CA2747584A1 - Systeme et procede de production et de raffinage des donnees sur les cybermenaces - Google Patents
Systeme et procede de production et de raffinage des donnees sur les cybermenaces Download PDFInfo
- Publication number
- CA2747584A1 CA2747584A1 CA2747584A CA2747584A CA2747584A1 CA 2747584 A1 CA2747584 A1 CA 2747584A1 CA 2747584 A CA2747584 A CA 2747584A CA 2747584 A CA2747584 A CA 2747584A CA 2747584 A1 CA2747584 A1 CA 2747584A1
- Authority
- CA
- Canada
- Prior art keywords
- threat intelligence
- cyber threat
- cyber
- source
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3108494A CA3108494C (fr) | 2011-05-31 | 2011-07-27 | Systeme et procede de production et de raffinage des donnees sur les cybermenaces |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161491551P | 2011-05-31 | 2011-05-31 | |
US61/491,551 | 2011-05-31 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA3108494A Division CA3108494C (fr) | 2011-05-31 | 2011-07-27 | Systeme et procede de production et de raffinage des donnees sur les cybermenaces |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2747584A1 true CA2747584A1 (fr) | 2012-11-30 |
CA2747584C CA2747584C (fr) | 2021-03-30 |
Family
ID=47262856
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2747584A Active CA2747584C (fr) | 2011-05-31 | 2011-07-27 | Systeme et procede de production et de raffinage des donnees sur les cybermenaces |
CA3108494A Active CA3108494C (fr) | 2011-05-31 | 2011-07-27 | Systeme et procede de production et de raffinage des donnees sur les cybermenaces |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA3108494A Active CA3108494C (fr) | 2011-05-31 | 2011-07-27 | Systeme et procede de production et de raffinage des donnees sur les cybermenaces |
Country Status (1)
Country | Link |
---|---|
CA (2) | CA2747584C (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9258321B2 (en) | 2012-08-23 | 2016-02-09 | Raytheon Foreground Security, Inc. | Automated internet threat detection and mitigation system and associated methods |
US9392003B2 (en) | 2012-08-23 | 2016-07-12 | Raytheon Foreground Security, Inc. | Internet security cyber threat reporting system and method |
WO2017078648A1 (fr) | 2015-11-05 | 2017-05-11 | Netaş Telekomüni̇kasyon Anoni̇m Şi̇rketi̇ | Procédé de calcul de réputation d'informations et de source d'informations devant être utilisées dans un centre d'opérations de sécurité |
GB2594157A (en) * | 2013-09-13 | 2021-10-20 | Elasticsearch Bv | Method and apparatus for detecting irregularities on device |
-
2011
- 2011-07-27 CA CA2747584A patent/CA2747584C/fr active Active
- 2011-07-27 CA CA3108494A patent/CA3108494C/fr active Active
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9258321B2 (en) | 2012-08-23 | 2016-02-09 | Raytheon Foreground Security, Inc. | Automated internet threat detection and mitigation system and associated methods |
US9392003B2 (en) | 2012-08-23 | 2016-07-12 | Raytheon Foreground Security, Inc. | Internet security cyber threat reporting system and method |
GB2594157A (en) * | 2013-09-13 | 2021-10-20 | Elasticsearch Bv | Method and apparatus for detecting irregularities on device |
GB2594157B (en) * | 2013-09-13 | 2022-02-16 | Elasticsearch Bv | Method and apparatus for detecting irregularities on device |
WO2017078648A1 (fr) | 2015-11-05 | 2017-05-11 | Netaş Telekomüni̇kasyon Anoni̇m Şi̇rketi̇ | Procédé de calcul de réputation d'informations et de source d'informations devant être utilisées dans un centre d'opérations de sécurité |
Also Published As
Publication number | Publication date |
---|---|
CA3108494A1 (fr) | 2012-11-30 |
CA2747584C (fr) | 2021-03-30 |
CA3108494C (fr) | 2023-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9118702B2 (en) | System and method for generating and refining cyber threat intelligence data | |
JP7250703B2 (ja) | 相関関係駆動型脅威の評価と修復 | |
Zargar et al. | A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks | |
US9479532B1 (en) | Mitigating denial of service attacks | |
Thomas | Managing the threat of denial-of-service attacks | |
Fung | Collaborative Intrusion Detection Networks and Insider Attacks. | |
Pletinckx et al. | Malware coordination using the blockchain: An analysis of the cerber ransomware | |
Ling et al. | TorWard: Discovery of malicious traffic over Tor | |
Fung et al. | Intrusion detection networks: a key to collaborative security | |
Ramaki et al. | A survey of IT early warning systems: architectures, challenges, and solutions | |
US20230370495A1 (en) | Breach prediction via machine learning | |
Gardiner et al. | Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences | |
CA2747584C (fr) | Systeme et procede de production et de raffinage des donnees sur les cybermenaces | |
Meena et al. | Distributed denial of service attacks and their suggested defense remedial approaches | |
US20240129338A1 (en) | Risk Mitigation Effectiveness Score of Network Security Services | |
Liu et al. | Dial" N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains | |
Marchese et al. | Monitoring unauthorized internet accesses through a ‘honeypot’system | |
Jansky et al. | Hunting sip authentication attacks efficiently | |
US20240163312A1 (en) | Calculation of Security Risk Score of Network Security Services | |
US20240314169A1 (en) | Systems and methods for cloud-based threat alerts and monitoring | |
Hajdarevic | Cyber Security Audit in Business Environments | |
Prehn et al. | Kirin: Hitting the Internet with Distributed BGP Announcements | |
Macaulay | Upstream Intelligence: A New Layer of Cybersecurity | |
Fung et al. | Cooperation in Intrusion Detection Networks | |
Alhomoud et al. | Se/f/-healing Framework for Enterprise networks to combat Botnets infections |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20160727 |