Movatterモバイル変換


[0]ホーム

URL:


US20180255080A1 - System and Method for Cyber Security Threat Detection - Google Patents

System and Method for Cyber Security Threat Detection
Download PDF

Info

Publication number
US20180255080A1
US20180255080A1US15/905,686US201815905686AUS2018255080A1US 20180255080 A1US20180255080 A1US 20180255080A1US 201815905686 AUS201815905686 AUS 201815905686AUS 2018255080 A1US2018255080 A1US 2018255080A1
Authority
US
United States
Prior art keywords
behavioral activity
activity
probability
endpoint
threat detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/905,686
Inventor
Jeffrey Paine
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Responsight Pty Ltd
Original Assignee
Responsight Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Responsight Pty LtdfiledCriticalResponsight Pty Ltd
Priority to US15/905,686priorityCriticalpatent/US20180255080A1/en
Priority to PCT/IB2018/000396prioritypatent/WO2018158643A1/en
Assigned to ResponSight Pty LtdreassignmentResponSight Pty LtdASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PAINE, Jeffrey
Publication of US20180255080A1publicationCriticalpatent/US20180255080A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system includes one or more collector engines. Each of the collector engines includes a service and an agent operating on a corresponding system endpoint of the system endpoints. The service is configured to take a first snapshot of the corresponding system endpoint. The first snapshot includes event activity information associated with the system endpoint. The agent is configured to take a second snapshot of the corresponding system endpoint. The second snapshot includes behavioral activity information associated with the corresponding system endpoint. The system further includes an aggregator engine configured to aggregate the first snapshot and the second snapshot from each of the system endpoints into an aggregated snapshot. The system further includes one or more analytics engines configured to: generate and store baseline profiles associated with the system endpoints based on a previously received aggregated snapshot, receive the aggregated snapshot from the aggregator engine, determine deviation values for each of the system endpoints based on the received aggregated snapshot and the stored baseline profiles, and generate, for each of the system endpoints, a cumulative risk value based on the deviation values. The system further includes one or more alerting engines configured to determine whether to issue one or more alerts indicating one or more security threats have occurred for each of the endpoints in response to the cumulative risk value.

Description

Claims (28)

23. A cyber security threat detection system operating within a computing environment, the system comprising:
one or more collector engines operating at least in part within a computing environment, and configured to acquire behavioral activity information over a period of time;
a prediction engine operating on the acquired behavioral activity information, and configured to predict expected behavioral activity based on historic behavioral activity from the recorded behavioral activity information, to compare new behavioral activity with the expected behavioral activity, and to determine a probability of occurrence of the new behavioral activity based on the comparison;
an analytics engine configured to generate a security risk level based on the probability of occurrence of the new behavioral activity; and
an alerting engine configured to issue one or more alerts in response to a determination that the security risk level has exceeded a risk threshold.
32. A cyber security threat detection system operating within a computing environment, the system comprising:
one or more collector engines operating at least in part within a computing environment, and configured to acquire behavioral activity information over a period of time;
a prediction engine operating on the acquired behavioral activity information, and configured to predict expected behavioral activity based on historic behavioral activity from the recorded behavioral activity information, to compare new behavioral activity with the expected behavioral activity, and to determine whether an activity with a high probability of occurrence from the new behavioral activity is absent based on the comparison;
an analytics engine configured to generate a security risk level based on the determination whether the expected activity is absent; and
an alerting engine configured to issue one or more alerts in response to a determination that the security risk level has exceeded a risk threshold.
US15/905,6862017-03-022018-02-26System and Method for Cyber Security Threat DetectionAbandonedUS20180255080A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US15/905,686US20180255080A1 (en)2017-03-022018-02-26System and Method for Cyber Security Threat Detection
PCT/IB2018/000396WO2018158643A1 (en)2017-03-022018-03-01System and method for cyber security threat detection

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201762466279P2017-03-022017-03-02
US15/699,777US10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection
US15/905,686US20180255080A1 (en)2017-03-022018-02-26System and Method for Cyber Security Threat Detection

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US15/699,777ContinuationUS10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection

Publications (1)

Publication NumberPublication Date
US20180255080A1true US20180255080A1 (en)2018-09-06

Family

ID=63355377

Family Applications (8)

Application NumberTitlePriority DateFiling Date
US15/699,777Active2038-04-19US10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection
US15/699,765AbandonedUS20180255076A1 (en)2017-03-022017-09-08System and Method for Cyber Security Threat Detection
US15/811,385Active2038-03-11US10701089B2 (en)2017-03-022017-11-13System and method for cyber security threat detection
US15/905,686AbandonedUS20180255080A1 (en)2017-03-022018-02-26System and Method for Cyber Security Threat Detection
US16/909,627AbandonedUS20200329058A1 (en)2017-03-022020-06-23System and Method for Cyber Security Threat Detection
US16/926,507AbandonedUS20200412747A1 (en)2017-03-022020-07-10System and Method for Cyber Security Threat Detection
US17/859,868AbandonedUS20220353282A1 (en)2017-03-022022-07-07System and Method for Cyber Security Threat Detection
US17/868,602AbandonedUS20220368707A1 (en)2017-03-022022-07-19System and Method for Cyber Security Threat Detection

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US15/699,777Active2038-04-19US10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection
US15/699,765AbandonedUS20180255076A1 (en)2017-03-022017-09-08System and Method for Cyber Security Threat Detection
US15/811,385Active2038-03-11US10701089B2 (en)2017-03-022017-11-13System and method for cyber security threat detection

Family Applications After (4)

Application NumberTitlePriority DateFiling Date
US16/909,627AbandonedUS20200329058A1 (en)2017-03-022020-06-23System and Method for Cyber Security Threat Detection
US16/926,507AbandonedUS20200412747A1 (en)2017-03-022020-07-10System and Method for Cyber Security Threat Detection
US17/859,868AbandonedUS20220353282A1 (en)2017-03-022022-07-07System and Method for Cyber Security Threat Detection
US17/868,602AbandonedUS20220368707A1 (en)2017-03-022022-07-19System and Method for Cyber Security Threat Detection

Country Status (2)

CountryLink
US (8)US10728261B2 (en)
WO (1)WO2018158643A1 (en)

Cited By (55)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10264012B2 (en)2017-05-152019-04-16Forcepoint, LLCUser behavior profile
US20190230104A1 (en)*2018-01-252019-07-25Bank Of America CorporationDynamic Record Identification and Analysis Computer System with Event Monitoring Components
US10447718B2 (en)2017-05-152019-10-15Forcepoint LlcUser profile definition and management
US10623431B2 (en)2017-05-152020-04-14Forcepoint LlcDiscerning psychological state from correlated user behavior and contextual information
US10630718B2 (en)*2018-11-272020-04-21BehavioSec IncDetection of remote fraudulent activity in a client-server-system
US10798109B2 (en)2017-05-152020-10-06Forcepoint LlcAdaptive trust profile reference architecture
US10846702B1 (en)*2020-02-052020-11-24Capital One Services, LlcSystem and method for modifying payment processing times upon suspicion of fraud
US10853496B2 (en)2019-04-262020-12-01Forcepoint, LLCAdaptive trust profile behavioral fingerprint
US10862927B2 (en)2017-05-152020-12-08Forcepoint, LLCDividing events into sessions during adaptive trust profile operations
CN112181781A (en)*2020-10-152021-01-05新华三信息安全技术有限公司Host security threat degree warning method, device, equipment and storage medium
US10897481B2 (en)*2017-05-172021-01-19Fujitsu LimitedRelay device, method and non-transitory computer-readable storage medium
US10902114B1 (en)*2015-09-092021-01-26ThreatQuotient, Inc.Automated cybersecurity threat detection with aggregation and analysis
US10915644B2 (en)2017-05-152021-02-09Forcepoint, LLCCollecting data for centralized use in an adaptive trust profile event via an endpoint
US10917423B2 (en)2017-05-152021-02-09Forcepoint, LLCIntelligently differentiating between different types of states and attributes when using an adaptive trust profile
US10999297B2 (en)2017-05-152021-05-04Forcepoint, LLCUsing expected behavior of an entity when prepopulating an adaptive trust profile
US10999296B2 (en)2017-05-152021-05-04Forcepoint, LLCGenerating adaptive trust profiles using information derived from similarly situated organizations
US20210326466A1 (en)*2018-12-192021-10-21Jpmorgan Chase Bank, N.A.Methods for big data usage monitoring, entitlements and exception analysis
US11159555B2 (en)2018-12-032021-10-26Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11184385B2 (en)2018-12-032021-11-23Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
CN113691498A (en)*2021-07-232021-11-23全球能源互联网研究院有限公司Electric power internet of things terminal safety state evaluation method and device and storage medium
US11190488B1 (en)*2019-03-072021-11-30NortonLifeLock Inc.Adaptive security filtering on a client device
US11232235B2 (en)2018-12-032022-01-25Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11245702B2 (en)2019-05-082022-02-08Red Hat, Inc.Security vulnerability assessment for users of a cloud computing environment
US11277432B2 (en)2018-12-032022-03-15Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11283825B2 (en)*2018-12-032022-03-22Accenture Global Solutions LimitedLeveraging attack graphs of agile security platform
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
US20220159029A1 (en)*2020-11-132022-05-19Cyberark Software Ltd.Detection of security risks based on secretless connection data
US11363036B2 (en)*2019-03-282022-06-14Microsoft Technology Licensing, LlcDetecting a missing security alert using a machine learning model
US11379459B1 (en)*2020-01-312022-07-05Snowflake Inc.Alerts based on historical event-occurrence data
US11411976B2 (en)2020-07-092022-08-09Accenture Global Solutions LimitedResource-efficient generation of analytical attack graphs
US11431735B2 (en)2019-01-282022-08-30Orca Security LTD.Techniques for securing virtual machines
US20220286743A1 (en)*2017-03-032022-09-08Google LlcSystems and Methods for Detecting Improper Implementation of Presentation of Content Items by Applications Executing on Client Devices
US11481486B2 (en)*2019-03-272022-10-25Webroot Inc.Behavioral threat detection engine
US11483213B2 (en)2020-07-092022-10-25Accenture Global Solutions LimitedEnterprise process discovery through network traffic patterns
US11533332B2 (en)2020-06-252022-12-20Accenture Global Solutions LimitedExecuting enterprise process abstraction using process aware analytical attack graphs
US11657149B2 (en)2019-03-272023-05-23Webroot Inc.Behavioral threat detection virtual machine
US11663326B2 (en)2019-03-272023-05-30Webroot Inc.Behavioral threat detection definition and compilation
US11695795B2 (en)2019-07-122023-07-04Accenture Global Solutions LimitedEvaluating effectiveness of security controls in enterprise networks using graph values
US11700279B2 (en)*2018-06-292023-07-11Corvid Cyberdefense, LlcIntegrated security and threat prevention and detection platform
US11750657B2 (en)2020-02-282023-09-05Accenture Global Solutions LimitedCyber digital twin simulator for security controls requirements
US20230308467A1 (en)*2022-03-242023-09-28At&T Intellectual Property I, L.P.Home Gateway Monitoring for Vulnerable Home Internet of Things Devices
US11831675B2 (en)2020-10-262023-11-28Accenture Global Solutions LimitedProcess risk calculation based on hardness of attack paths
US11880250B2 (en)2021-07-212024-01-23Accenture Global Solutions LimitedOptimizing energy consumption of production lines using intelligent digital twins
US11895150B2 (en)2021-07-282024-02-06Accenture Global Solutions LimitedDiscovering cyber-attack process model based on analytical attack graphs
US11973790B2 (en)2020-11-102024-04-30Accenture Global Solutions LimitedCyber digital twin simulator for automotive security assessment based on attack graphs
US12034756B2 (en)2020-08-282024-07-09Accenture Global Solutions LimitedAnalytical attack graph differencing
US20240411869A1 (en)*2023-06-072024-12-12Bank Of America CorporationCollaborative alert platform using distributed ledger technology
US12216791B2 (en)2020-02-242025-02-04Forcepoint LlcRe-identifying pseudonymized or de-identified data utilizing distributed ledger technology
US12231461B2 (en)2021-08-122025-02-18Accenture Global Solutions LimitedPrioritizing security controls using a cyber digital twin simulator
US12284200B2 (en)2021-02-182025-04-22Accenture Global Solutions LimitedAutomated prioritization of process-aware cyber risk mitigation
US12289336B2 (en)2022-04-082025-04-29Accenture Global Solutions LimitedOntology-based risk propagation over digital twins
US20250141929A1 (en)*2023-10-312025-05-01Dell Products L.P.Managing an endpoint detection and response framework using out of band communication channels
US12294600B2 (en)*2022-08-302025-05-06International Business Machines CorporationReal time behavioral alert processing in computing environments
US12335296B2 (en)2022-06-152025-06-17Accenture Global Solutions LimitedAutomated cyber-security attack method prediction using detected vulnerabilities
US12355798B2 (en)2021-08-252025-07-08Accenture Global Solutions LimitedAutomated prioritization of cyber risk mitigation by simulating exploits

Families Citing this family (62)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10931685B2 (en)*2016-12-122021-02-23Ut-Battelle, LlcMalware analysis and recovery
US10594576B2 (en)2017-01-312020-03-17Splunk Inc.Visualizing network activity involving networked computing devices distributed across network address spaces
US10540496B2 (en)*2017-09-292020-01-21International Business Machines CorporationDynamic re-composition of patch groups using stream clustering
US11522887B2 (en)*2018-02-202022-12-06Darktrace Holdings LimitedArtificial intelligence controller orchestrating network components for a cyber threat defense
US11962552B2 (en)2018-02-202024-04-16Darktrace Holdings LimitedEndpoint agent extension of a machine learning cyber defense system for email
US10922409B2 (en)*2018-04-102021-02-16Microsoft Technology Licensing, LlcDeep reinforcement learning technologies for detecting malware
US11347861B2 (en)2018-04-102022-05-31Raytheon CompanyControlling security state of commercial off the shelf (COTS) system
US11438357B2 (en)2018-06-222022-09-06Senseon Tech LtdEndpoint network sensor and related cybersecurity infrastructure
GB201810294D0 (en)2018-06-222018-08-08Senseon Tech LtdCybe defence system
GB2602254B (en)2020-12-152023-04-05Senseon Tech LtdNetwork traffic monitoring
GB201812171D0 (en)2018-07-262018-09-12Senseon Tech LtdCyber defence system
US11423150B2 (en)2018-09-072022-08-23Raytheon CompanySystem and method for booting processors with encrypted boot image
US11178159B2 (en)*2018-09-072021-11-16Raytheon CompanyCross-domain solution using network-connected hardware root-of-trust device
US11916953B2 (en)*2018-09-242024-02-27Cybereason, Inc.Method and mechanism for detection of pass-the-hash attacks
US11868479B2 (en)*2018-11-022024-01-09Arizona Board Of Regents On Behalf Of The University Of ArizonaRuntime adaptive risk assessment and automated mitigation
CN111381567B (en)*2018-12-272021-11-05北京安控科技股份有限公司Safety detection system and method for industrial control system
WO2020205497A1 (en)2019-04-012020-10-08Raytheon CompanyRoot of trust assisted access control of secure encrypted drives
EP3948608B1 (en)2019-04-012023-04-26Raytheon CompanyAdaptive, multi-layer enterprise data protection & resiliency platform
US11204994B2 (en)*2019-05-092021-12-21International Business Machines CorporationInjection attack identification and mitigation
US10440011B1 (en)*2019-05-292019-10-08Capital One Services, LlcPassword protection in a computing environment
RU2750629C2 (en)*2019-07-172021-06-30Акционерное общество "Лаборатория Касперского"System and method for detecting anomalies in a technological system
US10986023B2 (en)*2019-07-192021-04-20Cisco Technology, Inc.Using machine learning to detect slow drain conditions in a storage area network
US11483326B2 (en)*2019-08-302022-10-25Palo Alto Networks, Inc.Context informed abnormal endpoint behavior detection
US10673886B1 (en)*2019-09-262020-06-02Packetsled, Inc.Assigning and representing security risks on a computer network
GB201915265D0 (en)2019-10-222019-12-04Senseon Tech LtdAnomaly detection
CN110912906B (en)*2019-11-282021-12-21南方电网科学研究院有限责任公司Edge calculation malicious node identification method
US11379588B2 (en)2019-12-202022-07-05Raytheon CompanySystem validation by hardware root of trust (HRoT) device and system management mode (SMM)
US11470114B2 (en)*2019-12-272022-10-11Paypal, Inc.Malware and phishing detection and mediation platform
US12021894B2 (en)2019-12-272024-06-25Paypal, Inc.Phishing detection based on modeling of web page content
US11671448B2 (en)2019-12-272023-06-06Paypal, Inc.Phishing detection using uniform resource locators
US11477228B2 (en)*2020-01-032022-10-18Saudi Arabian Oil CompanyMethod and system for blockchain accreditation mechanism based on cybersecurity risk
US11601461B2 (en)*2020-01-132023-03-07Vmware, Inc.Risk-based cloud profile management for VDI in the cloud
RU2722693C1 (en)*2020-01-272020-06-03Общество с ограниченной ответственностью «Группа АйБи ТДС»Method and system for detecting the infrastructure of a malicious software or a cybercriminal
US11444980B2 (en)2020-04-152022-09-13T-Mobile Usa, Inc.On-demand wireless device centric security for a 5G wireless network
US11824881B2 (en)2020-04-152023-11-21T-Mobile Usa, Inc.On-demand security layer for a 5G wireless network
US11799878B2 (en)2020-04-152023-10-24T-Mobile Usa, Inc.On-demand software-defined security service orchestration for a 5G wireless network
US11070982B1 (en)2020-04-152021-07-20T-Mobile Usa, Inc.Self-cleaning function for a network access node of a network
US11115824B1 (en)2020-05-142021-09-07T-Mobile Usa, Inc.5G cybersecurity protection system
US11057774B1 (en)2020-05-142021-07-06T-Mobile Usa, Inc.Intelligent GNODEB cybersecurity protection system
US11206542B2 (en)2020-05-142021-12-21T-Mobile Usa, Inc.5G cybersecurity protection system using personalized signatures
US12278729B2 (en)*2020-07-242025-04-15Skyhigh Security LlcSystems, methods, and media for monitoring cloud configuration settings
WO2022027572A1 (en)*2020-08-072022-02-10Nokia Shanghai Bell Co., Ltd.Security management service in management plane
US11722510B2 (en)2020-08-102023-08-08Bank Of America CorporationMonitoring and preventing remote user automated cyber attacks
US11144862B1 (en)2020-09-022021-10-12Bank Of America CorporationApplication mapping and alerting based on data dependencies
US11870788B2 (en)*2021-04-282024-01-09Accenture Global Solutions LimitedUtilizing a machine learning model to determine real-time security intelligence based on operational technology data and information technology data
NL2030861B1 (en)2021-06-012023-03-14Trust LtdSystem and method for external monitoring a cyberattack surface
RU2769075C1 (en)2021-06-102022-03-28Общество с ограниченной ответственностью "Группа АйБи ТДС"System and method for active detection of malicious network resources
US12032683B2 (en)2021-07-292024-07-09Micro Focus LlcAbnormality detection in log entry collection
US12034751B2 (en)*2021-10-012024-07-09Secureworks Corp.Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
JP7685929B2 (en)*2021-10-192025-05-30株式会社日立製作所 Attack scenario analysis device and attack scenario analysis method
US12010152B2 (en)2021-12-082024-06-11Bank Of America CorporationInformation security systems and methods for cyber threat event prediction and mitigation
US11949696B2 (en)2021-12-172024-04-02Bank Of America CorporationData security system with dynamic intervention response
US12118560B2 (en)2022-02-152024-10-15Paypal, Inc.Pointer movement modelling for entity classification
US12255885B2 (en)*2022-05-312025-03-18Acronis International GmbhUser in group behavior signature monitor
KR102586870B1 (en)*2022-07-222023-10-11(주)아스트론시큐리티AI-based security risk prediction system and method for protection target in cloud environment
US20240070268A1 (en)*2022-08-232024-02-29Bitdefender IPR Management Ltd.Aggregate Event Profiles for Detecting Malicious Mobile Applications
US12143477B2 (en)*2022-09-132024-11-12Capital One Services, LlcSecure cryptographic transfer using multiparty computation
WO2024063714A1 (en)*2022-09-232024-03-28Binalyze Yazilim A.S.Method for measuring security operation center
US12386986B1 (en)*2022-10-122025-08-12Wells Fargo Bank, N.A.Endpoint security synchronization
US12316661B2 (en)2022-10-312025-05-27International Business Machines CorporationAuto-detection of observables and auto-disposition of alerts in an endpoint detection and response (EDR) system using machine learning
US20240430285A1 (en)*2023-06-212024-12-26Saudi Arabian Oil CompanyMethod and system for integrated cybersecurity operations
US12348539B2 (en)*2023-08-302025-07-01Expel, Inc.Systems, methods, and graphical user interfaces for configuring and executing one or more computer-executable threat hunting protocols in a cybersecurity threat detection and mitigation platform

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020082886A1 (en)*2000-09-062002-06-27Stefanos ManganarisMethod and system for detecting unusual events and application thereof in computer intrusion detection
US8280833B2 (en)*2008-06-122012-10-02Guardian Analytics, Inc.Fraud detection and analysis
US20130097701A1 (en)*2011-10-182013-04-18Mcafee, Inc.User behavioral risk assessment
US20130246605A1 (en)*2011-04-272013-09-19Mcafee, Inc.Local reputation to adjust sensitivity of behavioral detection system
US20140281645A1 (en)*2013-03-152014-09-18Accenture Global Services LimitedEnchanced grid reliability through predictive analysis and dynamic action for stable power distribution
US20140282964A1 (en)*2013-03-152014-09-18Telesign CorporationSystem and method for utilizing behavioral characteristics in authentication and fraud prevention
US20160078365A1 (en)*2014-03-212016-03-17Philippe BaumardAutonomous detection of incongruous behaviors
US20170006051A1 (en)*2015-06-302017-01-05K4Connect Inc.Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods
US20170201542A1 (en)*2016-01-072017-07-13Korea Internet & Security AgencyAbnormal behavior detection system considering error rate deviation of entire use behavior pattern during personalized connection period
US20180077187A1 (en)*2016-09-142018-03-15Carbon Black, Inc.Cybersecurity incident detection systems and techniques
US20180191763A1 (en)*2016-12-302018-07-05Dustin Lundring Rigg HillardSystem and method for determining network security threats

Family Cites Families (76)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6405318B1 (en)1999-03-122002-06-11Psionic Software, Inc.Intrusion detection system
US7124438B2 (en)2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US8046835B2 (en)2002-10-232011-10-25Frederick S. M. HerzDistributed computer network security activity model SDI-SCAM
US20060132302A1 (en)*2003-02-032006-06-22Stilp Louis APower management of transponders and sensors in an RFID security network
US7123142B2 (en)*2003-03-062006-10-17UnitoneIntegrated intercom and security system
US7373524B2 (en)*2004-02-242008-05-13Covelight Systems, Inc.Methods, systems and computer program products for monitoring user behavior for a server application
US7752671B2 (en)*2004-10-042010-07-06Promisec Ltd.Method and device for questioning a plurality of computerized devices
JP4742144B2 (en)2005-06-062011-08-10インターナショナル・ビジネス・マシーンズ・コーポレーション Method and computer program for identifying a device attempting to penetrate a TCP / IP protocol based network
US20070174910A1 (en)*2005-12-132007-07-26Zachman Frederick JComputer memory security platform
US8230505B1 (en)2006-08-112012-07-24Avaya Inc.Method for cooperative intrusion prevention through collaborative inference
EP2223460A4 (en)*2007-12-202011-12-28Bce IncContact-less tag with signature, and applications thereof
US9231964B2 (en)2009-04-142016-01-05Microsoft CorporationVulnerability detection based on aggregated primitives
EP2299650A1 (en)2009-09-212011-03-23Siemens AktiengesellschaftMethod for recognising anomalies in a control network
US8359652B2 (en)*2009-10-312013-01-22Microsoft CorporationDetecting anomalies in access control lists
US8607339B2 (en)*2009-11-022013-12-10Red Hat, Inc.Systems and methods for improved identification and analysis of threats to a computing system
US8489635B1 (en)*2010-01-132013-07-16Louisiana Tech University Research Foundation, A Division Of Louisiana Tech University Foundation, Inc.Method and system of identifying users based upon free text keystroke patterns
WO2011149558A2 (en)*2010-05-282011-12-01Abelow Daniel HReality alternate
US8621629B2 (en)2010-08-312013-12-31General Electric CompanySystem, method, and computer software code for detecting a computer network intrusion in an infrastructure element of a high value target
US10586036B2 (en)*2010-11-292020-03-10Biocatch Ltd.System, device, and method of recovery and resetting of user authentication factor
US10164985B2 (en)*2010-11-292018-12-25Biocatch Ltd.Device, system, and method of recovery and resetting of user authentication factor
US9690915B2 (en)*2010-11-292017-06-27Biocatch Ltd.Device, method, and system of detecting remote access users and differentiating among users
US8555385B1 (en)*2011-03-142013-10-08Symantec CorporationTechniques for behavior based malware analysis
US8739281B2 (en)2011-12-062014-05-27At&T Intellectual Property I, L.P.Multilayered deception for intrusion detection and prevention
US9137258B2 (en)*2012-02-012015-09-15Brightpoint Security, Inc.Techniques for sharing network security event information
US10270739B2 (en)*2012-02-282019-04-23Raytheon Bbn Technologies Corp.System and method for protecting service-level entities
US8904497B2 (en)*2012-08-032014-12-02Honeywell International Inc.Providing an operational dashboard
US8938805B1 (en)2012-09-242015-01-20Emc CorporationDetection of tampering with software installed on a processing device
US9177139B2 (en)2012-12-302015-11-03Honeywell International Inc.Control system cyber security
US8813236B1 (en)2013-01-072014-08-19Narus, Inc.Detecting malicious endpoints using network connectivity and flow information
US20160110551A1 (en)*2013-02-142016-04-21The United States Of America As Represented By The Secretary Of The NavyComputer System Anomaly Detection Using Human Responses to Ambient Representations of Hidden Computing System and Process Metadata
US10026049B2 (en)*2013-05-092018-07-17Rockwell Automation Technologies, Inc.Risk assessment for industrial systems using big data
US9319423B2 (en)*2013-11-042016-04-19At&T Intellectual Property I, L.P.Malware and anomaly detection via activity recognition based on sensor data
US9848036B1 (en)*2013-12-032017-12-19Google Inc.Systems, methods, and media for causing an action to be performed on a user device
US10122747B2 (en)*2013-12-062018-11-06Lookout, Inc.Response generation after distributed monitoring and evaluation of multiple devices
US9350748B1 (en)2013-12-162016-05-24Amazon Technologies, Inc.Countering service enumeration through optimistic response
US8984643B1 (en)*2014-02-142015-03-17Risk I/O, Inc.Ordered computer vulnerability remediation reporting
US9225730B1 (en)*2014-03-192015-12-29Amazon Technologies, Inc.Graph based detection of anomalous activity
WO2015168203A1 (en)*2014-04-292015-11-05PEGRight, Inc.Characterizing user behavior via intelligent identity analytics
KR102118159B1 (en)*2014-05-202020-06-03삼성전자주식회사Semiconductor Device and Method of fabricating the same
US9210181B1 (en)*2014-05-262015-12-08Solana Networks Inc.Detection of anomaly in network flow data
GB2529150B (en)*2014-08-042022-03-30Darktrace LtdCyber security
US9930058B2 (en)*2014-08-132018-03-27Honeywell International Inc.Analyzing cyber-security risks in an industrial control environment
US9323930B1 (en)2014-08-192016-04-26Symantec CorporationSystems and methods for reporting security vulnerabilities
US10162969B2 (en)*2014-09-102018-12-25Honeywell International Inc.Dynamic quantification of cyber-security risks in a control system
US9690928B2 (en)*2014-10-252017-06-27Mcafee, Inc.Computing platform security methods and apparatus
US9690933B1 (en)*2014-12-222017-06-27Fireeye, Inc.Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US9734358B2 (en)*2015-01-022017-08-15High Sec Labs LtdSelf-locking USB protection pug device having LED to securely protect USB jack
CN104601568B (en)*2015-01-132019-05-21深信服科技股份有限公司Virtualization security isolation method and device
US10075474B2 (en)2015-02-062018-09-11Honeywell International Inc.Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
EP3262815B1 (en)2015-02-242020-10-14Cisco Technology, Inc.System and method for securing an enterprise computing environment
US9910984B2 (en)*2015-02-272018-03-06Qualcomm IncorporatedMethods and systems for on-device high-granularity classification of device behaviors using multi-label models
US9350750B1 (en)2015-04-032016-05-24Area 1 Security, Inc.Distribution of security rules among sensor computers
US10142353B2 (en)2015-06-052018-11-27Cisco Technology, Inc.System for monitoring and managing datacenters
US9565192B2 (en)*2015-06-232017-02-07Symantec CorporationRouter based securing of internet of things devices on local area networks
CN106470115B (en)*2015-08-202021-01-29斑马智行网络(香港)有限公司Security configuration method, related device and system
US9825989B1 (en)*2015-09-302017-11-21Fireeye, Inc.Cyber attack early warning system
US10181038B2 (en)2015-11-172019-01-15Honeywell International Inc.Deployment assurance checks for monitoring industrial control systems
US9607144B1 (en)*2015-11-302017-03-28International Business Machines CorporationUser activity modelling, monitoring, and reporting framework
US20200265357A1 (en)*2015-12-302020-08-20Atul VashisthaSystems and methods to quantify risk associated with suppliers or geographic locations
US10581874B1 (en)*2015-12-312020-03-03Fireeye, Inc.Malware detection system with contextual analysis
US9824216B1 (en)*2015-12-312017-11-21Fireeye, Inc.Susceptible environment detection system
CN105511944B (en)*2016-01-072018-09-28上海海事大学A kind of method for detecting abnormality of cloud system internal virtual machine
US10135855B2 (en)2016-01-192018-11-20Honeywell International Inc.Near-real-time export of cyber-security risk information
US10268976B2 (en)*2016-02-172019-04-23SecurityScorecard, Inc.Non-intrusive techniques for discovering and using organizational relationships
US10372904B2 (en)*2016-03-082019-08-06Tanium Inc.Cost prioritized evaluations of indicators of compromise
US20170279826A1 (en)*2016-03-222017-09-28Symantec CorporationProtecting dynamic and short-lived virtual machine instances in cloud environments
US20170295188A1 (en)*2016-04-062017-10-12Karamba SecurityAutomated security policy generation for controllers
US10135847B2 (en)*2016-05-182018-11-20Salesforce.Com, Inc.Reverse shell network intrusion detection
WO2017201520A1 (en)*2016-05-202017-11-23Georgia Tech Research CorporationSystems and methods for detecting anomalous software on a programmable logic controller
US20180013722A1 (en)*2016-07-062018-01-11Eric EnosDistributed firewall device and system
US10237240B2 (en)*2016-07-212019-03-19AT&T Global Network Services (U.K.) B.V.Assessing risk associated with firewall rules
US10354061B2 (en)*2016-07-252019-07-16Panasonic Avionics CorporationMethods and systems for authenticating a headset for a transportation vehicle
US10262138B2 (en)*2016-09-152019-04-16Paypal, Inc.Techniques for ransomware detection and mitigation
US10671724B2 (en)*2016-09-152020-06-02Paypal, Inc.Techniques for detecting encryption
US10284589B2 (en)*2016-10-312019-05-07Acentium Inc.Methods and systems for ranking, filtering and patching detected vulnerabilities in a networked system
USPP29601P3 (en)2016-10-312018-08-14Suphatchatwong Innovation Co., Ltd.Sansevieria plant named ‘SUPSAN1601’

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020082886A1 (en)*2000-09-062002-06-27Stefanos ManganarisMethod and system for detecting unusual events and application thereof in computer intrusion detection
US8280833B2 (en)*2008-06-122012-10-02Guardian Analytics, Inc.Fraud detection and analysis
US20130246605A1 (en)*2011-04-272013-09-19Mcafee, Inc.Local reputation to adjust sensitivity of behavioral detection system
US20130097701A1 (en)*2011-10-182013-04-18Mcafee, Inc.User behavioral risk assessment
US20140281645A1 (en)*2013-03-152014-09-18Accenture Global Services LimitedEnchanced grid reliability through predictive analysis and dynamic action for stable power distribution
US20140282964A1 (en)*2013-03-152014-09-18Telesign CorporationSystem and method for utilizing behavioral characteristics in authentication and fraud prevention
US20160078365A1 (en)*2014-03-212016-03-17Philippe BaumardAutonomous detection of incongruous behaviors
US20170006051A1 (en)*2015-06-302017-01-05K4Connect Inc.Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods
US20170201542A1 (en)*2016-01-072017-07-13Korea Internet & Security AgencyAbnormal behavior detection system considering error rate deviation of entire use behavior pattern during personalized connection period
US20180077187A1 (en)*2016-09-142018-03-15Carbon Black, Inc.Cybersecurity incident detection systems and techniques
US20180191763A1 (en)*2016-12-302018-07-05Dustin Lundring Rigg HillardSystem and method for determining network security threats

Cited By (107)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10902114B1 (en)*2015-09-092021-01-26ThreatQuotient, Inc.Automated cybersecurity threat detection with aggregation and analysis
US12019740B2 (en)2015-09-092024-06-25ThreatQuotient, Inc.Automated cybersecurity threat detection with aggregation and analysis
US12143672B2 (en)*2017-03-032024-11-12Google LlcSystems and methods for detecting improper implementation of presentation of content items by applications executing on client devices
US11785297B2 (en)*2017-03-032023-10-10Google LlcSystems and methods for detecting improper implementation of presentation of content items by applications executing on client devices
US20220286743A1 (en)*2017-03-032022-09-08Google LlcSystems and Methods for Detecting Improper Implementation of Presentation of Content Items by Applications Executing on Client Devices
US11463453B2 (en)2017-05-152022-10-04Forcepoint, LLCUsing a story when generating inferences using an adaptive trust profile
US10915644B2 (en)2017-05-152021-02-09Forcepoint, LLCCollecting data for centralized use in an adaptive trust profile event via an endpoint
US20220070199A1 (en)*2017-05-152022-03-03Forcepoint, LLCRisk Score Calculation and Distribution
US10645096B2 (en)2017-05-152020-05-05Forcepoint LlcUser behavior profile environment
US11496488B2 (en)*2017-05-152022-11-08Forcepoint LlcRisk score calculation and distribution
US10798109B2 (en)2017-05-152020-10-06Forcepoint LlcAdaptive trust profile reference architecture
US10834098B2 (en)2017-05-152020-11-10Forcepoint, LLCUsing a story when generating inferences using an adaptive trust profile
US10834097B2 (en)2017-05-152020-11-10Forcepoint, LLCAdaptive trust profile components
US10326775B2 (en)2017-05-152019-06-18Forcepoint, LLCMulti-factor authentication using a user behavior profile as a factor
US10298609B2 (en)*2017-05-152019-05-21Forcepoint, LLCUser behavior profile environment
US10855693B2 (en)2017-05-152020-12-01Forcepoint, LLCUsing an adaptive trust profile to generate inferences
US10326776B2 (en)2017-05-152019-06-18Forcepoint, LLCUser behavior profile including temporal detail corresponding to user interaction
US10862901B2 (en)2017-05-152020-12-08Forcepoint, LLCUser behavior profile including temporal detail corresponding to user interaction
US10862927B2 (en)2017-05-152020-12-08Forcepoint, LLCDividing events into sessions during adaptive trust profile operations
US11575685B2 (en)2017-05-152023-02-07Forcepoint LlcUser behavior profile including temporal detail corresponding to user interaction
US10855692B2 (en)2017-05-152020-12-01Forcepoint, LLCAdaptive trust profile endpoint
US10447718B2 (en)2017-05-152019-10-15Forcepoint LlcUser profile definition and management
US11757902B2 (en)2017-05-152023-09-12Forcepoint LlcAdaptive trust profile reference architecture
US10917423B2 (en)2017-05-152021-02-09Forcepoint, LLCIntelligently differentiating between different types of states and attributes when using an adaptive trust profile
US10915643B2 (en)2017-05-152021-02-09Forcepoint, LLCAdaptive trust profile endpoint architecture
US10943019B2 (en)2017-05-152021-03-09Forcepoint, LLCAdaptive trust profile endpoint
US10999297B2 (en)2017-05-152021-05-04Forcepoint, LLCUsing expected behavior of an entity when prepopulating an adaptive trust profile
US10999296B2 (en)2017-05-152021-05-04Forcepoint, LLCGenerating adaptive trust profiles using information derived from similarly situated organizations
US11082440B2 (en)2017-05-152021-08-03Forcepoint LlcUser profile definition and management
US10264012B2 (en)2017-05-152019-04-16Forcepoint, LLCUser behavior profile
US10623431B2 (en)2017-05-152020-04-14Forcepoint LlcDiscerning psychological state from correlated user behavior and contextual information
US10897481B2 (en)*2017-05-172021-01-19Fujitsu LimitedRelay device, method and non-transitory computer-readable storage medium
US20190230104A1 (en)*2018-01-252019-07-25Bank Of America CorporationDynamic Record Identification and Analysis Computer System with Event Monitoring Components
US11394735B2 (en)2018-01-252022-07-19Bank Of America CorporationDynamic record identification and analysis computer system with event monitoring components
US10757123B2 (en)*2018-01-252020-08-25Bank Of America CorporationDynamic record identification and analysis computer system with event monitoring components
US20240129342A1 (en)*2018-06-292024-04-18Corvid Cyberdefense LlcIntegrated security and threat prevention and detection platform
US12316680B2 (en)*2018-06-292025-05-27Corvid Cyberdefense LlcIntegrated security and threat prevention and detection platform
US11700279B2 (en)*2018-06-292023-07-11Corvid Cyberdefense, LlcIntegrated security and threat prevention and detection platform
US10630718B2 (en)*2018-11-272020-04-21BehavioSec IncDetection of remote fraudulent activity in a client-server-system
US11907407B2 (en)2018-12-032024-02-20Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11283825B2 (en)*2018-12-032022-03-22Accenture Global Solutions LimitedLeveraging attack graphs of agile security platform
US11281806B2 (en)2018-12-032022-03-22Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11277432B2 (en)2018-12-032022-03-15Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11757921B2 (en)2018-12-032023-09-12Accenture Global Solutions LimitedLeveraging attack graphs of agile security platform
US11232235B2 (en)2018-12-032022-01-25Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11811816B2 (en)2018-12-032023-11-07Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11184385B2 (en)2018-12-032021-11-23Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11822702B2 (en)2018-12-032023-11-21Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11159555B2 (en)2018-12-032021-10-26Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11838310B2 (en)2018-12-032023-12-05Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US20210326466A1 (en)*2018-12-192021-10-21Jpmorgan Chase Bank, N.A.Methods for big data usage monitoring, entitlements and exception analysis
US11640476B2 (en)*2018-12-192023-05-02Jpmorgan Chase Bank, N.A.Methods for big data usage monitoring, entitlements and exception analysis
US11726809B2 (en)2019-01-282023-08-15Orca Security LTD.Techniques for securing virtual machines by application existence analysis
US11663031B2 (en)2019-01-282023-05-30Orca Security LTD.Techniques for securing virtual cloud assets at rest against cyber threats
US11740926B2 (en)2019-01-282023-08-29Orca Security LTD.Techniques for securing virtual machines by analyzing data for cyber threats
US12204930B2 (en)2019-01-282025-01-21Orca Security LTD.Techniques for securing virtual machines
US11868798B2 (en)2019-01-282024-01-09Orca Security LTD.Techniques for securing virtual machines
US11431735B2 (en)2019-01-282022-08-30Orca Security LTD.Techniques for securing virtual machines
US11693685B2 (en)2019-01-282023-07-04Orca Security LTD.Virtual machine vulnerabilities and sensitive data analysis and detection
US11516231B2 (en)2019-01-282022-11-29Orca Security LTD.Techniques for securing virtual machines
US11663032B2 (en)2019-01-282023-05-30Orca Security LTD.Techniques for securing virtual machines by application use analysis
US11775326B2 (en)2019-01-282023-10-03Orca Security LTD.Techniques for securing a plurality of virtual machines in a cloud computing environment
US11190488B1 (en)*2019-03-072021-11-30NortonLifeLock Inc.Adaptive security filtering on a client device
US11657149B2 (en)2019-03-272023-05-23Webroot Inc.Behavioral threat detection virtual machine
US11663326B2 (en)2019-03-272023-05-30Webroot Inc.Behavioral threat detection definition and compilation
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
US11755730B2 (en)*2019-03-272023-09-12Carbonite LlcBehavioral threat detection engine
US11481486B2 (en)*2019-03-272022-10-25Webroot Inc.Behavioral threat detection engine
US20220272112A1 (en)*2019-03-282022-08-25Microsoft Technology Licensing, LlcDetecting a missing security alert using a machine learning model
US11363036B2 (en)*2019-03-282022-06-14Microsoft Technology Licensing, LlcDetecting a missing security alert using a machine learning model
US11991191B2 (en)*2019-03-282024-05-21Microsoft Technology Licensing, LlcDetecting a missing security alert using a machine learning model
US11163884B2 (en)2019-04-262021-11-02Forcepoint LlcPrivacy and the adaptive trust profile
US10997295B2 (en)2019-04-262021-05-04Forcepoint, LLCAdaptive trust profile reference architecture
US10853496B2 (en)2019-04-262020-12-01Forcepoint, LLCAdaptive trust profile behavioral fingerprint
US11245702B2 (en)2019-05-082022-02-08Red Hat, Inc.Security vulnerability assessment for users of a cloud computing environment
US11997097B2 (en)2019-05-082024-05-28Red Hat, Inc.Security vulnerability assessment for users of a cloud computing environment
US11695795B2 (en)2019-07-122023-07-04Accenture Global Solutions LimitedEvaluating effectiveness of security controls in enterprise networks using graph values
US12026145B2 (en)2020-01-312024-07-02Snowflake Inc.Alert based on baseline result
US11379459B1 (en)*2020-01-312022-07-05Snowflake Inc.Alerts based on historical event-occurrence data
US10846702B1 (en)*2020-02-052020-11-24Capital One Services, LlcSystem and method for modifying payment processing times upon suspicion of fraud
US11301861B2 (en)2020-02-052022-04-12Capital One Services, LlcSystem and method for modifying payment processing times upon suspicion of fraud
US12216791B2 (en)2020-02-242025-02-04Forcepoint LlcRe-identifying pseudonymized or de-identified data utilizing distributed ledger technology
US11750657B2 (en)2020-02-282023-09-05Accenture Global Solutions LimitedCyber digital twin simulator for security controls requirements
US11876824B2 (en)2020-06-252024-01-16Accenture Global Solutions LimitedExtracting process aware analytical attack graphs through logical network analysis
US11533332B2 (en)2020-06-252022-12-20Accenture Global Solutions LimitedExecuting enterprise process abstraction using process aware analytical attack graphs
US11838307B2 (en)2020-07-092023-12-05Accenture Global Solutions LimitedResource-efficient generation of analytical attack graphs
US11483213B2 (en)2020-07-092022-10-25Accenture Global Solutions LimitedEnterprise process discovery through network traffic patterns
US11411976B2 (en)2020-07-092022-08-09Accenture Global Solutions LimitedResource-efficient generation of analytical attack graphs
US12034756B2 (en)2020-08-282024-07-09Accenture Global Solutions LimitedAnalytical attack graph differencing
CN112181781A (en)*2020-10-152021-01-05新华三信息安全技术有限公司Host security threat degree warning method, device, equipment and storage medium
US11831675B2 (en)2020-10-262023-11-28Accenture Global Solutions LimitedProcess risk calculation based on hardness of attack paths
US11973790B2 (en)2020-11-102024-04-30Accenture Global Solutions LimitedCyber digital twin simulator for automotive security assessment based on attack graphs
US20220159029A1 (en)*2020-11-132022-05-19Cyberark Software Ltd.Detection of security risks based on secretless connection data
US12284200B2 (en)2021-02-182025-04-22Accenture Global Solutions LimitedAutomated prioritization of process-aware cyber risk mitigation
US11880250B2 (en)2021-07-212024-01-23Accenture Global Solutions LimitedOptimizing energy consumption of production lines using intelligent digital twins
CN113691498A (en)*2021-07-232021-11-23全球能源互联网研究院有限公司Electric power internet of things terminal safety state evaluation method and device and storage medium
US11895150B2 (en)2021-07-282024-02-06Accenture Global Solutions LimitedDiscovering cyber-attack process model based on analytical attack graphs
US12231461B2 (en)2021-08-122025-02-18Accenture Global Solutions LimitedPrioritizing security controls using a cyber digital twin simulator
US12355798B2 (en)2021-08-252025-07-08Accenture Global Solutions LimitedAutomated prioritization of cyber risk mitigation by simulating exploits
US20230308467A1 (en)*2022-03-242023-09-28At&T Intellectual Property I, L.P.Home Gateway Monitoring for Vulnerable Home Internet of Things Devices
US12432244B2 (en)*2022-03-242025-09-30At&T Intellectual Property I, L.P.Home gateway monitoring for vulnerable home internet of things devices
US12289336B2 (en)2022-04-082025-04-29Accenture Global Solutions LimitedOntology-based risk propagation over digital twins
US12335296B2 (en)2022-06-152025-06-17Accenture Global Solutions LimitedAutomated cyber-security attack method prediction using detected vulnerabilities
US12348552B2 (en)2022-06-152025-07-01Accenture Global Solutions LimitedAutomated prediction of cyber-security attack techniques using knowledge mesh
US12294600B2 (en)*2022-08-302025-05-06International Business Machines CorporationReal time behavioral alert processing in computing environments
US20240411869A1 (en)*2023-06-072024-12-12Bank Of America CorporationCollaborative alert platform using distributed ledger technology
US20250141929A1 (en)*2023-10-312025-05-01Dell Products L.P.Managing an endpoint detection and response framework using out of band communication channels

Also Published As

Publication numberPublication date
US20180255077A1 (en)2018-09-06
US20200412747A1 (en)2020-12-31
US20180255076A1 (en)2018-09-06
US10701089B2 (en)2020-06-30
US20180255079A1 (en)2018-09-06
US20220353282A1 (en)2022-11-03
US20220368707A1 (en)2022-11-17
US10728261B2 (en)2020-07-28
WO2018158643A1 (en)2018-09-07
US20200329058A1 (en)2020-10-15

Similar Documents

PublicationPublication DateTitle
US20220353282A1 (en)System and Method for Cyber Security Threat Detection
US11636206B2 (en)Deferred malware scanning
US11757920B2 (en)User and entity behavioral analysis with network topology enhancements
US20220201042A1 (en)Ai-driven defensive penetration test analysis and recommendation system
US11204996B2 (en)Retention and accessibility of data characterizing events on an endpoint computer
Xie et al.pBMDS: a behavior-based malware detection system for cellphone devices
Nguyen et al.Detecting insider threats by monitoring system call activity
US10893059B1 (en)Verification and enhancement using detection systems located at the network periphery and endpoint devices
US20180359272A1 (en)Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
US8683598B1 (en)Mechanism to evaluate the security posture of a computer system
EP4229532A1 (en)Behavior detection and verification
CN113660224B (en)Situation awareness defense method, device and system based on network vulnerability scanning
EP3523743B1 (en)Detection of compromised devices via user states
US20200389496A1 (en)Automated identification of security issues
WO2014113501A1 (en)Systems and methods for identifying and reporting application and file vulnerabilities
US20230336575A1 (en)Security threat monitoring for network-accessible devices
JP2025508439A (en) Anti-ransomware using machine learning
Ah-Fat et al.Effective detection of credential thefts from windows memory: Learning access behaviours to local security authority subsystem service
US20230319050A1 (en)Method, product, and system for generating a software representation that embodies network configuration and policy data of a computer network for use in security management
Kono et al.An unknown malware detection using execution registry access
Carreón et al.Statistical time-based intrusion detection in embedded systems
Treaster et al.Detection of privilege escalation for linux cluster security
US12328322B2 (en)Method, product, and system for network security management using software representation that embodies network configuration and policy data
SundenApplying Elasticsearch for remote attestation data analysis in digital forensics
CN120389882A (en) Component poisoning treatment method, device, electronic device and computer program product

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:RESPONSIGHT PTY LTD, AUSTRALIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PAINE, JEFFREY;REEL/FRAME:045992/0742

Effective date:20170910

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp