Cybersecurity system

A network security system, network technology, applied in transmission systems, instruments, error detection/correction, etc., can solve the problem of real-time data not being used effectively

Active Publication Date: 2016-11-30
IRONNET CYBERSECURITY INC
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, real-time data, if available, is not effectively utilized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cybersecurity system
  • Cybersecurity system
  • Cybersecurity system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In the following description, numerous specific details are set forth regarding systems and methods of the disclosed subject matter, the environments in which such systems and methods may operate, etc., in order to provide a thorough understanding of the disclosed subject matter. However, it will be apparent to those skilled in the art that the disclosed subject matter may be practiced without such specific details and certain features that are well known in the art have not been described in detail to avoid the disclosed Unnecessary complexity of the subject. Furthermore, it is to be understood that the embodiments provided below are exemplary and that other systems and methods are contemplated that are within the scope of the disclosed subject matter.

[0054] Some embodiments of the present disclosure relate to creating a network security framework. The cybersecurity framework performs detection and mitigation actions across the distributed enterprise in near real-t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A cybersecurity system for processing events to produce scores, alerts, and mitigation actions is provided. The system includes sensors for receiving and processing data to form events, distributed analytic platform for processing events to form analytic workflows, and scoring engines for processing events using analytic workflows to produce scoring engine messages. The system also includes real time analytic engine for processing scoring engine messages and distributed analytic platform messages by using the analytic workflows and analytic workflow and event processing rules to form and transmit a threat intelligence message. Threat intelligence messages include broadcast messages, mitigation messages, and model update messages. The system also includes logical segments which associate an analytic model, a set of analytic models, or an analytic workflow; one or more sources of inputs about activity within the logical segment, and a set of actions for mitigating an impact of the anomalous activity occurring within the logical segment.

Description

[0001] Cross References to Related Applications [0002] This application claims priority under 35 U.S.C. 119(e) to U.S. Provisional Application No. 62 / 066769, filed October 21, 2014, entitled "Cybersecurity System," the entire contents of which are hereby incorporated by reference. Background technique [0003] Traditionally, network security systems have been limited in their ability to account for device differences in large networks and perform real-time processing. In a large network, there will be many devices and they will behave very differently. The traditional approach is to develop a single behavioral model for the network or for each type of device in the network (workstations, servers, switches, routers, etc. in the network). The problem with this approach is that this type of approach does not capture differences between individual devices. Another limitation of traditional cybersecurity systems is that traditional behavioral models are built manually after suf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/00
CPCH04L63/1425H04L63/1416H04L63/1441
Inventor R·L·格罗斯曼J·E·希斯R·D·理查森K·B·亚历山大
Owner IRONNET CYBERSECURITY INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products