Movatterモバイル変換


[0]ホーム

URL:


US20220368707A1 - System and Method for Cyber Security Threat Detection - Google Patents

System and Method for Cyber Security Threat Detection
Download PDF

Info

Publication number
US20220368707A1
US20220368707A1US17/868,602US202217868602AUS2022368707A1US 20220368707 A1US20220368707 A1US 20220368707A1US 202217868602 AUS202217868602 AUS 202217868602AUS 2022368707 A1US2022368707 A1US 2022368707A1
Authority
US
United States
Prior art keywords
behavioral activity
probability
risk level
activity
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/868,602
Inventor
Jeffrey Paine
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Responsight Pty Ltd
Original Assignee
Responsight Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Responsight Pty LtdfiledCriticalResponsight Pty Ltd
Priority to US17/868,602priorityCriticalpatent/US20220368707A1/en
Assigned to ResponSight Pty LtdreassignmentResponSight Pty LtdASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PAINE, Jeffrey
Publication of US20220368707A1publicationCriticalpatent/US20220368707A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system includes one or more collector engines. Each of the collector engines includes a service and an agent operating on a corresponding system endpoint of the system endpoints. The service is configured to take a first snapshot of the corresponding system endpoint. The first snapshot includes event activity information associated with the system endpoint. The agent is configured to take a second snapshot of the corresponding system endpoint. The second snapshot includes behavioral activity information associated with the corresponding system endpoint. The system further includes an aggregator engine configured to aggregate the first snapshot and the second snapshot from each of the system endpoints into an aggregated snapshot. The system further includes one or more analytics engines configured to: generate and store baseline profiles associated with the system endpoints based on a previously received aggregated snapshot, receive the aggregated snapshot from the aggregator engine, determine deviation values for each of the system endpoints based on the received aggregated snapshot and the stored baseline profiles, and generate, for each of the system endpoints, a cumulative risk value based on the deviation values. The system further includes one or more alerting engines configured to determine whether to issue one or more alerts indicating one or more security threats have occurred for each of the endpoints in response to the cumulative risk value.

Description

Claims (18)

What is claimed is:
1. A cyber security threat detection system for a networked computing environment, the system comprising:
a plurality of network enabled hardware end points communicably linked to the networked computing environment enabled for user access;
a collector engine comprising at least a collector service and an agent installed on the network enabled hardware end points, configured to acquire user behavioral activity information at the end point;
an aggregator in the networked computing environment configured receive user behavioral activity information from the end points and to aggregate the received behavioral activity information and send it to a cloud service having a processing capability and storage in at least a cloud based processing system, for storage of the behavioral activity information and for processing the behavioral activity information;
wherein the cloud service processing capability further comprise:
a prediction engine operating on the acquired behavioral activity information, configured to predict expected behavioral activity based on historic behavioral activity from the recorded behavioral activity information, to compare new behavioral activity with the expected behavioral activity, and to determine a probability of occurrence of the new behavioral activity based on the comparison;
an analytics engine configured to generate a security risk level based on the probability of occurrence of the new behavioral activity; and
the cloud service further configured to transfer the generated security risk level to the company security dashboard in the networked computing environment.
2. The cyber security threat detection system ofclaim 1, wherein the security risk level based on probability of occurrence of the new behavioral activity decreases if the new behavioral activity substantially behaves in accordance with the expected behavioral activity; and
security risk level based on probability of occurrence of the new behavioral activity increases if the new behavioral activity substantially diverges from the expected behavioral activity, thereby indicating a possible security breach.
3. The cyber security threat detection system ofclaim 1, wherein a lower probability of occurrence of the new behavioral activity indicates a greater security risk level, and vice versa.
4. The cyber security threat detection system ofclaim 1, wherein the probability of occurrence of the new behavioral activity is combined with additional metrics to derive an overall security risk level.
5. The cyber security threat detection system ofclaim 1, wherein the probability of occurrence of the new behavioral activity is combined with additional metrics to derive an overall security risk level.
6. The cyber security threat detection system ofclaim 1, wherein the security risk level increases in response to a determination that an expected activity with the high probability of occurrence is absent from the new behavioral activity.
7. The cyber security threat detection system ofclaim 6, wherein the absent activity includes an absence of an expected metric.
8. The cyber security threat detection system ofclaim 7, wherein the absence of an expected metric increases a probability of abnormal behavior and a weighted risk level associated the metric.
9. A cyber security threat detection system for a networked computing environment, the system comprising:
a plurality of network enabled hardware end points communicably linked to the networked computing environment, from within and outside the computing environment, enabled for user access;
a collector engine comprising at least a collector service and an agent installed on the network enabled hardware end points, configured to acquire user behavioral activity information at the end point;
an aggregator in the networked computing environment configured receive user behavioral activity information from the end points within the networked computing environment and to aggregate the received behavioral activity information and send it to a cloud service; and the network enabled hardware end points outside the computing environments configured to provide the collected behavioral activity information to the cloud service over the network;
wherein the cloud service is configured with a processing capability and storage in at least a cloud based processing system for storage of the behavioral activity information and for processing the behavioral activity information;
wherein the cloud service processing capability further comprise:
a prediction engine operating on the acquired behavioral activity information, configured to predict expected behavioral activity based on historic behavioral activity from the recorded behavioral activity information, to compare new behavioral activity with the expected behavioral activity, and to determine a probability of occurrence of the new behavioral activity based on the comparison;
an analytics engine configured to generate a security risk level based on the probability of occurrence of the new behavioral activity; and
the cloud service further configured to transfer the generated security risk level to the company security dashboard in the networked computing environment.
10. The cyber security threat detection system ofclaim 9, wherein the security risk level based on probability of occurrence of the new behavioral activity decreases if the new behavioral activity substantially behaves in accordance with the expected behavioral activity; and
security risk level based on probability of occurrence of the new behavioral activity increases if the new behavioral activity substantially diverges from the expected behavioral activity, thereby indicating a possible security breach.
11. The cyber security threat detection system ofclaim 9, wherein a lower probability of occurrence of the new behavioral activity indicates a greater security risk level, and vice versa.
12. The cyber security threat detection system ofclaim 9, wherein the probability of occurrence of the new behavioral activity is combined with additional metrics to derive an overall security risk level.
13. The cyber security threat detection system ofclaim 9, wherein the security risk level increases in response to a determination that an expected activity is absent from the new behavioral activity.
14. The cyber security threat detection system ofclaim 9, wherein the absent activity is either a behavioral activity or a matric that is the behavior, or the metric expected at the network enabled hardware end points.
15. A computer-implemented method for cyber security threat detection, the method implemented by one or more processors operating within a computing environment and a plurality of processors in the cloud service, the method comprising:
receiving behavioral activity information, collected by a collector service and a collector agent on hardware endpoints, that has been acquired over a period of time and aggregated;
operating on the received behavioral activity information by a processor, associated with a prediction engine in a cloud service, to predict expected behavioral activity based on historic behavioral activity from the received and stored behavioral activity information; and
determining by a processor associated with an analytic engine in the cloud service, a risk level from a probability of occurrence of new abnormal behavioral activity based on a comparison of the new behavioral activity with the expected behavioral activity.
16. The method ofclaim 15, wherein the method further comprise:
saving the received behavioral activity information, collected by a collector service and a collector agent on hardware endpoints, that has been acquired over a period of time in a memory as historic data in the cloud service.
17. The method ofclaim 15, wherein the determination by the risk level by the processor associated with the analytic engine in the cloud service further considering an absence of an expected metric as increasing a probability of occurrence of the abnormal behavioral activity.
18. The method ofclaim 15, further comprising generating and transmitting the generated security risk level to the company security operations dashboard in the networked computing environment.
US17/868,6022017-03-022022-07-19System and Method for Cyber Security Threat DetectionAbandonedUS20220368707A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/868,602US20220368707A1 (en)2017-03-022022-07-19System and Method for Cyber Security Threat Detection

