Enterprise security operation center (SOC) Bot

A safe and enterprise technology, applied in the field of network security, can solve problems such as missed attacks, and achieve the effect of reducing labor intensity

Inactive Publication Date: 2017-06-13
浙江航芯智控科技有限公司
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This may miss som

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise security operation center (SOC) Bot

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0058] An enterprise security operation center Bot, including data collection, data identification, data processing, data integration, machine learning, marking and alarming, command execution, etc. Flagging, security threat alerts, and security protection and repair functions. Provide analysis clues for SOC security analysts and perform tasks assigned by security analysts.

[0059] The data collection section is capable of collecting various security event data from across the enterprise, and these data sources include the following:

[0060] · Preventive security technology data, such as AD logs, firewalls, IDS / IPS, DHCP, VPN, Windows event logs, DLP logs, endpoint protection logs, file sharing and synchronization logs, such as BOX or Dropbox, http traffic logs.

[0061] · Threat intelligence;

[0062] · Manual reports, emails, voicemails, text messages;

[0063] Physical security data, such as mark collection data at the entrance of the company or key places, such as fin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security operation center (SOC) Bot for assisting an SOC analyst in detecting, surveying and recovering various events in enterprise network security. The SOC Bot comprises the parts of data collection, data identification, data processing, data integration, machine learning, marking and alarming, command execution and the like, and the parts cooperate to finish the functions of enterprise security clue collection, security event monitoring and marking, security threat alarming, and security protection and recovery, provide analysis clues for the SOC security analyst, and execute tasks issued by the security analyst. Through the Bot, the labor intensity of the analyst can be relieved greatly, and the efficiency and automation and intelligence levels of enterprise security detection and maintenance work are increased and raised greatly.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a Bot of an enterprise security operation center. Background technique [0002] With the popularization and application of computer networks, especially the Internet, the network has become an important infrastructure on which people's production and life depend. At the same time, the importance of network security has become increasingly prominent. Nowadays, network security has become the key to determining whether the scope of network applications can be greatly expanded and the value of network applications can be maximized. [0003] Cybersecurity incidents, especially data breaches, can have significant financial and reputational impacts on businesses. In 2015, IBM and the Ponemon Research Institute conducted research on the losses caused by data breaches to 62 companies. The results showed that the average loss caused by data breaches to 62 companies w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0631H04L63/1433H04L63/145H04L63/1466H04L63/1483H04L63/302
Inventor 冯望烟吴淑宁张立钢
Owner 浙江航芯智控科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products