28International Business Machines CorporationUser activity modelling, monitoring, and reporting framework
US20200265357A1 (en)*2015-12-302020-08-20Atul VashisthaSystems and methods to quantify risk associated with suppliers or geographic locations
US10581874B1 (en)*2015-12-312020-03-03Fireeye, Inc.Malware detection system with contextual analysis
US9824216B1 (en)*2015-12-312017-11-21Fireeye, Inc.Susceptible environment detection system
KR20170082936A (en)2016-01-072017-07-17한국인터넷진흥원System for detecting abnomal behaviors allowing for personalized the whole access period use behavior pattern error rate deviation
CN105511944B (en)*2016-01-072018-09-28上海海事大学A kind of method for detecting abnormality of cloud system internal virtual machine
US10268976B2 (en)*2016-02-172019-04-23SecurityScorecard, Inc.Non-intrusive techniques for discovering and using organizational relationships
US10372904B2 (en)*2016-03-082019-08-06Tanium Inc.Cost prioritized evaluations of indicators of compromise
US20170279826A1 (en)*2016-03-222017-09-28Symantec CorporationProtecting dynamic and short-lived virtual machine instances in cloud environments
WO2017201520A1 (en)*2016-05-202017-11-23Georgia Tech Research CorporationSystems and methods for detecting anomalous software on a programmable logic controller
US20180013722A1 (en)*2016-07-062018-01-11Eric EnosDistributed firewall device and system
US10237240B2 (en)*2016-07-212019-03-19AT&T Global Network Services (U.K.) B.V.Assessing risk associated with firewall rules
US10354061B2 (en)*2016-07-252019-07-16Panasonic Avionics CorporationMethods and systems for authenticating a headset for a transportation vehicle
US10284589B2 (en)*2016-10-312019-05-07Acentium Inc.Methods and systems for ranking, filtering and patching detected vulnerabilities in a networked system
USPP29601P3 (en)2016-10-312018-08-14Suphatchatwong Innovation Co., Ltd.Sansevieria plant named ‘SUPSAN1601’
US10412111B2 (en)*2016-12-302019-09-10eSentire, Inc.System and method for determining network security threats

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020082886A1 (en)*2000-09-062002-06-27Stefanos ManganarisMethod and system for detecting unusual events and application thereof in computer intrusion detection
US20050001717A1 (en)*2003-03-062005-01-06Lucien BohbotSecurity system
US8280833B2 (en)*2008-06-122012-10-02Guardian Analytics, Inc.Fraud detection and analysis
US20150310196A1 (en)*2010-11-292015-10-29Biocatch Ltd.Device, method, and system of detecting remote access users and differentiating among users
US8555385B1 (en)*2011-03-142013-10-08Symantec CorporationTechniques for behavior based malware analysis
US20130246605A1 (en)*2011-04-272013-09-19Mcafee, Inc.Local reputation to adjust sensitivity of behavioral detection system
US20140282964A1 (en)*2013-03-152014-09-18Telesign CorporationSystem and method for utilizing behavioral characteristics in authentication and fraud prevention
US20160196454A1 (en)*2015-01-022016-07-07Hi Sec Labs LTD.Usb security device, apparatus, method and system
US20160234251A1 (en)*2015-02-062016-08-11Honeywell International Inc.Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
US20170006051A1 (en)*2015-06-302017-01-05K4Connect Inc.Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods
US20170140154A1 (en)*2015-11-172017-05-18Honeywell International Inc.Deployment assurance checks for monitoring industrial control systems
US20170208086A1 (en)*2016-01-192017-07-20Honeywell International Inc.Near-real-time export of cyber-security risk information
US20170295188A1 (en)*2016-04-062017-10-12Karamba SecurityAutomated security policy generation for controllers
US20170339166A1 (en)*2016-05-182017-11-23Salesforce.Com, Inc.Reverse shell network intrusion detection
US20180077187A1 (en)*2016-09-142018-03-15Carbon Black, Inc.Cybersecurity incident detection systems and techniques
US20180075239A1 (en)*2016-09-152018-03-15Paypal, Inc.Techniques for Ransomware Detection and Mitigation
US20180075234A1 (en)*2016-09-152018-03-15Paypal, Inc.Techniques for Detecting Encryption

Cited By (31)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11477219B2 (en)*2018-02-202022-10-18Darktrace Holdings LimitedEndpoint agent and system
US11962552B2 (en)2018-02-202024-04-16Darktrace Holdings LimitedEndpoint agent extension of a machine learning cyber defense system for email
US11522887B2 (en)*2018-02-202022-12-06Darktrace Holdings LimitedArtificial intelligence controller orchestrating network components for a cyber threat defense
US10922409B2 (en)*2018-04-102021-02-16Microsoft Technology Licensing, LlcDeep reinforcement learning technologies for detecting malware
US11438357B2 (en)2018-06-222022-09-06Senseon Tech LtdEndpoint network sensor and related cybersecurity infrastructure
US12212582B2 (en)2018-06-222025-01-28Senseon Tech LtdCyber defense system
US11516233B2 (en)2018-06-222022-11-29Senseon Tech LtdCyber defense system
US12143404B2 (en)2018-07-262024-11-12Senseon Tech LtdCyber defence system
US11204994B2 (en)*2019-05-092021-12-21International Business Machines CorporationInjection attack identification and mitigation
US11888881B2 (en)*2019-08-302024-01-30Palo Alto Networks, Inc.Context informed abnormal endpoint behavior detection
US11483326B2 (en)*2019-08-302022-10-25Palo Alto Networks, Inc.Context informed abnormal endpoint behavior detection
US10862914B1 (en)*2019-09-262020-12-08Packetsled, Inc.Assigning and representing security risks on a computer network
US10673886B1 (en)*2019-09-262020-06-02Packetsled, Inc.Assigning and representing security risks on a computer network
US11916948B2 (en)2019-10-222024-02-27Senseon Tech LtdAnomaly detection
US11522895B2 (en)2019-10-222022-12-06Senseon Tech LtdAnomaly detection
CN110912906A (en)*2019-11-282020-03-24南方电网科学研究院有限责任公司 A method for identifying malicious nodes in edge computing
US12417282B2 (en)*2020-01-272025-09-16F.A.C.C.T. Network Security LlcMethod and system for detecting malicious infrastructure
US20220075872A1 (en)*2020-01-272022-03-10Limited Liability Company "Group Ib Tds"Method and system for detecting malicious infrastructure
WO2022027572A1 (en)*2020-08-072022-02-10Nokia Shanghai Bell Co., Ltd.Security management service in management plane
US11265339B1 (en)2020-12-152022-03-01Senseon Tech LtdNetwork traffic monitoring
NL2030861A (en)*2021-06-012022-12-08Trust LtdSystem and method for external monitoring a cyberattack surface
US11985147B2 (en)2021-06-012024-05-14Trust Ltd.System and method for detecting a cyberattack
US12088606B2 (en)2021-06-102024-09-10F.A.C.C.T. Network Security LlcSystem and method for detection of malicious network resources
JP7685929B2 (en)2021-10-192025-05-30株式会社日立製作所 Attack scenario analysis device and attack scenario analysis method
JP2023060953A (en)*2021-10-192023-05-01株式会社日立製作所 Attack scenario analysis device and attack scenario analysis method
US20240031393A1 (en)*2022-07-222024-01-25Astron Security Inc.Ai-based security risk prediction system and method for targets to be protected in cloud environment
US12143477B2 (en)*2022-09-132024-11-12Capital One Services, LlcSecure cryptographic transfer using multiparty computation
US20240089091A1 (en)*2022-09-132024-03-14Capital One Services, LlcSecure cryptographic transfer using multiparty computation
US20240430285A1 (en)*2023-06-212024-12-26Saudi Arabian Oil CompanyMethod and system for integrated cybersecurity operations
US20250080553A1 (en)*2023-08-302025-03-06Expel, Inc.Systems, methods, and graphical user interfaces for configuring and executing one or more computer-executable threat hunting protocols in a cybersecurity threat detection and mitigation platform
US12348539B2 (en)*2023-08-302025-07-01Expel, Inc.Systems, methods, and graphical user interfaces for configuring and executing one or more computer-executable threat hunting protocols in a cybersecurity threat detection and mitigation platform

Also Published As

Publication numberPublication date
US20180255077A1 (en)2018-09-06
US20200412747A1 (en)2020-12-31
US10701089B2 (en)2020-06-30
US20180255080A1 (en)2018-09-06
US20180255079A1 (en)2018-09-06
US20220353282A1 (en)2022-11-03
US20220368707A1 (en)2022-11-17
US10728261B2 (en)2020-07-28
WO2018158643A1 (en)2018-09-07
US20200329058A1 (en)2020-10-15

Similar Documents

PublicationPublication DateTitle
US20220368707A1 (en)System and Method for Cyber Security Threat Detection
US11757920B2 (en)User and entity behavioral analysis with network topology enhancements
EP4254868B1 (en)Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management
US20220201042A1 (en)Ai-driven defensive penetration test analysis and recommendation system
US11204996B2 (en)Retention and accessibility of data characterizing events on an endpoint computer
Xie et al.pBMDS: a behavior-based malware detection system for cellphone devices
US10893059B1 (en)Verification and enhancement using detection systems located at the network periphery and endpoint devices
US20180359272A1 (en)Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
CN113660224B (en)Situation awareness defense method, device and system based on network vulnerability scanning
Nguyen et al.Detecting insider threats by monitoring system call activity
EP4229532A1 (en)Behavior detection and verification
US8683598B1 (en)Mechanism to evaluate the security posture of a computer system
US10142343B2 (en)Unauthorized access detecting system and unauthorized access detecting method
US12010133B2 (en)Security threat monitoring for network-accessible devices
WO2014113501A1 (en)Systems and methods for identifying and reporting application and file vulnerabilities
US12255913B2 (en)Methods and systems for system vulnerability determination and utilization for threat mitigation
Yamada et al.RAT-based malicious activities detection on enterprise internal networks
Ah-Fat et al.Effective detection of credential thefts from windows memory: Learning access behaviours to local security authority subsystem service
US20230319050A1 (en)Method, product, and system for generating a software representation that embodies network configuration and policy data of a computer network for use in security management
US20230319068A1 (en)Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management
Kono et al.An unknown malware detection using execution registry access
US12328322B2 (en)Method, product, and system for network security management using software representation that embodies network configuration and policy data
Treaster et al.Detection of privilege escalation for linux cluster security
US20250047692A1 (en)Arrangement and method of threat detection in a computer or computer network
US20230319100A1 (en)Method, product, and system for analyzing attack paths in computer network generated using a software representation that embodies network configuration and policy data for security management

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:RESPONSIGHT PTY LTD, AUSTRALIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PAINE, JEFFREY;REEL/FRAME:043607/0259

Effective date:20170910

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp