CL2013002221A1 - Procedimiento y sistema para mejorar la deteccion de amenazas de seguridad en redes de comunicacion que incluye dispositivos de seguridad que generan eventos de seguridad que son almacenados en una base de datos. - Google Patents
Procedimiento y sistema para mejorar la deteccion de amenazas de seguridad en redes de comunicacion que incluye dispositivos de seguridad que generan eventos de seguridad que son almacenados en una base de datos.Info
- Publication number
- CL2013002221A1 CL2013002221A1 CL2013002221A CL2013002221A CL2013002221A1 CL 2013002221 A1 CL2013002221 A1 CL 2013002221A1 CL 2013002221 A CL2013002221 A CL 2013002221A CL 2013002221 A CL2013002221 A CL 2013002221A CL 2013002221 A1 CL2013002221 A1 CL 2013002221A1
- Authority
- CL
- Chile
- Prior art keywords
- security
- database
- procedure
- detection
- stored
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11382033.6A EP2487860B1 (en) | 2011-02-10 | 2011-02-10 | Method and system for improving security threats detection in communication networks |
Publications (1)
Publication Number | Publication Date |
---|---|
CL2013002221A1 true CL2013002221A1 (es) | 2013-11-22 |
Family
ID=44351689
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CL2013002221A CL2013002221A1 (es) | 2011-02-10 | 2013-08-02 | Procedimiento y sistema para mejorar la deteccion de amenazas de seguridad en redes de comunicacion que incluye dispositivos de seguridad que generan eventos de seguridad que son almacenados en una base de datos. |
Country Status (7)
Country | Link |
---|---|
US (1) | US20140223555A1 (es) |
EP (1) | EP2487860B1 (es) |
AR (1) | AR085160A1 (es) |
BR (1) | BR112013020364A2 (es) |
CL (1) | CL2013002221A1 (es) |
ES (1) | ES2442747T3 (es) |
WO (1) | WO2012107557A1 (es) |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9043903B2 (en) | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
US9292881B2 (en) | 2012-06-29 | 2016-03-22 | Crowdstrike, Inc. | Social sharing of security information in a group |
CA2886058A1 (en) * | 2012-09-28 | 2014-04-03 | Level 3 Communications, Llc | Identifying and mitigating malicious network threats |
US10409980B2 (en) | 2012-12-27 | 2019-09-10 | Crowdstrike, Inc. | Real-time representation of security-relevant system state |
CN103023927B (zh) * | 2013-01-10 | 2016-03-16 | 西南大学 | 一种稀疏表达下的基于非负矩阵分解的入侵检测方法及系统 |
US9509688B1 (en) * | 2013-03-13 | 2016-11-29 | EMC IP Holding Company LLC | Providing malicious identity profiles from failed authentication attempts involving biometrics |
EP3053074A4 (en) | 2013-09-30 | 2017-04-05 | Hewlett-Packard Enterprise Development LP | Hierarchical threat intelligence |
GB2520987B (en) * | 2013-12-06 | 2016-06-01 | Cyberlytic Ltd | Using fuzzy logic to assign a risk level profile to a potential cyber threat |
US20150222646A1 (en) * | 2014-01-31 | 2015-08-06 | Crowdstrike, Inc. | Tagging Security-Relevant System Objects |
US9325726B2 (en) | 2014-02-03 | 2016-04-26 | Intuit Inc. | Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment |
US9342690B2 (en) * | 2014-05-30 | 2016-05-17 | Intuit Inc. | Method and apparatus for a scoring service for security threat management |
US20150304343A1 (en) | 2014-04-18 | 2015-10-22 | Intuit Inc. | Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment |
US10289405B2 (en) | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
US9798882B2 (en) | 2014-06-06 | 2017-10-24 | Crowdstrike, Inc. | Real-time model of states of monitored devices |
CN105205394B (zh) * | 2014-06-12 | 2019-01-08 | 腾讯科技(深圳)有限公司 | 用于入侵检测的数据检测方法和装置 |
US9692778B1 (en) * | 2014-11-11 | 2017-06-27 | Symantec Corporation | Method and system to prioritize vulnerabilities based on contextual correlation |
US10230742B2 (en) | 2015-01-30 | 2019-03-12 | Anomali Incorporated | Space and time efficient threat detection |
US10652103B2 (en) * | 2015-04-24 | 2020-05-12 | Goldman Sachs & Co. LLC | System and method for handling events involving computing systems and networks using fabric monitoring system |
US10320813B1 (en) | 2015-04-30 | 2019-06-11 | Amazon Technologies, Inc. | Threat detection and mitigation in a virtualized computing environment |
US10339316B2 (en) | 2015-07-28 | 2019-07-02 | Crowdstrike, Inc. | Integrity assurance through early loading in the boot phase |
US10419494B2 (en) * | 2016-09-26 | 2019-09-17 | Splunk Inc. | Managing the collection of forensic data from endpoint devices |
US10425442B2 (en) | 2016-09-26 | 2019-09-24 | Splunk Inc. | Correlating forensic data collected from endpoint devices with other non-forensic data |
US10387228B2 (en) | 2017-02-21 | 2019-08-20 | Crowdstrike, Inc. | Symmetric bridge component for communications between kernel mode and user mode |
US20180270248A1 (en) | 2017-03-14 | 2018-09-20 | International Business Machines Corporation | Secure resource access based on psychometrics |
US10990677B2 (en) * | 2017-06-05 | 2021-04-27 | Microsoft Technology Licensing, Llc | Adversarial quantum machine learning |
US10586051B2 (en) * | 2017-08-31 | 2020-03-10 | International Business Machines Corporation | Automatic transformation of security event detection rules |
CN107896229A (zh) * | 2017-12-26 | 2018-04-10 | 黄河交通学院 | 一种计算机网络异常检测的方法、系统及移动终端 |
US10740459B2 (en) | 2017-12-28 | 2020-08-11 | Crowdstrike, Inc. | Kernel- and user-level cooperative security processing |
US11194903B2 (en) * | 2018-02-23 | 2021-12-07 | Crowd Strike, Inc. | Cross-machine detection techniques |
EP3531325B1 (en) | 2018-02-23 | 2021-06-23 | Crowdstrike, Inc. | Computer security event analysis |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US10965703B2 (en) | 2018-06-06 | 2021-03-30 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US10542046B2 (en) | 2018-06-07 | 2020-01-21 | Unifyvault LLC | Systems and methods for blockchain security data intelligence |
US11470101B2 (en) | 2018-10-03 | 2022-10-11 | At&T Intellectual Property I, L.P. | Unsupervised encoder-decoder neural network security event detection |
US11171978B2 (en) | 2019-03-27 | 2021-11-09 | Microsoft Technology Licensing, Llc. | Dynamic monitoring, detection of emerging computer events |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
CN113762445B (zh) * | 2021-04-26 | 2023-11-07 | 重庆大学 | 一种基于装配式建筑的标识解析系统 |
EP4246326A1 (de) | 2022-03-18 | 2023-09-20 | Process Squad GmbH | Verfahren, vorrichtung und systemanordnung zur prozessüberwachung in echtzeit |
WO2023219614A1 (en) * | 2022-05-11 | 2023-11-16 | Secureworks Corp. | Systems and methods for dynamic vulnerability scoring |
CN115134174B (zh) * | 2022-08-31 | 2022-11-25 | 中国人民解放军战略支援部队航天工程大学 | 基于改进Actor-Critic算法的SDN下自适应威胁缓解方法及系统 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030051026A1 (en) * | 2001-01-19 | 2003-03-13 | Carter Ernst B. | Network surveillance and security system |
US20030172291A1 (en) * | 2002-03-08 | 2003-09-11 | Paul Judge | Systems and methods for automated whitelisting in monitored communications |
US20080189171A1 (en) * | 2007-02-01 | 2008-08-07 | Nice Systems Ltd. | Method and apparatus for call categorization |
US20090064334A1 (en) * | 2007-08-30 | 2009-03-05 | International Business Machines Corporation | Adaptive Autonomic Threat Detection and Quarantine |
US9112895B1 (en) * | 2012-06-25 | 2015-08-18 | Emc Corporation | Anomaly detection system for enterprise network security |
-
2011
- 2011-02-10 ES ES11382033.6T patent/ES2442747T3/es active Active
- 2011-02-10 EP EP11382033.6A patent/EP2487860B1/en not_active Not-in-force
-
2012
- 2012-02-10 AR ARP120100452A patent/AR085160A1/es not_active Application Discontinuation
- 2012-02-10 WO PCT/EP2012/052304 patent/WO2012107557A1/en active Application Filing
- 2012-02-10 BR BR112013020364A patent/BR112013020364A2/pt not_active Application Discontinuation
- 2012-02-10 US US13/984,129 patent/US20140223555A1/en not_active Abandoned
-
2013
- 2013-08-02 CL CL2013002221A patent/CL2013002221A1/es unknown
Also Published As
Publication number | Publication date |
---|---|
WO2012107557A1 (en) | 2012-08-16 |
BR112013020364A2 (pt) | 2016-10-25 |
EP2487860A1 (en) | 2012-08-15 |
AR085160A1 (es) | 2013-09-11 |
US20140223555A1 (en) | 2014-08-07 |
ES2442747T3 (es) | 2014-02-13 |
EP2487860B1 (en) | 2013-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CL2013002221A1 (es) | Procedimiento y sistema para mejorar la deteccion de amenazas de seguridad en redes de comunicacion que incluye dispositivos de seguridad que generan eventos de seguridad que son almacenados en una base de datos. | |
NO20220657A1 (no) | Pluggteller, frac-system og -fremgangsmåte | |
CH709950A1 (de) | Aktive Honeyport-Netzwerksicherheit | |
BR112014026575A2 (pt) | sistema localizador de indivíduo, e, localizador e dispositivo de comunicação | |
BR112016007660A2 (pt) | sistema e método para gerenciamento, federação e distribuição de chave de criptofrafia | |
BR112015029662A2 (pt) | sistema, e método | |
BR112013001927A2 (pt) | método, sistema e artigo. | |
BR112015009932A2 (pt) | método e sistema. | |
EP3036654A4 (en) | Systems and methods for location-based device security | |
BR112014016063A8 (pt) | método implantado em computador, dispositivos, sistema e meio de armazenamento legível em computados | |
BR112015027846A2 (pt) | sistemas e métodos para impedir dinamização de pilha não autorizada | |
BR112013015551A2 (pt) | método, e, sistema | |
JP2015502881A5 (ja) | 車両セキュリティ用装置、車両セキュリティ方法及び車両セキュリティ用品 | |
BR112013015547A2 (pt) | método, e, sistema | |
BR112014030257A2 (pt) | arranjo de fonte sísmica, e método de avaliação sísmica. | |
BR112014026864A2 (pt) | sistema, e método | |
EP3041105A4 (en) | Energy management device, energy management method, and energy management system | |
BR112014031384A2 (pt) | métodos e sistemas | |
EP3009930A4 (en) | LOCK ADMINISTRATIVE PROCESS AND SYSTEM AND CONFIGURATION METHOD AND DEVICE FOR LOCK MANAGEMENT SYSTEM | |
BR112015003216A2 (pt) | sistema de criptografia com base em atributos; sistema de comunicação; gerador de chave para utilização no sistema; e método de criptografia com base em atributos | |
EP3091472A4 (en) | Storage system having security storage device and management method therefor | |
BR112014007864A2 (pt) | sistema, e método | |
BR112015013155A2 (pt) | método, e sistema | |
BR112014015717A2 (pt) | sistema, e método | |
BR112012029993A2 (pt) | correia e sistema de grelha, e método para formar correia de grelha |