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201762466279P2017-03-022017-03-02
US15/699,777US10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection
US16/926,507US20200412747A1 (en)2017-03-022020-07-10System and Method for Cyber Security Threat Detection
US17/868,602US20220368707A1 (en)2017-03-022022-07-19System and Method for Cyber Security Threat Detection

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/926,507ContinuationUS20200412747A1 (en)2017-03-022020-07-10System and Method for Cyber Security Threat Detection

Publications (1)

Publication NumberPublication Date
US20220368707A1true US20220368707A1 (en)2022-11-17

Family

ID=63355377

Family Applications (8)

Application NumberTitlePriority DateFiling Date
US15/699,777Active2038-04-19US10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection
US15/699,765AbandonedUS20180255076A1 (en)2017-03-022017-09-08System and Method for Cyber Security Threat Detection
US15/811,385Active2038-03-11US10701089B2 (en)2017-03-022017-11-13System and method for cyber security threat detection
US15/905,686AbandonedUS20180255080A1 (en)2017-03-022018-02-26System and Method for Cyber Security Threat Detection
US16/909,627AbandonedUS20200329058A1 (en)2017-03-022020-06-23System and Method for Cyber Security Threat Detection
US16/926,507AbandonedUS20200412747A1 (en)2017-03-022020-07-10System and Method for Cyber Security Threat Detection
US17/859,868AbandonedUS20220353282A1 (en)2017-03-022022-07-07System and Method for Cyber Security Threat Detection
US17/868,602AbandonedUS20220368707A1 (en)2017-03-022022-07-19System and Method for Cyber Security Threat Detection

Family Applications Before (7)

Application NumberTitlePriority DateFiling Date
US15/699,777Active2038-04-19US10728261B2 (en)2017-03-022017-09-08System and method for cyber security threat detection
US15/699,765AbandonedUS20180255076A1 (en)2017-03-022017-09-08System and Method for Cyber Security Threat Detection
US15/811,385Active2038-03-11US10701089B2 (en)2017-03-022017-11-13System and method for cyber security threat detection
US15/905,686AbandonedUS20180255080A1 (en)2017-03-022018-02-26System and Method for Cyber Security Threat Detection
US16/909,627AbandonedUS20200329058A1 (en)2017-03-022020-06-23System and Method for Cyber Security Threat Detection
US16/926,507AbandonedUS20200412747A1 (en)2017-03-022020-07-10System and Method for Cyber Security Threat Detection
US17/859,868AbandonedUS20220353282A1 (en)2017-03-022022-07-07System and Method for Cyber Security Threat Detection

