Advanced cybersecurity threat mitigation using behavioral and deep analytics

An advanced, network technology, applied in the field of network security and threat analysis, computer management, can solve the problems of inability to form predictive analysis data transformation, and the role of the network security field is small

Inactive Publication Date: 2020-06-19
QOMPLX INC
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Currently, none of these solutions address single feature aspects of more than the entire task, cannot form predictive analytics data transformations, a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Advanced cybersecurity threat mitigation using behavioral and deep analytics
  • Advanced cybersecurity threat mitigation using behavioral and deep analytics
  • Advanced cybersecurity threat mitigation using behavioral and deep analytics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The inventors have envisioned and put into practice an advanced network security threat mitigation using behavioral and deep analytics.

[0032] One or more different feature aspects may be described in this application. Further, several alternative arrangements may be described for one or more of the feature aspects described herein; it should be understood that these are presented for illustrative purposes only and are not limiting in any way to the feature aspects contained herein or in terms of The claims shown here. One or more of the arrangements may apply broadly to several feature aspects, as is readily apparent from the description. Generally, arrangements are described in sufficient detail to enable one skilled in the art to practice one or more of the features, and it is understood that other arrangements may be utilized and structural, logical, software, electrical, and other changes may be made without departing from the specific features. range of aspect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system for mitigation of cyberattacks employing an advanced cyber decision platform comprising a time series data store, a directed computational graph module, an action outcome simulation module, and observation and state estimation module, wherein the state of a network is monitored and used to produce a cyber-physical graph representing network resources, simulated network events are producedand monitored, and the network events and their effects are analyzed to produce security recommendations.

Description

[0001] Cross-references associated with the application [0002] This application is a PCT application of U.S. Patent Application Serial No. 15 / 655,113, filed July 20, 2017, entitled "ADVANCED CYBERSECURITY THREAT MITIGATION USING BEHAVIORAL AND DEEPANALYTICS" and claims its Priority, the entire specification of which is hereby incorporated by reference in its entirety. technical field [0003] This disclosure relates to the field of computer management, and more particularly to the fields of network security and threat analysis. Background technique [0004] Over the past decade, the frequency and sophistication of cyberattacks (i.e., unauthorized access and modification) on information technology assets of multiple corporations and U.S. government departments and activities have increased significantly, and the discovery and use of IT infrastructure vulnerabilities Continue to accelerate. The speed of network break-ins arguably has now reached the point where reliance on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/50
CPCG06F21/552G06F21/577G06N20/00H04L63/1433
Inventor 杰森·克拉布特里安德鲁·赛勒斯
Owner QOMPLX INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products