BR112013020364A2 - método e sistema para melhorar a detecção de ameaças de segurança em redes de comunicação - Google Patents
método e sistema para melhorar a detecção de ameaças de segurança em redes de comunicaçãoInfo
- Publication number
- BR112013020364A2 BR112013020364A2 BR112013020364A BR112013020364A BR112013020364A2 BR 112013020364 A2 BR112013020364 A2 BR 112013020364A2 BR 112013020364 A BR112013020364 A BR 112013020364A BR 112013020364 A BR112013020364 A BR 112013020364A BR 112013020364 A2 BR112013020364 A2 BR 112013020364A2
- Authority
- BR
- Brazil
- Prior art keywords
- security threat
- communication networks
- threat detection
- improving security
- improving
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Abstract
método e sistema para melhorar a detecção de ameaças de segurança em redes de comunicação método e sistema para melhorar a detecção de ameaças de segurança em uma rede de comunicação, que inclui dispositivos de segurança que geram eventos de segurança. a presente invenção atribui uma etiqueta dinâmica a cada evento segundo a descrição do evento, e as etiquetas relacionadas com a mesma ameaça de segurança são agrupadas formando um padrão de modelos de dados. um algoritmo de inteligência artificial, que apreende de informação real conhecida, analisa esses padrões e decide se deveria gerar-se um alarme ou não.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11382033.6A EP2487860B1 (en) | 2011-02-10 | 2011-02-10 | Method and system for improving security threats detection in communication networks |
PCT/EP2012/052304 WO2012107557A1 (en) | 2011-02-10 | 2012-02-10 | Method and system for improving security threats detection in communication networks |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112013020364A2 true BR112013020364A2 (pt) | 2016-10-25 |
Family
ID=44351689
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112013020364A BR112013020364A2 (pt) | 2011-02-10 | 2012-02-10 | método e sistema para melhorar a detecção de ameaças de segurança em redes de comunicação |
Country Status (7)
Country | Link |
---|---|
US (1) | US20140223555A1 (pt) |
EP (1) | EP2487860B1 (pt) |
AR (1) | AR085160A1 (pt) |
BR (1) | BR112013020364A2 (pt) |
CL (1) | CL2013002221A1 (pt) |
ES (1) | ES2442747T3 (pt) |
WO (1) | WO2012107557A1 (pt) |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9043903B2 (en) | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
US9292881B2 (en) | 2012-06-29 | 2016-03-22 | Crowdstrike, Inc. | Social sharing of security information in a group |
CA2886058A1 (en) * | 2012-09-28 | 2014-04-03 | Level 3 Communications, Llc | Identifying and mitigating malicious network threats |
US10409980B2 (en) | 2012-12-27 | 2019-09-10 | Crowdstrike, Inc. | Real-time representation of security-relevant system state |
CN103023927B (zh) * | 2013-01-10 | 2016-03-16 | 西南大学 | 一种稀疏表达下的基于非负矩阵分解的入侵检测方法及系统 |
US9509688B1 (en) * | 2013-03-13 | 2016-11-29 | EMC IP Holding Company LLC | Providing malicious identity profiles from failed authentication attempts involving biometrics |
EP3053074A4 (en) | 2013-09-30 | 2017-04-05 | Hewlett-Packard Enterprise Development LP | Hierarchical threat intelligence |
GB2520987B (en) * | 2013-12-06 | 2016-06-01 | Cyberlytic Ltd | Using fuzzy logic to assign a risk level profile to a potential cyber threat |
US20150222646A1 (en) * | 2014-01-31 | 2015-08-06 | Crowdstrike, Inc. | Tagging Security-Relevant System Objects |
US9325726B2 (en) | 2014-02-03 | 2016-04-26 | Intuit Inc. | Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment |
US9342690B2 (en) * | 2014-05-30 | 2016-05-17 | Intuit Inc. | Method and apparatus for a scoring service for security threat management |
US20150304343A1 (en) | 2014-04-18 | 2015-10-22 | Intuit Inc. | Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment |
US10289405B2 (en) | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
US9798882B2 (en) | 2014-06-06 | 2017-10-24 | Crowdstrike, Inc. | Real-time model of states of monitored devices |
CN105205394B (zh) * | 2014-06-12 | 2019-01-08 | 腾讯科技(深圳)有限公司 | 用于入侵检测的数据检测方法和装置 |
US9692778B1 (en) * | 2014-11-11 | 2017-06-27 | Symantec Corporation | Method and system to prioritize vulnerabilities based on contextual correlation |
US10230742B2 (en) | 2015-01-30 | 2019-03-12 | Anomali Incorporated | Space and time efficient threat detection |
US10652103B2 (en) * | 2015-04-24 | 2020-05-12 | Goldman Sachs & Co. LLC | System and method for handling events involving computing systems and networks using fabric monitoring system |
US10320813B1 (en) | 2015-04-30 | 2019-06-11 | Amazon Technologies, Inc. | Threat detection and mitigation in a virtualized computing environment |
US10339316B2 (en) | 2015-07-28 | 2019-07-02 | Crowdstrike, Inc. | Integrity assurance through early loading in the boot phase |
US10419494B2 (en) * | 2016-09-26 | 2019-09-17 | Splunk Inc. | Managing the collection of forensic data from endpoint devices |
US10425442B2 (en) | 2016-09-26 | 2019-09-24 | Splunk Inc. | Correlating forensic data collected from endpoint devices with other non-forensic data |
US10387228B2 (en) | 2017-02-21 | 2019-08-20 | Crowdstrike, Inc. | Symmetric bridge component for communications between kernel mode and user mode |
US20180270248A1 (en) | 2017-03-14 | 2018-09-20 | International Business Machines Corporation | Secure resource access based on psychometrics |
US10990677B2 (en) * | 2017-06-05 | 2021-04-27 | Microsoft Technology Licensing, Llc | Adversarial quantum machine learning |
US10586051B2 (en) * | 2017-08-31 | 2020-03-10 | International Business Machines Corporation | Automatic transformation of security event detection rules |
CN107896229A (zh) * | 2017-12-26 | 2018-04-10 | 黄河交通学院 | 一种计算机网络异常检测的方法、系统及移动终端 |
US10740459B2 (en) | 2017-12-28 | 2020-08-11 | Crowdstrike, Inc. | Kernel- and user-level cooperative security processing |
US11194903B2 (en) * | 2018-02-23 | 2021-12-07 | Crowd Strike, Inc. | Cross-machine detection techniques |
EP3531325B1 (en) | 2018-02-23 | 2021-06-23 | Crowdstrike, Inc. | Computer security event analysis |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US10965703B2 (en) | 2018-06-06 | 2021-03-30 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US10542046B2 (en) | 2018-06-07 | 2020-01-21 | Unifyvault LLC | Systems and methods for blockchain security data intelligence |
US11470101B2 (en) | 2018-10-03 | 2022-10-11 | At&T Intellectual Property I, L.P. | Unsupervised encoder-decoder neural network security event detection |
US11171978B2 (en) | 2019-03-27 | 2021-11-09 | Microsoft Technology Licensing, Llc. | Dynamic monitoring, detection of emerging computer events |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
CN113762445B (zh) * | 2021-04-26 | 2023-11-07 | 重庆大学 | 一种基于装配式建筑的标识解析系统 |
EP4246326A1 (de) | 2022-03-18 | 2023-09-20 | Process Squad GmbH | Verfahren, vorrichtung und systemanordnung zur prozessüberwachung in echtzeit |
WO2023219614A1 (en) * | 2022-05-11 | 2023-11-16 | Secureworks Corp. | Systems and methods for dynamic vulnerability scoring |
CN115134174B (zh) * | 2022-08-31 | 2022-11-25 | 中国人民解放军战略支援部队航天工程大学 | 基于改进Actor-Critic算法的SDN下自适应威胁缓解方法及系统 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030051026A1 (en) * | 2001-01-19 | 2003-03-13 | Carter Ernst B. | Network surveillance and security system |
US20030172291A1 (en) * | 2002-03-08 | 2003-09-11 | Paul Judge | Systems and methods for automated whitelisting in monitored communications |
US20080189171A1 (en) * | 2007-02-01 | 2008-08-07 | Nice Systems Ltd. | Method and apparatus for call categorization |
US20090064334A1 (en) * | 2007-08-30 | 2009-03-05 | International Business Machines Corporation | Adaptive Autonomic Threat Detection and Quarantine |
US9112895B1 (en) * | 2012-06-25 | 2015-08-18 | Emc Corporation | Anomaly detection system for enterprise network security |
-
2011
- 2011-02-10 ES ES11382033.6T patent/ES2442747T3/es active Active
- 2011-02-10 EP EP11382033.6A patent/EP2487860B1/en not_active Not-in-force
-
2012
- 2012-02-10 AR ARP120100452A patent/AR085160A1/es not_active Application Discontinuation
- 2012-02-10 WO PCT/EP2012/052304 patent/WO2012107557A1/en active Application Filing
- 2012-02-10 BR BR112013020364A patent/BR112013020364A2/pt not_active Application Discontinuation
- 2012-02-10 US US13/984,129 patent/US20140223555A1/en not_active Abandoned
-
2013
- 2013-08-02 CL CL2013002221A patent/CL2013002221A1/es unknown
Also Published As
Publication number | Publication date |
---|---|
WO2012107557A1 (en) | 2012-08-16 |
EP2487860A1 (en) | 2012-08-15 |
CL2013002221A1 (es) | 2013-11-22 |
AR085160A1 (es) | 2013-09-11 |
US20140223555A1 (en) | 2014-08-07 |
ES2442747T3 (es) | 2014-02-13 |
EP2487860B1 (en) | 2013-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112013020364A2 (pt) | método e sistema para melhorar a detecção de ameaças de segurança em redes de comunicação | |
BR112021018241A2 (pt) | Computação de preservação de privacidade distribuída em dados protegidos | |
GB2527966A (en) | Creating rules for use in third-party tag management systems | |
AU2015200905B9 (en) | Method and system for providing an efficient vulnerability management and verification service | |
GB2548270A (en) | A Method and system for network access control based on traffic monitoring and vulnerability detection using process related information | |
BR112017016468A2 (pt) | método e sistema para gerenciar com segurança dados biométricos, e, produto de programa de computador. | |
BR112016029751A2 (pt) | perfil, patamar, nível para o 0-ésimo conjunto de camada de saída em codificação de vídeo | |
MX2017013446A (es) | Vehiculo industrial para identificar etiqueta secuenciada de mal funcionamiento y arreglo de etiquetas para el uso con el mismo. | |
BR112015013770A2 (pt) | método e aparelho para marcação de itens fabricados usando-se características físicas | |
BR112015015230A2 (pt) | sistema e processo para abordar generalização em uma rede neural | |
BR112016029856A2 (pt) | sistemas e métodos para sinalizar parâmetros de decodificador de referência hipotética em um conjunto de parâmetros | |
BR112014026659A8 (pt) | aparelho e método para decodificar um fluxo de mídia e aparelho para enviar um fluxo de mídia codificado | |
BR112017003412A2 (pt) | preservação de proteção de dados com política | |
WO2014190337A3 (en) | Requesting proximate resources by learning devices | |
AR093197A1 (es) | Sistema y metodo de levitacion y distribucion | |
BR112017009795A2 (pt) | sistema e método para gerar um perfil de níveis de estresse e de níveis de resiliência de estresse em uma população | |
EP2947811A4 (en) | METHOD, SERVER, HOST, AND SYSTEM FOR PROTECTING DATA SECURITY | |
BR112015015259A2 (pt) | método, aparelhos e dispositivo eletrônico para gerenciamento de conexão | |
BR112013017414A2 (pt) | método e aparelho para criar e gerenciar uma estrutura de segurança diferenciada para redes orientadas de conteúdo | |
BR112012020191A2 (pt) | artigo de segurança, método de autentificação de um artigo de segurança, e, sistema de detecção para autenticar um artigo de segurança. | |
IL259878A (en) | Malicious code detection systems and methods in real-time code | |
BR112014032549A2 (pt) | sistemas e processos novos para micro empréstimo aperfeiçoados | |
MX2015010893A (es) | Sistemas y metodos de reglas a base de riesgo para control de aplicaciones. | |
WO2015029037A3 (en) | Method and system handling malware | |
AR098379A1 (es) | Método de verificación de seguridad de una aplicación, un servidor de aplicaciones, una aplicación cliente y un sistema |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
B11B | Dismissal acc. art. 36, par 1 of ipl - no reply within 90 days to fullfil the necessary requirements |