Country Status (2)

CountryLink
US (8)US10728261B2 (en)
WO (1)WO2018158643A1 (en)

Families Citing this family (117)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10902114B1 (en)*2015-09-092021-01-26ThreatQuotient, Inc.Automated cybersecurity threat detection with aggregation and analysis
US10931685B2 (en)*2016-12-122021-02-23Ut-Battelle, LlcMalware analysis and recovery
US10594576B2 (en)2017-01-312020-03-17Splunk Inc.Visualizing network activity involving networked computing devices distributed across network address spaces
DE212017000015U1 (en)*2017-03-032018-02-27Google Llc Systems for detecting inadvertent implementation of presentation of content items by applications running on client devices
US10943019B2 (en)2017-05-152021-03-09Forcepoint, LLCAdaptive trust profile endpoint
US10623431B2 (en)2017-05-152020-04-14Forcepoint LlcDiscerning psychological state from correlated user behavior and contextual information
US10129269B1 (en)2017-05-152018-11-13Forcepoint, LLCManaging blockchain access to user profile information
US10999296B2 (en)2017-05-152021-05-04Forcepoint, LLCGenerating adaptive trust profiles using information derived from similarly situated organizations
US9882918B1 (en)2017-05-152018-01-30Forcepoint, LLCUser behavior profile in a blockchain
US10447718B2 (en)2017-05-152019-10-15Forcepoint LlcUser profile definition and management
US10999297B2 (en)2017-05-152021-05-04Forcepoint, LLCUsing expected behavior of an entity when prepopulating an adaptive trust profile
US10917423B2 (en)2017-05-152021-02-09Forcepoint, LLCIntelligently differentiating between different types of states and attributes when using an adaptive trust profile
US10862927B2 (en)2017-05-152020-12-08Forcepoint, LLCDividing events into sessions during adaptive trust profile operations
JP6834768B2 (en)*2017-05-172021-02-24富士通株式会社 Attack detection method, attack detection program and relay device
US10540496B2 (en)*2017-09-292020-01-21International Business Machines CorporationDynamic re-composition of patch groups using stream clustering
US10757123B2 (en)*2018-01-252020-08-25Bank Of America CorporationDynamic record identification and analysis computer system with event monitoring components
US11522887B2 (en)*2018-02-202022-12-06Darktrace Holdings LimitedArtificial intelligence controller orchestrating network components for a cyber threat defense
US11962552B2 (en)2018-02-202024-04-16Darktrace Holdings LimitedEndpoint agent extension of a machine learning cyber defense system for email
US10922409B2 (en)*2018-04-102021-02-16Microsoft Technology Licensing, LlcDeep reinforcement learning technologies for detecting malware
US11347861B2 (en)2018-04-102022-05-31Raytheon CompanyControlling security state of commercial off the shelf (COTS) system
US11438357B2 (en)2018-06-222022-09-06Senseon Tech LtdEndpoint network sensor and related cybersecurity infrastructure
GB201810294D0 (en)2018-06-222018-08-08Senseon Tech LtdCybe defence system
GB2602254B (en)2020-12-152023-04-05Senseon Tech LtdNetwork traffic monitoring
WO2020006562A1 (en)*2018-06-292020-01-02Rocus Group, LlcIntegrated security and threat prevention and detection device
GB201812171D0 (en)2018-07-262018-09-12Senseon Tech LtdCyber defence system
US11423150B2 (en)2018-09-072022-08-23Raytheon CompanySystem and method for booting processors with encrypted boot image
US11178159B2 (en)*2018-09-072021-11-16Raytheon CompanyCross-domain solution using network-connected hardware root-of-trust device
US11916953B2 (en)*2018-09-242024-02-27Cybereason, Inc.Method and mechanism for detection of pass-the-hash attacks
US11868479B2 (en)*2018-11-022024-01-09Arizona Board Of Regents On Behalf Of The University Of ArizonaRuntime adaptive risk assessment and automated mitigation
US10630718B2 (en)*2018-11-272020-04-21BehavioSec IncDetection of remote fraudulent activity in a client-server-system
US11159555B2 (en)2018-12-032021-10-26Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11184385B2 (en)2018-12-032021-11-23Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11283825B2 (en)2018-12-032022-03-22Accenture Global Solutions LimitedLeveraging attack graphs of agile security platform
US11281806B2 (en)2018-12-032022-03-22Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11277432B2 (en)*2018-12-032022-03-15Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11048811B2 (en)*2018-12-192021-06-29Jpmorgan Chase Bank, N. A.Methods for big data usage monitoring, entitlements and exception analysis
CN111381567B (en)*2018-12-272021-11-05北京安控科技股份有限公司Safety detection system and method for industrial control system
US11431735B2 (en)2019-01-282022-08-30Orca Security LTD.Techniques for securing virtual machines
US11190488B1 (en)*2019-03-072021-11-30NortonLifeLock Inc.Adaptive security filtering on a client device
US11481486B2 (en)*2019-03-272022-10-25Webroot Inc.Behavioral threat detection engine
US11080391B2 (en)2019-03-272021-08-03Webroot Inc.Behavioral threat detection definition and compilation
US11080394B2 (en)2019-03-272021-08-03Webroot Inc.Behavioral threat detection virtual machine
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
US11363036B2 (en)*2019-03-282022-06-14Microsoft Technology Licensing, LlcDetecting a missing security alert using a machine learning model
WO2020205497A1 (en)2019-04-012020-10-08Raytheon CompanyRoot of trust assisted access control of secure encrypted drives
EP3948608B1 (en)2019-04-012023-04-26Raytheon CompanyAdaptive, multi-layer enterprise data protection & resiliency platform
US10853496B2 (en)2019-04-262020-12-01Forcepoint, LLCAdaptive trust profile behavioral fingerprint
US11245702B2 (en)2019-05-082022-02-08Red Hat, Inc.Security vulnerability assessment for users of a cloud computing environment
US11204994B2 (en)*2019-05-092021-12-21International Business Machines CorporationInjection attack identification and mitigation
US10440011B1 (en)*2019-05-292019-10-08Capital One Services, LlcPassword protection in a computing environment
US11695795B2 (en)2019-07-122023-07-04Accenture Global Solutions LimitedEvaluating effectiveness of security controls in enterprise networks using graph values
RU2750629C2 (en)*2019-07-172021-06-30Акционерное общество "Лаборатория Касперского"System and method for detecting anomalies in a technological system
US10986023B2 (en)*2019-07-192021-04-20Cisco Technology, Inc.Using machine learning to detect slow drain conditions in a storage area network
US11483326B2 (en)*2019-08-302022-10-25Palo Alto Networks, Inc.Context informed abnormal endpoint behavior detection
US10673886B1 (en)*2019-09-262020-06-02Packetsled, Inc.Assigning and representing security risks on a computer network
GB201915265D0 (en)2019-10-222019-12-04Senseon Tech LtdAnomaly detection
CN110912906B (en)*2019-11-282021-12-21南方电网科学研究院有限责任公司Edge calculation malicious node identification method
US11379588B2 (en)2019-12-202022-07-05Raytheon CompanySystem validation by hardware root of trust (HRoT) device and system management mode (SMM)
US11470114B2 (en)*2019-12-272022-10-11Paypal, Inc.Malware and phishing detection and mediation platform
US12021894B2 (en)2019-12-272024-06-25Paypal, Inc.Phishing detection based on modeling of web page content
US11671448B2 (en)2019-12-272023-06-06Paypal, Inc.Phishing detection using uniform resource locators
US11477228B2 (en)*2020-01-032022-10-18Saudi Arabian Oil CompanyMethod and system for blockchain accreditation mechanism based on cybersecurity risk
US11601461B2 (en)*2020-01-132023-03-07Vmware, Inc.Risk-based cloud profile management for VDI in the cloud
RU2722693C1 (en)*2020-01-272020-06-03Общество с ограниченной ответственностью «Группа АйБи ТДС»Method and system for detecting the infrastructure of a malicious software or a cybercriminal
US11379459B1 (en)*2020-01-312022-07-05Snowflake Inc.Alerts based on historical event-occurrence data
US10846702B1 (en)2020-02-052020-11-24Capital One Services, LlcSystem and method for modifying payment processing times upon suspicion of fraud
US12216791B2 (en)2020-02-242025-02-04Forcepoint LlcRe-identifying pseudonymized or de-identified data utilizing distributed ledger technology
EP3872665A1 (en)2020-02-282021-09-01Accenture Global Solutions LimitedCyber digital twin simulator for security controls requirements
US11444980B2 (en)2020-04-152022-09-13T-Mobile Usa, Inc.On-demand wireless device centric security for a 5G wireless network
US11824881B2 (en)2020-04-152023-11-21T-Mobile Usa, Inc.On-demand security layer for a 5G wireless network
US11799878B2 (en)2020-04-152023-10-24T-Mobile Usa, Inc.On-demand software-defined security service orchestration for a 5G wireless network
US11070982B1 (en)2020-04-152021-07-20T-Mobile Usa, Inc.Self-cleaning function for a network access node of a network
US11115824B1 (en)2020-05-142021-09-07T-Mobile Usa, Inc.5G cybersecurity protection system
US11057774B1 (en)2020-05-142021-07-06T-Mobile Usa, Inc.Intelligent GNODEB cybersecurity protection system
US11206542B2 (en)2020-05-142021-12-21T-Mobile Usa, Inc.5G cybersecurity protection system using personalized signatures
US11876824B2 (en)2020-06-252024-01-16Accenture Global Solutions LimitedExtracting process aware analytical attack graphs through logical network analysis
US11483213B2 (en)2020-07-092022-10-25Accenture Global Solutions LimitedEnterprise process discovery through network traffic patterns
US11411976B2 (en)2020-07-092022-08-09Accenture Global Solutions LimitedResource-efficient generation of analytical attack graphs
US12278729B2 (en)*2020-07-242025-04-15Skyhigh Security LlcSystems, methods, and media for monitoring cloud configuration settings
WO2022027572A1 (en)*2020-08-072022-02-10Nokia Shanghai Bell Co., Ltd.Security management service in management plane
US11722510B2 (en)2020-08-102023-08-08Bank Of America CorporationMonitoring and preventing remote user automated cyber attacks
US12034756B2 (en)2020-08-282024-07-09Accenture Global Solutions LimitedAnalytical attack graph differencing
US11144862B1 (en)2020-09-022021-10-12Bank Of America CorporationApplication mapping and alerting based on data dependencies
CN112181781B (en)*2020-10-152022-09-20新华三信息安全技术有限公司Host security threat degree warning method, device, equipment and storage medium
US11831675B2 (en)2020-10-262023-11-28Accenture Global Solutions LimitedProcess risk calculation based on hardness of attack paths
US11973790B2 (en)2020-11-102024-04-30Accenture Global Solutions LimitedCyber digital twin simulator for automotive security assessment based on attack graphs
US20220159029A1 (en)*2020-11-132022-05-19Cyberark Software Ltd.Detection of security risks based on secretless connection data
EP4047870B1 (en)2021-02-182024-11-13Accenture Global Solutions LimitedAutomated prioritization of process-aware cyber risk mitigation
US11870788B2 (en)*2021-04-282024-01-09Accenture Global Solutions LimitedUtilizing a machine learning model to determine real-time security intelligence based on operational technology data and information technology data
NL2030861B1 (en)2021-06-012023-03-14Trust LtdSystem and method for external monitoring a cyberattack surface
RU2769075C1 (en)2021-06-102022-03-28Общество с ограниченной ответственностью "Группа АйБи ТДС"System and method for active detection of malicious network resources
US11880250B2 (en)2021-07-212024-01-23Accenture Global Solutions LimitedOptimizing energy consumption of production lines using intelligent digital twins
CN113691498B (en)*2021-07-232023-03-14全球能源互联网研究院有限公司Electric power internet of things terminal safety state evaluation method and device and storage medium
US11895150B2 (en)2021-07-282024-02-06Accenture Global Solutions LimitedDiscovering cyber-attack process model based on analytical attack graphs
US12032683B2 (en)2021-07-292024-07-09Micro Focus LlcAbnormality detection in log entry collection
US12231461B2 (en)2021-08-122025-02-18Accenture Global Solutions LimitedPrioritizing security controls using a cyber digital twin simulator
US12355798B2 (en)2021-08-252025-07-08Accenture Global Solutions LimitedAutomated prioritization of cyber risk mitigation by simulating exploits
US12034751B2 (en)*2021-10-012024-07-09Secureworks Corp.Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
JP7685929B2 (en)*2021-10-192025-05-30株式会社日立製作所 Attack scenario analysis device and attack scenario analysis method
US12010152B2 (en)2021-12-082024-06-11Bank Of America CorporationInformation security systems and methods for cyber threat event prediction and mitigation
US11949696B2 (en)2021-12-172024-04-02Bank Of America CorporationData security system with dynamic intervention response
US12118560B2 (en)2022-02-152024-10-15Paypal, Inc.Pointer movement modelling for entity classification
US12432244B2 (en)*2022-03-242025-09-30At&T Intellectual Property I, L.P.Home gateway monitoring for vulnerable home internet of things devices
US12289336B2 (en)2022-04-082025-04-29Accenture Global Solutions LimitedOntology-based risk propagation over digital twins
US12255885B2 (en)*2022-05-312025-03-18Acronis International GmbhUser in group behavior signature monitor
US12348552B2 (en)2022-06-152025-07-01Accenture Global Solutions LimitedAutomated prediction of cyber-security attack techniques using knowledge mesh
KR102586870B1 (en)*2022-07-222023-10-11(주)아스트론시큐리티AI-based security risk prediction system and method for protection target in cloud environment
US20240070268A1 (en)*2022-08-232024-02-29Bitdefender IPR Management Ltd.Aggregate Event Profiles for Detecting Malicious Mobile Applications
US12294600B2 (en)*2022-08-302025-05-06International Business Machines CorporationReal time behavioral alert processing in computing environments
US12143477B2 (en)*2022-09-132024-11-12Capital One Services, LlcSecure cryptographic transfer using multiparty computation
WO2024063714A1 (en)*2022-09-232024-03-28Binalyze Yazilim A.S.Method for measuring security operation center
US12386986B1 (en)*2022-10-122025-08-12Wells Fargo Bank, N.A.Endpoint security synchronization
US12316661B2 (en)2022-10-312025-05-27International Business Machines CorporationAuto-detection of observables and auto-disposition of alerts in an endpoint detection and response (EDR) system using machine learning
US20240411869A1 (en)*2023-06-072024-12-12Bank Of America CorporationCollaborative alert platform using distributed ledger technology
US20240430285A1 (en)*2023-06-212024-12-26Saudi Arabian Oil CompanyMethod and system for integrated cybersecurity operations
US12348539B2 (en)*2023-08-302025-07-01Expel, Inc.Systems, methods, and graphical user interfaces for configuring and executing one or more computer-executable threat hunting protocols in a cybersecurity threat detection and mitigation platform
US20250141929A1 (en)*2023-10-312025-05-01Dell Products L.P.Managing an endpoint detection and response framework using out of band communication channels

Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020082886A1 (en)*2000-09-062002-06-27Stefanos ManganarisMethod and system for detecting unusual events and application thereof in computer intrusion detection
US7373524B2 (en)*2004-02-242008-05-13Covelight Systems, Inc.Methods, systems and computer program products for monitoring user behavior for a server application
US8280833B2 (en)*2008-06-122012-10-02Guardian Analytics, Inc.Fraud detection and analysis
US20140337086A1 (en)*2013-05-092014-11-13Rockwell Authomation Technologies, Inc.Risk assessment for industrial systems using big data
US8984643B1 (en)*2014-02-142015-03-17Risk I/O, Inc.Ordered computer vulnerability remediation reporting
US20160050225A1 (en)*2014-08-132016-02-18Honeywell International Inc.Analyzing cyber-security risks in an industrial control environment
US20160070915A1 (en)*2014-09-102016-03-10Honeywell International Inc.Dynamic quantification of cyber-security risks in a control system
US20160253498A1 (en)*2015-02-272016-09-01Qualcomm IncorporatedMethods and Systems for On-Device High-Granularity Classification of Device Behaviors using Multi-Label Models
US20170006051A1 (en)*2015-06-302017-01-05K4Connect Inc.Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods
US20170220801A1 (en)*2014-08-042017-08-03Darktrace LimitedCyber security
US9825989B1 (en)*2015-09-302017-11-21Fireeye, Inc.Cyber attack early warning system
US9824216B1 (en)*2015-12-312017-11-21Fireeye, Inc.Susceptible environment detection system
US20180077187A1 (en)*2016-09-142018-03-15Carbon Black, Inc.Cybersecurity incident detection systems and techniques
US20190297095A1 (en)*2016-05-202019-09-26Georgia Tech Research CorporationSystems and Methods For Detecting Anomalous Software on a Programmable Logic Controller
US10581874B1 (en)*2015-12-312020-03-03Fireeye, Inc.Malware detection system with contextual analysis

Family Cites Families (72)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6405318B1 (en)1999-03-122002-06-11Psionic Software, Inc.Intrusion detection system
US7124438B2 (en)2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US8046835B2 (en)2002-10-232011-10-25Frederick S. M. HerzDistributed computer network security activity model SDI-SCAM
US20060132302A1 (en)*2003-02-032006-06-22Stilp Louis APower management of transponders and sensors in an RFID security network
US7123142B2 (en)*2003-03-062006-10-17UnitoneIntegrated intercom and security system
US7752671B2 (en)*2004-10-042010-07-06Promisec Ltd.Method and device for questioning a plurality of computerized devices
JP4742144B2 (en)2005-06-062011-08-10インターナショナル・ビジネス・マシーンズ・コーポレーション Method and computer program for identifying a device attempting to penetrate a TCP / IP protocol based network
US20070174910A1 (en)*2005-12-132007-07-26Zachman Frederick JComputer memory security platform
US8230505B1 (en)2006-08-112012-07-24Avaya Inc.Method for cooperative intrusion prevention through collaborative inference
EP2223460A4 (en)*2007-12-202011-12-28Bce IncContact-less tag with signature, and applications thereof
US9231964B2 (en)2009-04-142016-01-05Microsoft CorporationVulnerability detection based on aggregated primitives
EP2299650A1 (en)2009-09-212011-03-23Siemens AktiengesellschaftMethod for recognising anomalies in a control network
US8359652B2 (en)*2009-10-312013-01-22Microsoft CorporationDetecting anomalies in access control lists
US8607339B2 (en)*2009-11-022013-12-10Red Hat, Inc.Systems and methods for improved identification and analysis of threats to a computing system
US8489635B1 (en)*2010-01-132013-07-16Louisiana Tech University Research Foundation, A Division Of Louisiana Tech University Foundation, Inc.Method and system of identifying users based upon free text keystroke patterns
WO2011149558A2 (en)*2010-05-282011-12-01Abelow Daniel HReality alternate
US8621629B2 (en)2010-08-312013-12-31General Electric CompanySystem, method, and computer software code for detecting a computer network intrusion in an infrastructure element of a high value target
US10586036B2 (en)*2010-11-292020-03-10Biocatch Ltd.System, device, and method of recovery and resetting of user authentication factor
US10164985B2 (en)*2010-11-292018-12-25Biocatch Ltd.Device, system, and method of recovery and resetting of user authentication factor
US9690915B2 (en)*2010-11-292017-06-27Biocatch Ltd.Device, method, and system of detecting remote access users and differentiating among users
US8555385B1 (en)*2011-03-142013-10-08Symantec CorporationTechniques for behavior based malware analysis
US8650287B2 (en)*2011-04-272014-02-11Mcafee, Inc.Local reputation to adjust sensitivity of behavioral detection system
US8881289B2 (en)*2011-10-182014-11-04Mcafee, Inc.User behavioral risk assessment
US8739281B2 (en)2011-12-062014-05-27At&T Intellectual Property I, L.P.Multilayered deception for intrusion detection and prevention
US9137258B2 (en)*2012-02-012015-09-15Brightpoint Security, Inc.Techniques for sharing network security event information
US10270739B2 (en)*2012-02-282019-04-23Raytheon Bbn Technologies Corp.System and method for protecting service-level entities
US8904497B2 (en)*2012-08-032014-12-02Honeywell International Inc.Providing an operational dashboard
US8938805B1 (en)2012-09-242015-01-20Emc CorporationDetection of tampering with software installed on a processing device
US9177139B2 (en)2012-12-302015-11-03Honeywell International Inc.Control system cyber security
US8813236B1 (en)2013-01-072014-08-19Narus, Inc.Detecting malicious endpoints using network connectivity and flow information
US20160110551A1 (en)*2013-02-142016-04-21The United States Of America As Represented By The Secretary Of The NavyComputer System Anomaly Detection Using Human Responses to Ambient Representations of Hidden Computing System and Process Metadata
US9275211B2 (en)*2013-03-152016-03-01Telesign CorporationSystem and method for utilizing behavioral characteristics in authentication and fraud prevention
US9620959B2 (en)2013-03-152017-04-11Accenture Global Services LimitedEnhanced grid reliability through predictive analysis and dynamic action for stable power distribution
US9319423B2 (en)*2013-11-042016-04-19At&T Intellectual Property I, L.P.Malware and anomaly detection via activity recognition based on sensor data
US9848036B1 (en)*2013-12-032017-12-19Google Inc.Systems, methods, and media for causing an action to be performed on a user device
US10122747B2 (en)*2013-12-062018-11-06Lookout, Inc.Response generation after distributed monitoring and evaluation of multiple devices
US9350748B1 (en)2013-12-162016-05-24Amazon Technologies, Inc.Countering service enumeration through optimistic response
US9225730B1 (en)*2014-03-192015-12-29Amazon Technologies, Inc.Graph based detection of anomalous activity
US20160078365A1 (en)2014-03-212016-03-17Philippe BaumardAutonomous detection of incongruous behaviors
WO2015168203A1 (en)*2014-04-292015-11-05PEGRight, Inc.Characterizing user behavior via intelligent identity analytics
KR102118159B1 (en)*2014-05-202020-06-03삼성전자주식회사Semiconductor Device and Method of fabricating the same
US9210181B1 (en)*2014-05-262015-12-08Solana Networks Inc.Detection of anomaly in network flow data
US9323930B1 (en)2014-08-192016-04-26Symantec CorporationSystems and methods for reporting security vulnerabilities
US9690928B2 (en)*2014-10-252017-06-27Mcafee, Inc.Computing platform security methods and apparatus
US9690933B1 (en)*2014-12-222017-06-27Fireeye, Inc.Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US9734358B2 (en)*2015-01-022017-08-15High Sec Labs LtdSelf-locking USB protection pug device having LED to securely protect USB jack
CN104601568B (en)*2015-01-132019-05-21深信服科技股份有限公司Virtualization security isolation method and device
US10075474B2 (en)2015-02-062018-09-11Honeywell International Inc.Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
EP3262815B1 (en)2015-02-242020-10-14Cisco Technology, Inc.System and method for securing an enterprise computing environment
US9350750B1 (en)2015-04-032016-05-24Area 1 Security, Inc.Distribution of security rules among sensor computers
US10142353B2 (en)2015-06-052018-11-27Cisco Technology, Inc.System for monitoring and managing datacenters
US9565192B2 (en)*2015-06-232017-02-07Symantec CorporationRouter based securing of internet of things devices on local area networks
CN106470115B (en)*2015-08-202021-01-29斑马智行网络(香港)有限公司Security configuration method, related device and system
US10181038B2 (en)2015-11-172019-01-15Honeywell International Inc.Deployment assurance checks for monitoring industrial control systems
US9607144B1 (en)*2015-11-302017-03-28International Business Machines CorporationUser activity modelling, monitoring, and reporting framework
US20200265357A1 (en)*2015-12-302020-08-20Atul VashisthaSystems and methods to quantify risk associated with suppliers or geographic locations
KR20170082936A (en)2016-01-072017-07-17한국인터넷진흥원System for detecting abnomal behaviors allowing for personalized the whole access period use behavior pattern error rate deviation
CN105511944B (en)*2016-01-072018-09-28上海海事大学A kind of method for detecting abnormality of cloud system internal virtual machine
US10135855B2 (en)2016-01-192018-11-20Honeywell International Inc.Near-real-time export of cyber-security risk information
US10268976B2 (en)*2016-02-172019-04-23SecurityScorecard, Inc.Non-intrusive techniques for discovering and using organizational relationships
US10372904B2 (en)*2016-03-082019-08-06Tanium Inc.Cost prioritized evaluations of indicators of compromise
US20170279826A1 (en)*2016-03-222017-09-28Symantec CorporationProtecting dynamic and short-lived virtual machine instances in cloud environments
US20170295188A1 (en)*2016-04-062017-10-12Karamba SecurityAutomated security policy generation for controllers
US10135847B2 (en)*2016-05-182018-11-20Salesforce.Com, Inc.Reverse shell network intrusion detection
US20180013722A1 (en)*2016-07-062018-01-11Eric EnosDistributed firewall device and system
US10237240B2 (en)*2016-07-212019-03-19AT&T Global Network Services (U.K.) B.V.Assessing risk associated with firewall rules
US10354061B2 (en)*2016-07-252019-07-16Panasonic Avionics CorporationMethods and systems for authenticating a headset for a transportation vehicle
US10262138B2 (en)*2016-09-152019-04-16Paypal, Inc.Techniques for ransomware detection and mitigation
US10671724B2 (en)*2016-09-152020-06-02Paypal, Inc.Techniques for detecting encryption
US10284589B2 (en)*2016-10-312019-05-07Acentium Inc.Methods and systems for ranking, filtering and patching detected vulnerabilities in a networked system
USPP29601P3 (en)2016-10-312018-08-14Suphatchatwong Innovation Co., Ltd.Sansevieria plant named ‘SUPSAN1601’
US10412111B2 (en)*2016-12-302019-09-10eSentire, Inc.System and method for determining network security threats

