Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anticipatory cyber defense

A network and identification technology used in the field of anticipating and addressing network security threats

Active Publication Date: 2019-07-19
THE BOEING CO
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Initial incident reports may contain unverified and very sparse information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anticipatory cyber defense
  • Anticipatory cyber defense
  • Anticipatory cyber defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0085] Clause 1: A computer-implemented method of proactive cyber defense of a plurality of networked assets, the method comprising the steps of: receiving a plurality of cyber incident reports; extracting keywords from the plurality of cyber incident reports; and applying shallow machine learning techniques to the identification of the plurality of networked assets to obtain an identification of a first subset of networked assets susceptible to at least a first threat scenario and an identification of the first threat scenario; applying deep machine learning techniques to the identification of a first subset of networked assets affected by a threat scenario, the identification of the first threat scenario, the keyword, and the identification of the plurality of networked assets vulnerable to at least a second threat scenario identification of a second subset of networked assets affected and identification of a second threat scenario; simulating the plurality of networked asset...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to anticipatory cyber defense. According to various embodiments, techniques for anticipatory cyber defense are disclosed. The techniques includes receiving cyber incident reports, extracting keywords from the reports, applying a shallow machine learning technique to obtain an identification of a first subset of the networked assets vulnerable to at least a first threat scenario and an identification of the first threat scenario, applying a deep machine learning technique to at least the first subset, the first threat scenario, the keywords, and the plurality of networkedassets, to obtain a second subset of the networked assets vulnerable to at least a second threat scenario and the second threat scenario, simulating the networked assets and the second threat scenarioto identify at least one path through the networked assets vulnerable to at least a third threat scenario, and outputting an identification of the at least one path and an identification of the thirdthreat scenario.

Description

technical field [0001] The present disclosure generally relates to anticipating and addressing cybersecurity threats. Background technique [0002] The field of cybersecurity threats and intrusion detection and remediation is growing exponentially, advanced persistent threats lie in the energy, creativity and resources of the world of government, industry, criminal and idle cyber attackers. Traditional defenses that rely on detection, analysis, and reaction fall short in the onslaught of threats encountered every day. The non-criminal world moves slowly, relying on debate, consensus, and jurisprudence to restore confidence and trust in our institutions. Such pace is excruciatingly slow compared to the hypersonic speed of an unhindered and unfettered attacker of our information systems. [0003] Today, victims of cyberattacks are typically reported within 14 to 30 days of discovery of the attack (i.e., after root cause analysis). While timelines for submitting initial inci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1466H04L63/1408H04L63/20G06F21/55G06F21/577H04L63/14G06F2221/034G06N20/20H04L63/1433H04L63/1425H04L63/18G06N20/00
Inventor J·A·克雷格J·米德J·E·瓦萨卡
Owner THE BOEING CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products