Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform

a technology of automated investigations and threat mitigation, applied in the field of cybersecurity, can solve the problems of incalculable growth of security risks posed by malicious actors or uneducated insiders, and achieve the effect of reducing the number of malicious actors and inability to fully understand the threat, and reducing the risk of malicious actors

Active Publication Date: 2022-04-14
EXPEL INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This approach enables real-time, intelligent threat detection and mitigation, improving response efficiency and maintaining quality despite increasing security risks, by leveraging automated workflows and machine learning for threat classification and severity assessment.

Problems solved by technology

As many of these organizational entities continue to migrate their computing resources and computing requirements to cloud-based services, the security risks posed by malicious actors or uneducated insiders appear to grow at an incalculable rate because of the complexity of configuring cloud-based services, their ease of access, and the speed at which cloud base services allow users to move.
However, because the volume of security threats may be great, it may present one or more technical challenges in scaling security operations services without resulting in a number of technical inefficiencies that may prevent or slowdown the detection of security threats and efficiently responding to detected security threats.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform
  • Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform
  • Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]The following description of the preferred embodiments of the inventions are not intended to limit the inventions to these preferred embodiments, but rather to enable any person skilled in the art to make and use these inventions.

1. System for Remote Cyber Security Operations & Automated Investigations

[0032]As shown in FIG. 1, a system 100 for implementing remote cybersecurity operations includes a security alert engine 110, an automated security investigations engine 120, and a security threat mitigation user interface 130. The system 100 may sometimes be referred to herein as a cybersecurity threat detection and threat mitigation system 100.

[0033]The system 100 may function to enable real-time cybersecurity threat detection, agile, and intelligent threat response for mitigating detected security threats.

1.1 Security Alert Engine [Josie]

[0034]The security alert aggregation and identification module 110, sometimes referred to herein as the “security alert engine 110” may be in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims the benefit of U.S. Provisional Application No. 63 / 091,409, filed 14 Oct. 2020, which is incorporated in its entirety by this reference.TECHNICAL FIELD[0002]This invention relates generally to the cybersecurity field, and more specifically to a new and useful cyber threat detection and mitigation system and methods in the cybersecurity field.BACKGROUND[0003]Modern computing and organizational security have been evolving to include a variety of security operation services that can often abstract a responsibility for monitoring and detecting threats in computing and organizational resources of an organizational entity to professionally managed security service providers outside of the organizational entity. As many of these organizational entities continue to migrate their computing resources and computing requirements to cloud-based services, the security risks posed by malicious actors or uneducated insiders appear...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06G06F9/54G06N5/04G06N5/02
CPCH04L63/1441H04L63/1416G06N5/022G06N5/04G06F9/547G06N20/20H04L63/20
Inventor PETERS, MATTSILBERMAN, PETERWHALEN, DANWEBER, ELISABETHHENCINSKI, JONBEGEMAN, JOHN
Owner EXPEL INC