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020082886A1 (en)*2000-09-062002-06-27Stefanos ManganarisMethod and system for detecting unusual events and application thereof in computer intrusion detection
US7373524B2 (en)*2004-02-242008-05-13Covelight Systems, Inc.Methods, systems and computer program products for monitoring user behavior for a server application
US8280833B2 (en)*2008-06-122012-10-02Guardian Analytics, Inc.Fraud detection and analysis
US20140337086A1 (en)*2013-05-092014-11-13Rockwell Authomation Technologies, Inc.Risk assessment for industrial systems using big data
US8984643B1 (en)*2014-02-142015-03-17Risk I/O, Inc.Ordered computer vulnerability remediation reporting
US20170220801A1 (en)*2014-08-042017-08-03Darktrace LimitedCyber security
US20160050225A1 (en)*2014-08-132016-02-18Honeywell International Inc.Analyzing cyber-security risks in an industrial control environment
US20160070915A1 (en)*2014-09-102016-03-10Honeywell International Inc.Dynamic quantification of cyber-security risks in a control system
US20160253498A1 (en)*2015-02-272016-09-01Qualcomm IncorporatedMethods and Systems for On-Device High-Granularity Classification of Device Behaviors using Multi-Label Models
US20170006051A1 (en)*2015-06-302017-01-05K4Connect Inc.Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods
US9825989B1 (en)*2015-09-302017-11-21Fireeye, Inc.Cyber attack early warning system
US9824216B1 (en)*2015-12-312017-11-21Fireeye, Inc.Susceptible environment detection system
US10581874B1 (en)*2015-12-312020-03-03Fireeye, Inc.Malware detection system with contextual analysis
US20190297095A1 (en)*2016-05-202019-09-26Georgia Tech Research CorporationSystems and Methods For Detecting Anomalous Software on a Programmable Logic Controller
US20180077187A1 (en)*2016-09-142018-03-15Carbon Black, Inc.Cybersecurity incident detection systems and techniques

