Movatterモバイル変換


[0]ホーム

URL:


US20210273961A1 - Apparatus and method for a cyber-threat defense system - Google Patents

Apparatus and method for a cyber-threat defense system
Download PDF

Info

Publication number
US20210273961A1
US20210273961A1US17/187,385US202117187385AUS2021273961A1US 20210273961 A1US20210273961 A1US 20210273961A1US 202117187385 AUS202117187385 AUS 202117187385AUS 2021273961 A1US2021273961 A1US 2021273961A1
Authority
US
United States
Prior art keywords
cyber
threat
entities
network
incidents
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/187,385
Inventor
Dickon Murray Humphrey
Timothy Owen Bazalgette
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Darktrace Ltd
Darktrace Holdings Ltd
Original Assignee
Darktrace Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Darktrace LtdfiledCriticalDarktrace Ltd
Priority to US17/187,385priorityCriticalpatent/US20210273961A1/en
Publication of US20210273961A1publicationCriticalpatent/US20210273961A1/en
Assigned to Darktrace Holdings LimitedreassignmentDarktrace Holdings LimitedASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HUMPHREY, DICKON MURRAY, BAZALGETTE, TIMOTHY OWEN
Assigned to GOLDMAN SACHS BANK USA, AS COLLATERAL AGENTreassignmentGOLDMAN SACHS BANK USA, AS COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: Darktrace Holdings Limited
Assigned to GOLDMAN SACHS BANK USA, AS COLLATERAL AGENTreassignmentGOLDMAN SACHS BANK USA, AS COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: Darktrace Holdings Limited
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An apparatus comprising: one or more machine learning modules that are trained on a normal behavior of entities associated with a network and interactions between the entities; an interface configured to receive a signal from an external apparatus to request and trigger an artificial intelligence based analyst investigation; where the interface is configured to work with at least one of: artificial intelligence models trained on how to conduct an investigation; and scripts on how to conduct an investigation, in order to determine whether a chain of related low level abnormalities associated with one or more of the entities should be determined to be one or more incidents worthy of generating a notification to a human user for possible further investigation and/or worthy of being determined as an actual cyber-threat, and thus, trigger an autonomous response from an autonomous response module to mitigate the cyber-threat.

Description

Claims (20)

1. An apparatus comprising:
one or more machine learning modules that are trained on a normal behavior of entities associated with a network and interactions between the entities;
an interface configured to receive a signal from an external apparatus to request and trigger an artificial intelligence based analyst investigation, where the interface is configured to work with at least one of: artificial intelligence models trained on how to conduct an investigation; and scripts on how to conduct an investigation, in order to determine whether a chain of related low level abnormalities associated with one or more of the entities should be determined to be one or more incidents worthy of generating a notification to a human user for possible further investigation and/or worthy of being determined as an actual cyber-threat, and thus, trigger an autonomous response from an autonomous response module to mitigate the cyber-threat.
11. A method for a cyber-threat defense system, the method comprising:
using one or more machine learning models that are trained on a normal behavior of entities associated with a network and interactions between the entities;
receiving, at an interface, a signal from an external apparatus to request and trigger an artificial intelligence based analyst investigation;
the interface working with at least one of: artificial intelligence models trained on how to conduct an investigation; and scripts on how to conduct an investigation, and determining whether a chain of related low level abnormalities associated with one or more of the entities should be determined to be one or more incidents worthy of generating a notification to a human user for possible further investigation and/or worthy of being determined as an actual cyber-threat; and
triggering an autonomous response from an autonomous response module to mitigate the cyber-threat.
US17/187,3852020-02-282021-02-26Apparatus and method for a cyber-threat defense systemPendingUS20210273961A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/187,385US20210273961A1 (en)2020-02-282021-02-26Apparatus and method for a cyber-threat defense system

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US202062983307P2020-02-282020-02-28
US202063078092P2020-09-142020-09-14
US17/187,385US20210273961A1 (en)2020-02-282021-02-26Apparatus and method for a cyber-threat defense system

Publications (1)

Publication NumberPublication Date
US20210273961A1true US20210273961A1 (en)2021-09-02

Family

ID=75919334

Family Applications (6)

Application NumberTitlePriority DateFiling Date
US17/187,385PendingUS20210273961A1 (en)2020-02-282021-02-26Apparatus and method for a cyber-threat defense system
US17/187,377Active2042-07-08US11997113B2 (en)2020-02-282021-02-26Treating data flows differently based on level of interest
US17/187,169PendingUS20210273957A1 (en)2020-02-282021-02-26Cyber security for software-as-a-service factoring risk
US17/187,379Active2041-10-27US11936667B2 (en)2020-02-282021-02-26Cyber security system applying network sequence prediction using transformers
US18/439,524PendingUS20240314142A1 (en)2020-02-282024-02-12Cyber security system applying network sequence prediction using transformers
US18/630,896PendingUS20240259405A1 (en)2020-02-282024-04-09Treating data flows differently based on level of interest

Family Applications After (5)

Application NumberTitlePriority DateFiling Date
US17/187,377Active2042-07-08US11997113B2 (en)2020-02-282021-02-26Treating data flows differently based on level of interest
US17/187,169PendingUS20210273957A1 (en)2020-02-282021-02-26Cyber security for software-as-a-service factoring risk
US17/187,379Active2041-10-27US11936667B2 (en)2020-02-282021-02-26Cyber security system applying network sequence prediction using transformers
US18/439,524PendingUS20240314142A1 (en)2020-02-282024-02-12Cyber security system applying network sequence prediction using transformers
US18/630,896PendingUS20240259405A1 (en)2020-02-282024-04-09Treating data flows differently based on level of interest

Country Status (4)

CountryLink
US (6)US20210273961A1 (en)
EP (2)EP4111370A2 (en)
JP (2)JP7673082B2 (en)
WO (2)WO2021171093A1 (en)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20210152596A1 (en)*2019-11-192021-05-20Jpmorgan Chase Bank, N.A.System and method for phishing email training
US20210319098A1 (en)*2018-12-312021-10-14Intel CorporationSecuring systems employing artificial intelligence
US11265339B1 (en)2020-12-152022-03-01Senseon Tech LtdNetwork traffic monitoring
US11418533B2 (en)*2020-04-202022-08-16Prince Mohammad Bin Fahd UniversityMulti-tiered security analysis method and system
US11438357B2 (en)2018-06-222022-09-06Senseon Tech LtdEndpoint network sensor and related cybersecurity infrastructure
US20220294788A1 (en)*2021-03-092022-09-15Oracle International CorporationCustomizing authentication and handling pre and post authentication in identity cloud service
US11516233B2 (en)2018-06-222022-11-29Senseon Tech LtdCyber defense system
US20220382860A1 (en)*2021-05-262022-12-01Microsoft Technology Licensing, LlcDetecting anomalous events through application of anomaly detection models
US11522895B2 (en)2019-10-222022-12-06Senseon Tech LtdAnomaly detection
US20220414210A1 (en)*2021-06-292022-12-29EMC IP Holding Company LLCMalicious data access as highlighted graph visualization
US20220417263A1 (en)*2021-06-252022-12-29ThreatConnect, Inc.Browser extension for cybersecurity threat intelligence and response
US20230026135A1 (en)*2021-07-202023-01-26Bank Of America CorporationHybrid Machine Learning and Knowledge Graph Approach for Estimating and Mitigating the Spread of Malicious Software
US20230031123A1 (en)*2021-08-022023-02-02Verge Capital LimitedDistributed adaptive machine learning training for interaction exposure detection and prevention
US11652770B1 (en)*2021-12-312023-05-16Mastercard International IncorporatedMethods and systems for blocking exposure of internal architecture
US11663500B2 (en)*2020-05-052023-05-30International Business Machines CorporationVisualizing cybersecurity incidents using knowledge graph data
US20230224275A1 (en)*2022-01-122023-07-13Bank Of America CorporationPreemptive threat detection for an information system
EP4242895A1 (en)*2022-03-072023-09-13Recolabs Ltd.Systems and methods for securing files and/or records related to a business process
US20230297684A1 (en)*2022-02-172023-09-21UncommonX Inc.Generation of desired data for evaluation of at least a portion of a system
US20230300166A1 (en)*2022-03-182023-09-21Expel, Inc.Systems and methods for accelerated remediations of cybersecurity alerts and cybersecurity events in a cybersecurity event detection and response platform
US20230308467A1 (en)*2022-03-242023-09-28At&T Intellectual Property I, L.P.Home Gateway Monitoring for Vulnerable Home Internet of Things Devices
US20230370476A1 (en)*2022-05-102023-11-16Bank Of America CorporationSecurity system for dynamic detection of attempted security breaches using artificial intelligence, machine learning, and a mixed reality graphical interface
US20230403294A1 (en)*2021-11-222023-12-14Darktrace Holdings LimitedCyber security restoration engine
US11863573B2 (en)2020-03-062024-01-02ThreatConnect, Inc.Custom triggers for a network security event for cybersecurity threat intelligence
WO2024035746A1 (en)*2022-08-082024-02-15Darktrace Holdings LimitedA cyber security restoration engine
US20240179189A1 (en)*2021-06-182024-05-30Capital One Services, LlcSystems and methods for network security
US20240205239A1 (en)*2022-12-142024-06-20Onfido Ltd.Methods and systems for fraud detection using relative movement of facial features
US12019754B2 (en)2018-11-022024-06-25ThreatConnect, Inc.Ahead of time application launching for cybersecurity threat intelligence of network security events
WO2024145026A1 (en)*2022-12-292024-07-04Trustwave Holdings, Inc.Automated incident response tracking and enhanced framework for cyber threat analysis
US20240275798A1 (en)*2021-06-082024-08-15Siemens AktiengesellschaftMethod and system for automated analysis of industrial cybersecurity events
US12079348B1 (en)*2022-04-182024-09-03Clearwater Compliance LLCRisk rating method and system
US12088609B1 (en)*2021-09-292024-09-10Amazon Technologies, Inc.Investigative playbooks for cloud security events
US12143404B2 (en)2018-07-262024-11-12Senseon Tech LtdCyber defence system
US20240414149A1 (en)*2023-06-062024-12-12Capital One Services, LlcComputer-based systems configured to automatically generate communication scripts on a computing device and methods of use thereof
US20240422007A1 (en)*2023-06-142024-12-19Sophos LimitedMonitoring Process Data Acquisition and Exfiltration
US12206687B2 (en)2022-12-292025-01-21Trustwave Holdings IncAutomated incident response tracking and enhanced framework for cyber threat analysis
US12229246B2 (en)2021-06-252025-02-18ThreatConnect, Inc.Browser extension for cybersecurity threat intelligence and response
US12284087B2 (en)2019-10-232025-04-22Aryaka Networks, Inc.Correlation score based commonness indication associated with a point anomaly pertinent to data pattern changes in a cloud-based application acceleration as a service environment
US12294600B2 (en)*2022-08-302025-05-06International Business Machines CorporationReal time behavioral alert processing in computing environments
US12445294B2 (en)*2023-06-142025-10-14Sophos LimitedMonitoring process data acquisition and exfiltration

Families Citing this family (60)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12147205B2 (en)*2006-07-122024-11-19Imprenditore Pty Ltd.System and method for property security
US12353419B2 (en)2018-07-232025-07-08Monday.com Ltd.System and method for generating a tagged column-oriented data structure
US11995593B2 (en)*2018-11-282024-05-28Merck Sharp & Dohme LlcAdaptive enterprise risk evaluation
US12299619B2 (en)*2018-11-282025-05-13Merck Sharp & Dohme LlcAdaptive enterprise risk evaluation
CA3150278A1 (en)2019-09-092021-03-18Brian P. MurphyThreat mitigation system and method
EP4062313A1 (en)2019-11-182022-09-28Monday.com Ltd.Collaborative networking systems, methods, and devices
GB202004748D0 (en)*2020-03-302020-05-13British TelecommMethod of analysing anomalous network traffic
US11336542B2 (en)2020-06-032022-05-17Capital One Services, LlcNetwork packet capture manager
US11588830B1 (en)2020-06-302023-02-21Sequoia Benefits and Insurance Services, LLCUsing machine learning to detect malicious upload activity
US11599645B2 (en)*2021-01-072023-03-07Servicenow, Inc.Systems and methods for predicting cybersecurity vulnerabilities
US12113809B2 (en)2021-01-152024-10-08Bank Of America CorporationArtificial intelligence corroboration of vendor outputs
US11895128B2 (en)2021-01-152024-02-06Bank Of America CorporationArtificial intelligence vulnerability collation
US11757904B2 (en)2021-01-152023-09-12Bank Of America CorporationArtificial intelligence reverse vendor collation
US11683335B2 (en)*2021-01-152023-06-20Bank Of America CorporationArtificial intelligence vendor similarity collation
US11847111B2 (en)*2021-04-092023-12-19Bitdefender IPR Management Ltd.Anomaly detection systems and methods
IT202100015782A1 (en)*2021-06-162022-12-16Aizoon S R L Procedure for detecting anomalies in SSL and/or TLS communications, related device and IT product
CN115499144A (en)*2021-06-182022-12-20中兴通讯股份有限公司 Intrusion detection method, device and system, electronic device, computer readable medium
US20240259799A1 (en)*2021-06-232024-08-01Qualcomm IncorporatedMethods and apparatus for maintaining transmission integrity and authenticity through channel measurements and reporting
US12229511B2 (en)*2021-06-282025-02-18International Business Machines CorporationAutomatically generated question suggestions
US12381793B2 (en)*2021-07-152025-08-05Samsung Electronics Co., Ltd.Systems and methods for predicting undetectable flows in deep packet inspection
US12135789B2 (en)*2021-08-042024-11-05Secureworks Corp.Systems and methods of attack type and likelihood prediction
US20230121158A1 (en)*2021-08-112023-04-20The United States Of America, As Represented By The Secretary Of The NavyVirus autonomous defense system (vads)
WO2023039676A1 (en)*2021-09-172023-03-23Willowglen Systems Inc.Methods and systems for assessing and enhancing cybersecurity of a network
US12034751B2 (en)2021-10-012024-07-09Secureworks Corp.Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
US11893125B2 (en)*2021-10-142024-02-06Cohesity, Inc.Providing a graphical representation of anomalous events
LU500755B1 (en)*2021-10-192023-04-20Microsoft Technology Licensing LlcConfining lateral traversal within a computer network
US20230153178A1 (en)*2021-11-172023-05-18Grid.ai, Inc.System and method for standardized provider instance interaction
US20230205884A1 (en)*2021-12-282023-06-29Qatar Foundation For Education, Science And Community DevelopmentGenerating high-quality threat intelligence from aggregated threat reports
US20230231859A1 (en)*2022-01-182023-07-20Microsoft Technology Licensing, LlcOutput of baseline behaviors corresponding to features of anomalous events
US12348530B2 (en)*2022-06-022025-07-01Amzetta Technologies, LlcSecure remote worker device and management system
US12015623B2 (en)2022-06-242024-06-18Secureworks Corp.Systems and methods for consensus driven threat intelligence
US20230421587A1 (en)*2022-06-242023-12-28Crowdstrike, Inc.Distributed Digital Security System for Predicting Malicious Behavior
US12242630B2 (en)*2022-09-162025-03-04Bank Of America CorporationMutual transport layer security (TLS) verification using an authorized viewer
US12199834B2 (en)2022-10-192025-01-14The Mitre CorporationSystems and methods for generating computing network infrastructure from natural-language descriptions
EP4582984A3 (en)*2022-11-092025-08-20CrowdStrike, Inc.Adaptive profiling of cloud services using machine learning for malware detection
US20240223578A1 (en)*2022-12-292024-07-04Trustwave Holdings IncAutomated incident response tracking and enhanced framework for cyber threat analysis
US12271491B2 (en)2023-01-192025-04-08Citibank, N.A.Detection and mitigation of machine learning model adversarial attacks
US11763006B1 (en)*2023-01-192023-09-19Citibank, N.A.Comparative real-time end-to-end security vulnerabilities determination and visualization
US11874934B1 (en)*2023-01-192024-01-16Citibank, N.A.Providing user-induced variable identification of end-to-end computing system security impact information systems and methods
US12299140B2 (en)2023-01-192025-05-13Citibank, N.A.Dynamic multi-model monitoring and validation for artificial intelligence models
US12282565B2 (en)*2023-01-192025-04-22Citibank, N.A.Generative cybersecurity exploit synthesis and mitigation
US12223063B2 (en)2023-01-192025-02-11Citibank, N.A.End-to-end measurement, grading and evaluation of pretrained artificial intelligence models via a graphical user interface (GUI) systems and methods
US11748491B1 (en)*2023-01-192023-09-05Citibank, N.A.Determining platform-specific end-to-end security vulnerabilities for a software application via a graphical user interface (GUI) systems and methods
US12314406B1 (en)2023-01-192025-05-27Citibank, N.A.Generative cybersecurity exploit discovery and evaluation
US12088463B1 (en)2023-01-272024-09-10Wells Fargo Bank, N.A.Automated configuration of software applications
US20240323208A1 (en)*2023-03-202024-09-26Acronis International GmbhSystems and methods for detecting anomalous behavior in internet-of-things (iot) devices
US20240356951A1 (en)*2023-04-242024-10-24Abnormal Security CorporationApproaches to ascertaining behavioral deviations based on an analysis of multiple digital activities performed on the same service or across different services to detect threats
US12047416B1 (en)2023-05-262024-07-23Copperfasten Te ologies LimitedIntelligent anti-phishing management
WO2024257014A1 (en)2023-06-132024-12-19Monday.com Ltd.Digital processing systems and methods for enhanced data representation
WO2025037140A1 (en)*2023-08-142025-02-20Monday.com Ltd.Digital processing systems and methods for implementing and managing artificial intelligence functionalities in applications
CN116957049B (en)*2023-09-202023-12-15南京邮电大学Unsupervised internal threat detection method based on countermeasure self-encoder
US20250106097A1 (en)*2023-09-212025-03-27Zscaler, Inc.Systems and methods for automated assignment and alerting of non-compliant resources
US20250133091A1 (en)*2023-10-232025-04-24Sequoia Benefits and Insurance Services, LLCMachine learning for detecting malicious activity using access activity and job title
TW202518293A (en)*2023-10-262025-05-01財團法人資訊工業策進會Information security threat determination method and information security threat determination device
WO2025114750A1 (en)2023-11-282025-06-05Monday.com Ltd.Digital processing systems and methods for managing workflows
US20250209157A1 (en)*2023-12-212025-06-26Microsoft Technology Licensing, LlcDetecting and mitigating ransomware attacks
US20250274439A1 (en)*2024-02-282025-08-28Anecdotes.ai, LTDSystem and method for collecting evidences from a private infrastructure
US12154019B1 (en)2024-06-072024-11-26Citibank, N.A.System and method for constructing a layered artificial intelligence model
US12219360B1 (en)*2024-07-242025-02-04Netskope, Inc.Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation
CN118759298B (en)*2024-09-032024-11-08东莞市郡嘉电子科技有限公司Multi-parameter monitoring analysis method and device for transformer and transformer

Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130027561A1 (en)*2011-07-292013-01-31Panasonic CorporationSystem and method for improving site operations by detecting abnormalities
US20180164770A1 (en)*2016-12-142018-06-14Omron CorporationController, control program, and control method
US20180375886A1 (en)*2017-06-222018-12-27Oracle International CorporationTechniques for monitoring privileged users and detecting anomalous activities in a computing environment
US20190102554A1 (en)*2017-09-292019-04-04Microsoft Technology Licensing, LlcSecurity model training and threshold selection
US20190207967A1 (en)*2017-12-282019-07-04Fireeye, Inc.Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US20190260782A1 (en)*2018-02-202019-08-22Darktrace LimitedArtificial intelligence researcher assistant for cybersecurity analysis
US20190342286A1 (en)*2018-05-032019-11-07SoftWarfare, LLCBiometric cybersecurity and workflow management
US20210349996A1 (en)*2017-07-132021-11-11Cisco Technology, Inc.Os start event detection, os fingerprinting, and device tracking using enhanced data features
US20220101326A1 (en)*2019-01-182022-03-31Uppsala Pte. Ltd.Apparatus and method for cybersecurity
US20220200973A1 (en)*2019-04-152022-06-23Bear System, LLCBlockchain schema for secure data transmission
US20220263860A1 (en)*2015-10-282022-08-18Qomplx, Inc.Advanced cybersecurity threat hunting using behavioral and deep analytics
US20230208869A1 (en)*2018-06-122023-06-29Akitra, Inc.Generative artificial intelligence method and system configured to provide outputs for company compliance
US20230370439A1 (en)*2015-10-282023-11-16Qomplx, Inc.Network action classification and analysis using widely distributed honeypot sensor nodes

Family Cites Families (140)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6154844A (en)1996-11-082000-11-28Finjan Software, Ltd.System and method for attaching a downloadable security profile to a downloadable
US7418731B2 (en)1997-11-062008-08-26Finjan Software, Ltd.Method and system for caching at secure gateways
US6671811B1 (en)1999-10-252003-12-30Visa Internation Service AssociationFeatures generation for use in computer network intrusion detection
US7630986B1 (en)1999-10-272009-12-08Pinpoint, IncorporatedSecure data interchange
US7307999B1 (en)2001-02-162007-12-11Bbn Technologies Corp.Systems and methods that identify normal traffic during network attacks
US20020174217A1 (en)2001-05-182002-11-21Gateway, Inc.System and method for predicting network performance
US20020186698A1 (en)2001-06-122002-12-12Glen CenizaSystem to map remote lan hosts to local IP addresses
US6907430B2 (en)2001-10-042005-06-14Booz-Allen Hamilton, Inc.Method and system for assessing attacks on computer networks using Bayesian networks
US7448084B1 (en)2002-01-252008-11-04The Trustees Of Columbia University In The City Of New YorkSystem and methods for detecting intrusions in a computer system by monitoring operating system registry accesses
AUPS204402A0 (en)*2002-04-302002-06-06Intelliguard I.T. Pty LtdA firewall system
US8046835B2 (en)2002-10-232011-10-25Frederick S. M. HerzDistributed computer network security activity model SDI-SCAM
WO2004057503A2 (en)2002-12-202004-07-08Accenture Global Services GmbhQuantification of operational risks
JP2004309998A (en)2003-02-182004-11-04Nec CorpProbabilistic distribution estimation apparatus, abnormal behavior detection device, probabilistic distribution estimation method, and abnormal behavior detection method
US6965968B1 (en)2003-02-272005-11-15Finjan Software Ltd.Policy-based caching
CA2433750A1 (en)*2003-06-272004-12-27Ibm Canada Limited - Ibm Canada LimiteeAutomatic collection of trace detail and history data
JP2005217692A (en)2004-01-292005-08-11Oki Techno Creation:Kk Intrusion identification system
US20060268866A1 (en)*2005-05-172006-11-30Simon LokOut-of-order superscalar IP packet analysis
US7930752B2 (en)2005-11-182011-04-19Nexthink S.A.Method for the detection and visualization of anomalous behaviors in a computer network
US7739211B2 (en)2006-11-082010-06-1521St Century Technologies, Inc.Dynamic SNA-based anomaly detection using unsupervised learning
WO2007142936A2 (en)2006-05-302007-12-13Duke UniversityPrediction of lung cancer tumor recurrence
US7739082B2 (en)2006-06-082010-06-15Battelle Memorial InstituteSystem and method for anomaly detection
US8132260B1 (en)2006-06-122012-03-06Redseal Systems, Inc.Methods and apparatus for prioritization of remediation techniques for network security risks
US20080005137A1 (en)2006-06-292008-01-03Microsoft CorporationIncrementally building aspect models
US7467067B2 (en)2006-09-272008-12-16Integrien CorporationSelf-learning integrity management system and related methods
IL189530A0 (en)2007-02-152009-02-11Marvell Software Solutions IsrMethod and apparatus for deep packet inspection for network intrusion detection
US8601575B2 (en)2007-03-302013-12-03Ca, Inc.Statistical method and system for network anomaly detection
US8028061B2 (en)2007-10-182011-09-27Trendium, Inc.Methods, systems, and computer program products extracting network behavioral metrics and tracking network behavioral changes
US20090132365A1 (en)*2007-11-152009-05-21Microsoft CorporationSearch, advertising and social networking applications and services
WO2009120083A1 (en)2008-03-282009-10-01Nederlandse Organisatie Voor Toegepast-Natuurwetenschappelijk Onderzoek TnoAutomated filling of conditional probability data in a decision support apparatus that uses a bayesian belief network
US8312540B1 (en)2008-06-132012-11-13Juniper Networks, Inc.System for slowing password attacks
CN101686235B (en)2008-09-262013-04-24北京神州绿盟信息安全科技股份有限公司Device and method for analyzing abnormal network flow
US8069210B2 (en)2008-10-102011-11-29Microsoft CorporationGraph based bot-user detection
US8312542B2 (en)2008-10-292012-11-13Lockheed Martin CorporationNetwork intrusion detection using MDL compress for deep packet inspection
JP2010122774A (en)2008-11-182010-06-03Toshiba Storage Device CorpStorage device, information processor, and information processing system
WO2010060480A1 (en)2008-11-262010-06-03Telecom Italia S.P.A.Application data flow management in an ip network
US20100235908A1 (en)2009-03-132010-09-16Silver Tail SystemsSystem and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Analysis
US8356001B2 (en)2009-05-192013-01-15Xybersecure, Inc.Systems and methods for application-level security
US8601587B1 (en)*2009-09-042013-12-03Raytheon CompanySystem, method, and software for cyber threat analysis
US20120137367A1 (en)2009-11-062012-05-31Cataphora, Inc.Continuous anomaly detection based on behavior modeling and heterogeneous information analysis
US9866426B2 (en)2009-11-172018-01-09Hawk Network Defense, Inc.Methods and apparatus for analyzing system events
US10027711B2 (en)*2009-11-202018-07-17Alert Enterprise, Inc.Situational intelligence
US8776226B2 (en)*2010-01-262014-07-08Bae Systems Information And Electronic Systems Integration Inc.Method and apparatus for detecting SSH login attacks
US8725666B2 (en)2010-02-262014-05-13Lawrence Livermore National Security, Llc.Information extraction system
US9032521B2 (en)2010-10-132015-05-12International Business Machines CorporationAdaptive cyber-security analytics
US8966036B1 (en)2010-11-242015-02-24Google Inc.Method and system for website user account management based on event transition matrixes
WO2012089902A1 (en)2010-12-302012-07-05Nokia CorporationMethod, apparatus, and computer program product for image clustering
US9119109B1 (en)2010-12-302015-08-25Dell Software Inc.Method and an apparatus to perform multi-connection traffic analysis and management
WO2012109533A1 (en)2011-02-102012-08-16Beyondtrust Software, Inc.System and method for detecting or preventing data leakage using behavior profiling
US20120209575A1 (en)2011-02-112012-08-16Ford Global Technologies, LlcMethod and System for Model Validation for Dynamic Systems Using Bayesian Principal Component Analysis
WO2012154657A2 (en)2011-05-062012-11-15The Penn State Research FoundationRobust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows
US9047441B2 (en)2011-05-242015-06-02Palo Alto Networks, Inc.Malware analysis system
US8528088B2 (en)2011-05-262013-09-03At&T Intellectual Property I, L.P.Modeling and outlier detection in threat management system data
EP2737404A4 (en)2011-07-262015-04-29Light Cyber Ltd METHOD FOR DETECTING ABNORMAL ACTIONS IN A COMPUTER NETWORK
US8930295B2 (en)2011-09-122015-01-06Stanley Victor CAMPBELLSystems and methods for monitoring and analyzing transactions
US8793790B2 (en)2011-10-112014-07-29Honeywell International Inc.System and method for insider threat detection
ES2577143T3 (en)2011-10-142016-07-13Telefónica, S.A. Method and system to detect malicious software
US8881289B2 (en)*2011-10-182014-11-04Mcafee, Inc.User behavioral risk assessment
US9106687B1 (en)2011-11-012015-08-11Symantec CorporationMechanism for profiling user and group accesses to content repository
US9349103B2 (en)2012-01-092016-05-24DecisionQ CorporationApplication of machine learned Bayesian networks to detection of anomalies in complex systems
US9043905B1 (en)2012-01-232015-05-26Hrl Laboratories, LlcSystem and method for insider threat detection
US9129108B2 (en)2012-01-312015-09-08International Business Machines CorporationSystems, methods and computer programs providing impact mitigation of cyber-security failures
US9117076B2 (en)2012-03-142015-08-25Wintermute, LlcSystem and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity
US9185095B1 (en)2012-03-202015-11-10United Services Automobile Association (Usaa)Behavioral profiling method and system to authenticate a user
US8661538B2 (en)2012-05-092014-02-25Nice-Systems Ltd.System and method for determining a risk root cause
US8819803B1 (en)2012-06-292014-08-26Emc CorporationValidating association of client devices with authenticated clients
WO2014021863A1 (en)*2012-07-312014-02-06Hewlett-Packard Development Company, L.P.Network traffic processing system
EP2929666B1 (en)2012-12-062021-03-31The Boeing CompanyContext aware network security monitoring for threat detection
US9935879B2 (en)2012-12-292018-04-03Netronome Systems, Inc.Efficient intercept of connection-based transport layer connections
US9679131B2 (en)2013-01-252017-06-13Cybereason Inc.Method and apparatus for computer intrusion detection
WO2014142792A1 (en)2013-03-112014-09-18Mcafee, Inc.Using learned flow reputation as a heuristic to control deep packet inspection under load
US9904893B2 (en)2013-04-022018-02-27Patternex, Inc.Method and system for training a big data machine to defend
US9264442B2 (en)2013-04-262016-02-16Palo Alto Research Center IncorporatedDetecting anomalies in work practice data by combining multiple domains of information
CN104424235B (en)2013-08-262018-01-05腾讯科技(深圳)有限公司The method and apparatus for realizing user profile cluster
US9558347B2 (en)2013-08-272017-01-31Globalfoundries Inc.Detecting anomalous user behavior using generative models of user actions
US9401925B1 (en)2013-09-122016-07-26Symantec CorporationSystems and methods for detecting security threats based on user profiles
JP5891213B2 (en)2013-09-182016-03-22ヤフー株式会社 A posteriori probability calculation device, posterior probability calculation method, and program
EP3053298B1 (en)*2013-10-032023-03-29FireEye Security Holdings US LLCDynamic adaptive defense for cyber-security threats
US9712548B2 (en)2013-10-272017-07-18Cyber-Ark Software Ltd.Privileged analytics system
US9516039B1 (en)2013-11-122016-12-06EMC IP Holding Company LLCBehavioral detection of suspicious host activities in an enterprise
US9753796B2 (en)2013-12-062017-09-05Lookout, Inc.Distributed monitoring, evaluation, and response for multiple devices
CN104700037B (en)*2013-12-102018-04-27杭州海康威视系统技术有限公司Protect the method and its system of cloud storage video data
US9361463B2 (en)2013-12-112016-06-07Ut-Batelle, LlcDetection of anomalous events
US10063654B2 (en)2013-12-132018-08-28Oracle International CorporationSystems and methods for contextual and cross application threat detection and prediction in cloud applications
US9386034B2 (en)2013-12-172016-07-05Hoplite Industries, Inc.Behavioral model based malware protection system and method
US9348742B1 (en)2013-12-182016-05-24Amazon Technologies, Inc.Detecting code alteration based on memory allocation
KR101501669B1 (en)2013-12-242015-03-12한국인터넷진흥원Behavior detection system for detecting abnormal behavior
US20150039513A1 (en)2014-02-142015-02-05Brighterion, Inc.User device profiling in transaction authentications
CN103825888A (en)2014-02-172014-05-28北京奇虎科技有限公司 Network Threat Processing Method and Equipment
US20160078365A1 (en)2014-03-212016-03-17Philippe BaumardAutonomous detection of incongruous behaviors
US9589245B2 (en)2014-04-072017-03-07International Business Machines CorporationInsider threat prediction
WO2015168203A1 (en)2014-04-292015-11-05PEGRight, Inc.Characterizing user behavior via intelligent identity analytics
US9503467B2 (en)2014-05-222016-11-22Accenture Global Services LimitedNetwork anomaly detection
US9984334B2 (en)2014-06-162018-05-29Mitsubishi Electric Research Laboratories, Inc.Method for anomaly detection in time series data based on spectral partitioning
US10237298B1 (en)2014-06-172019-03-19Wells Fargo Bank, N.A.Session management
US9727723B1 (en)2014-06-182017-08-08EMC IP Holding Co. LLCRecommendation system based approach in reducing false positives in anomaly detection
US9996444B2 (en)2014-06-252018-06-12Vmware, Inc.Automated methods and systems for calculating hard thresholds
GB2529150B (en)2014-08-042022-03-30Darktrace LtdCyber security
US20160062950A1 (en)2014-09-032016-03-03Google Inc.Systems and methods for anomaly detection and guided analysis using structural time-series models
US9661010B2 (en)2014-11-212017-05-23Honeywell International Inc.Security log mining devices, methods, and systems
US9866578B2 (en)2014-12-032018-01-09AlphaSix Corp.System and method for network intrusion detection anomaly risk scoring
US9571512B2 (en)2014-12-152017-02-14Sophos LimitedThreat detection using endpoint variance
US9998425B2 (en)*2015-01-272018-06-12Sonicwall Inc.Dynamic bypass of TLS connections matching exclusion list in DPI-SSL in a NAT deployment
US10334085B2 (en)*2015-01-292019-06-25Splunk Inc.Facilitating custom content extraction from network packets
US20160241576A1 (en)2015-02-132016-08-18Canon Kabushiki KaishaDetection of anomalous network activity
EP3262815B1 (en)2015-02-242020-10-14Cisco Technology, Inc.System and method for securing an enterprise computing environment
WO2016177437A1 (en)2015-05-052016-11-10Balabit S.A.Computer-implemented method for determining computer system security threats, security operations center system and computer program product
US20160359695A1 (en)2015-06-042016-12-08Cisco Technology, Inc.Network behavior data collection and analytics for anomaly detection
US10043006B2 (en)2015-06-172018-08-07Accenture Global Services LimitedEvent anomaly analysis and prediction
US9699205B2 (en)*2015-08-312017-07-04Splunk Inc.Network security system
US9641544B1 (en)2015-09-182017-05-02Palo Alto Networks, Inc.Automated insider threat prevention
US20170118239A1 (en)*2015-10-262017-04-27Microsoft Technology Licensing, Llc.Detection of cyber threats against cloud-based applications
WO2017100364A1 (en)*2015-12-072017-06-15Prismo Systems Inc.Systems and methods for detecting and responding to security threats using application execution and connection lineage tracing
GB2547202B (en)2016-02-092022-04-20Darktrace LtdAn anomaly alert system for cyber threat detection
GB2547201B (en)2016-02-092022-08-31Darktrace Holdings LtdCyber security
GB201603304D0 (en)2016-02-252016-04-13Darktrace LtdCyber security
US20170270422A1 (en)2016-03-162017-09-21Canon Kabushiki KaishaInformation processing apparatus, information processing method, and program
US10091235B1 (en)2016-06-072018-10-02Juniper Networks, Inc.Method, system, and apparatus for detecting and preventing targeted attacks
US10673870B2 (en)*2017-01-272020-06-02Splunk Inc.Security monitoring of network connections using metrics data
US10469386B2 (en)*2017-05-172019-11-05General Electric CompanyNetwork shunt with bypass
US11017341B2 (en)*2017-07-122021-05-25Nintex UK Ltd.Workflow as a service
CN111095955B (en)2017-07-272023-09-08上游安全有限公司 Systems and methods for connected vehicle cybersecurity
EP3438848B1 (en)*2017-07-312019-05-1551 Degrees Mobile Experts LimitedIdentifying properties of a communication device
US11611574B2 (en)2017-08-022023-03-21Code42 Software, Inc.User behavior analytics for insider threat detection
US11032294B2 (en)*2017-08-152021-06-08Gigamon Inc.Dynamic decryption of suspicious network traffic based on certificate validation
WO2019075338A1 (en)*2017-10-122019-04-18Charles River Analytics, Inc.Cyber vaccine and predictive-malware-defense methods and systems
US10999304B2 (en)*2018-04-112021-05-04Palo Alto Networks (Israel Analytics) Ltd.Bind shell attack detection
GB201810294D0 (en)2018-06-222018-08-08Senseon Tech LtdCybe defence system
GB201812171D0 (en)2018-07-262018-09-12Senseon Tech LtdCyber defence system
US10924330B2 (en)*2018-09-072021-02-16Vmware, Inc.Intelligent anomaly detection and root cause analysis in mobile networks
US11741463B2 (en)*2018-09-132023-08-29American Express Travel Related Services Company, Inc.Leakage detection system
EP3633392B1 (en)*2018-10-042024-07-31Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V.Concept for analysis of a radio communication system
US11190420B2 (en)*2018-10-312021-11-30Salesforce.Com, Inc.Generating events from host based logging for consumption by a network logging host
KR102555374B1 (en)*2018-12-272023-07-14삼성전자주식회사Electronic device and control method thereof
RU2724716C1 (en)*2018-12-282020-06-25Акционерное общество "Лаборатория Касперского"System and method of generating data for monitoring cyber-physical system for purpose of early detection of anomalies in graphical user interface
US10986121B2 (en)2019-01-242021-04-20Darktrace LimitedMultivariate network structure anomaly detector
US12170680B2 (en)*2019-02-132024-12-17Obsidian Security, Inc.Systems and methods for detecting security incidents across cloud-based application services
US11928016B2 (en)*2019-12-092024-03-12Visa International Service AssociationFailure prediction in distributed environments
US11323470B2 (en)*2019-12-182022-05-03Cyberark Software Ltd.Analyzing and addressing least-privilege security threats on a composite basis
US20210226969A1 (en)*2020-01-222021-07-22Forcepoint, LLCDetermining an Abstraction Level for Contents of an Entity Behavior Catalog
EP4111343A1 (en)2020-02-282023-01-04Darktrace Holdings LimitedAn artificial intelligence adversary red team

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130027561A1 (en)*2011-07-292013-01-31Panasonic CorporationSystem and method for improving site operations by detecting abnormalities
US20220263860A1 (en)*2015-10-282022-08-18Qomplx, Inc.Advanced cybersecurity threat hunting using behavioral and deep analytics
US20230370439A1 (en)*2015-10-282023-11-16Qomplx, Inc.Network action classification and analysis using widely distributed honeypot sensor nodes
US20180164770A1 (en)*2016-12-142018-06-14Omron CorporationController, control program, and control method
US20180375886A1 (en)*2017-06-222018-12-27Oracle International CorporationTechniques for monitoring privileged users and detecting anomalous activities in a computing environment
US20210349996A1 (en)*2017-07-132021-11-11Cisco Technology, Inc.Os start event detection, os fingerprinting, and device tracking using enhanced data features
US20190102554A1 (en)*2017-09-292019-04-04Microsoft Technology Licensing, LlcSecurity model training and threshold selection
US20190207967A1 (en)*2017-12-282019-07-04Fireeye, Inc.Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US20190260782A1 (en)*2018-02-202019-08-22Darktrace LimitedArtificial intelligence researcher assistant for cybersecurity analysis
US20190342286A1 (en)*2018-05-032019-11-07SoftWarfare, LLCBiometric cybersecurity and workflow management
US20230208869A1 (en)*2018-06-122023-06-29Akitra, Inc.Generative artificial intelligence method and system configured to provide outputs for company compliance
US20220101326A1 (en)*2019-01-182022-03-31Uppsala Pte. Ltd.Apparatus and method for cybersecurity
US20220200973A1 (en)*2019-04-152022-06-23Bear System, LLCBlockchain schema for secure data transmission

Cited By (58)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11438357B2 (en)2018-06-222022-09-06Senseon Tech LtdEndpoint network sensor and related cybersecurity infrastructure
US12212582B2 (en)2018-06-222025-01-28Senseon Tech LtdCyber defense system
US11516233B2 (en)2018-06-222022-11-29Senseon Tech LtdCyber defense system
US12143404B2 (en)2018-07-262024-11-12Senseon Tech LtdCyber defence system
US12019754B2 (en)2018-11-022024-06-25ThreatConnect, Inc.Ahead of time application launching for cybersecurity threat intelligence of network security events
US12346432B2 (en)*2018-12-312025-07-01Intel CorporationSecuring systems employing artificial intelligence
US20210319098A1 (en)*2018-12-312021-10-14Intel CorporationSecuring systems employing artificial intelligence
US11916948B2 (en)2019-10-222024-02-27Senseon Tech LtdAnomaly detection
US11522895B2 (en)2019-10-222022-12-06Senseon Tech LtdAnomaly detection
US12284087B2 (en)2019-10-232025-04-22Aryaka Networks, Inc.Correlation score based commonness indication associated with a point anomaly pertinent to data pattern changes in a cloud-based application acceleration as a service environment
US12309039B2 (en)2019-10-232025-05-20Aryaka Networks, Inc.Efficient detection and prediction of data pattern changes in a cloud-based application acceleration as a service environment
US11870807B2 (en)*2019-11-192024-01-09Jpmorgan Chase Bank, N.A.System and method for phishing email training
US20210152596A1 (en)*2019-11-192021-05-20Jpmorgan Chase Bank, N.A.System and method for phishing email training
US11863573B2 (en)2020-03-062024-01-02ThreatConnect, Inc.Custom triggers for a network security event for cybersecurity threat intelligence
US11418533B2 (en)*2020-04-202022-08-16Prince Mohammad Bin Fahd UniversityMulti-tiered security analysis method and system
US11663500B2 (en)*2020-05-052023-05-30International Business Machines CorporationVisualizing cybersecurity incidents using knowledge graph data
US11265339B1 (en)2020-12-152022-03-01Senseon Tech LtdNetwork traffic monitoring
US12238101B2 (en)*2021-03-092025-02-25Oracle International CorporationCustomizing authentication and handling pre and post authentication in identity cloud service
US20220294788A1 (en)*2021-03-092022-09-15Oracle International CorporationCustomizing authentication and handling pre and post authentication in identity cloud service
US20220382860A1 (en)*2021-05-262022-12-01Microsoft Technology Licensing, LlcDetecting anomalous events through application of anomaly detection models
US20240275798A1 (en)*2021-06-082024-08-15Siemens AktiengesellschaftMethod and system for automated analysis of industrial cybersecurity events
US20240179189A1 (en)*2021-06-182024-05-30Capital One Services, LlcSystems and methods for network security
US12301632B2 (en)*2021-06-182025-05-13Capital One Services, LlcSystems and methods for network security
US12229246B2 (en)2021-06-252025-02-18ThreatConnect, Inc.Browser extension for cybersecurity threat intelligence and response
US20220417263A1 (en)*2021-06-252022-12-29ThreatConnect, Inc.Browser extension for cybersecurity threat intelligence and response
US11985144B2 (en)*2021-06-252024-05-14ThreatConnect, Inc.Browser extension for cybersecurity threat intelligence and response
US20220414210A1 (en)*2021-06-292022-12-29EMC IP Holding Company LLCMalicious data access as highlighted graph visualization
US12326931B2 (en)*2021-06-292025-06-10EMC IP Holding Company LLCMalicious data access as highlighted graph visualization
US11914709B2 (en)*2021-07-202024-02-27Bank Of America CorporationHybrid machine learning and knowledge graph approach for estimating and mitigating the spread of malicious software
US20230026135A1 (en)*2021-07-202023-01-26Bank Of America CorporationHybrid Machine Learning and Knowledge Graph Approach for Estimating and Mitigating the Spread of Malicious Software
US20230031123A1 (en)*2021-08-022023-02-02Verge Capital LimitedDistributed adaptive machine learning training for interaction exposure detection and prevention
US12088609B1 (en)*2021-09-292024-09-10Amazon Technologies, Inc.Investigative playbooks for cloud security events
US20230403294A1 (en)*2021-11-222023-12-14Darktrace Holdings LimitedCyber security restoration engine
US11652770B1 (en)*2021-12-312023-05-16Mastercard International IncorporatedMethods and systems for blocking exposure of internal architecture
US12267299B2 (en)*2022-01-122025-04-01Bank Of America CorporationPreemptive threat detection for an information system
US20230224275A1 (en)*2022-01-122023-07-13Bank Of America CorporationPreemptive threat detection for an information system
US20230297684A1 (en)*2022-02-172023-09-21UncommonX Inc.Generation of desired data for evaluation of at least a portion of a system
EP4242895A1 (en)*2022-03-072023-09-13Recolabs Ltd.Systems and methods for securing files and/or records related to a business process
US11811819B2 (en)*2022-03-182023-11-07Expel, Inc.Systems and methods for accelerated remediations of cybersecurity alerts and cybersecurity events in a cybersecurity event detection and response platform
US12309193B2 (en)*2022-03-182025-05-20Expel, Inc.Systems and methods for accelerated remediations of cybersecurity alerts and cybersecurity events in a cybersecurity event detection and response platform
US11949708B2 (en)*2022-03-182024-04-02Expel, Inc.Systems and methods for accelerated remediations of cybersecurity alerts and cybersecurity events in a cybersecurity event detection and response platform
US20230300166A1 (en)*2022-03-182023-09-21Expel, Inc.Systems and methods for accelerated remediations of cybersecurity alerts and cybersecurity events in a cybersecurity event detection and response platform
US20250039229A1 (en)*2022-03-182025-01-30Expel, Inc.Systems and methods for accelerated remediations of cybersecurity alerts and cybersecurity events in a cybersecurity event detection and response platform
US20240031398A1 (en)*2022-03-182024-01-25Expel, Inc.Systems and methods for accelerated remediations of cybersecurity alerts and cybersecurity events in a cybersecurity event detection and response platform
US20230308467A1 (en)*2022-03-242023-09-28At&T Intellectual Property I, L.P.Home Gateway Monitoring for Vulnerable Home Internet of Things Devices
US12432244B2 (en)*2022-03-242025-09-30At&T Intellectual Property I, L.P.Home gateway monitoring for vulnerable home internet of things devices
US12079348B1 (en)*2022-04-182024-09-03Clearwater Compliance LLCRisk rating method and system
US12088604B2 (en)*2022-05-102024-09-10Bank Of America CorporationSecurity system for dynamic detection of attempted security breaches using artificial intelligence, machine learning, and a mixed reality graphical interface
US20230370476A1 (en)*2022-05-102023-11-16Bank Of America CorporationSecurity system for dynamic detection of attempted security breaches using artificial intelligence, machine learning, and a mixed reality graphical interface
WO2024035746A1 (en)*2022-08-082024-02-15Darktrace Holdings LimitedA cyber security restoration engine
US12294600B2 (en)*2022-08-302025-05-06International Business Machines CorporationReal time behavioral alert processing in computing environments
US20240205239A1 (en)*2022-12-142024-06-20Onfido Ltd.Methods and systems for fraud detection using relative movement of facial features
US12206687B2 (en)2022-12-292025-01-21Trustwave Holdings IncAutomated incident response tracking and enhanced framework for cyber threat analysis
WO2024145026A1 (en)*2022-12-292024-07-04Trustwave Holdings, Inc.Automated incident response tracking and enhanced framework for cyber threat analysis
US20240414149A1 (en)*2023-06-062024-12-12Capital One Services, LlcComputer-based systems configured to automatically generate communication scripts on a computing device and methods of use thereof
US12341768B2 (en)*2023-06-062025-06-24Capital One Services, LlcComputer-based systems configured to automatically generate communication scripts on a computing device and methods of use thereof
US20240422007A1 (en)*2023-06-142024-12-19Sophos LimitedMonitoring Process Data Acquisition and Exfiltration
US12445294B2 (en)*2023-06-142025-10-14Sophos LimitedMonitoring process data acquisition and exfiltration

Also Published As

Publication numberPublication date
US11997113B2 (en)2024-05-28
JP2025111620A (en)2025-07-30
EP4111370A2 (en)2023-01-04
US20240314142A1 (en)2024-09-19
WO2021171093A1 (en)2021-09-02
JP7673082B2 (en)2025-05-08
US20210273959A1 (en)2021-09-02
JP2023524619A (en)2023-06-13
EP4111665A1 (en)2023-01-04
US20210273949A1 (en)2021-09-02
US11936667B2 (en)2024-03-19
US20240259405A1 (en)2024-08-01
WO2021171092A3 (en)2021-10-07
US20210273957A1 (en)2021-09-02
WO2021171092A2 (en)2021-09-02

Similar Documents

PublicationPublication DateTitle
US20210273961A1 (en)Apparatus and method for a cyber-threat defense system
JP7607720B2 (en) Cyber threat defense system that uses machine learning models to protect email networks
US12069073B2 (en)Cyber threat defense system and method
US20210360027A1 (en)Cyber Security for Instant Messaging Across Platforms
US20230012220A1 (en)Method for determining likely malicious behavior based on abnormal behavior pattern comparison
US20240414211A1 (en)Cybersecurity components communicating and cooperating with one or more large language models
US20210273973A1 (en)SOFTWARE AS A SERVICE (SaaS) USER INTERFACE (UI) FOR DISPLAYING USER ACTIVITIES IN AN ARTIFICIAL INTELLIGENCE (AI)-BASED CYBER THREAT DEFENSE SYSTEM

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:DARKTRACE HOLDINGS LIMITED, UNITED KINGDOM

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HUMPHREY, DICKON MURRAY;BAZALGETTE, TIMOTHY OWEN;SIGNING DATES FROM 20210416 TO 20210509;REEL/FRAME:058010/0920

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:ADVISORY ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

ASAssignment

Owner name:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:DARKTRACE HOLDINGS LIMITED;REEL/FRAME:070762/0592

Effective date:20250404

Owner name:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:DARKTRACE HOLDINGS LIMITED;REEL/FRAME:070762/0576

Effective date:20250404

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION


[8]ページ先頭

©2009-2025 Movatter.jp