Also Published As

Publication numberPublication date
US20180255077A1 (en)2018-09-06
US20200412747A1 (en)2020-12-31
US20180255076A1 (en)2018-09-06
US10701089B2 (en)2020-06-30
US20180255080A1 (en)2018-09-06
US20180255079A1 (en)2018-09-06
US20220353282A1 (en)2022-11-03
US10728261B2 (en)2020-07-28
WO2018158643A1 (en)2018-09-07
US20200329058A1 (en)2020-10-15

Similar Documents

PublicationPublication DateTitle
US20220368707A1 (en)System and Method for Cyber Security Threat Detection
US12041067B2 (en)Behavior detection and verification
US11757920B2 (en)User and entity behavioral analysis with network topology enhancements
US10997294B2 (en)Deferred malware scanning
US20220201042A1 (en)Ai-driven defensive penetration test analysis and recommendation system
EP4254868B1 (en)Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management
US11204996B2 (en)Retention and accessibility of data characterizing events on an endpoint computer
Xie et al.pBMDS: a behavior-based malware detection system for cellphone devices
US10893059B1 (en)Verification and enhancement using detection systems located at the network periphery and endpoint devices
US20180359272A1 (en)Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
Nguyen et al.Detecting insider threats by monitoring system call activity
US8683598B1 (en)Mechanism to evaluate the security posture of a computer system
CN113660224B (en)Situation awareness defense method, device and system based on network vulnerability scanning
US20160378994A1 (en)Systems and methods of risk based rules for application control
US20140201843A1 (en)Systems and methods for identifying and reporting application and file vulnerabilities
US12010133B2 (en)Security threat monitoring for network-accessible devices
Yamada et al.RAT-based malicious activities detection on enterprise internal networks
Ah-Fat et al.Effective detection of credential thefts from windows memory: Learning access behaviours to local security authority subsystem service
US20230319050A1 (en)Method, product, and system for generating a software representation that embodies network configuration and policy data of a computer network for use in security management
US20230319068A1 (en)Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management
Kono et al.An unknown malware detection using execution registry access
US12328322B2 (en)Method, product, and system for network security management using software representation that embodies network configuration and policy data
Treaster et al.Detection of privilege escalation for linux cluster security
US20230319100A1 (en)Method, product, and system for analyzing attack paths in computer network generated using a software representation that embodies network configuration and policy data for security management
SundenApplying Elasticsearch for remote attestation data analysis in digital forensics

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp