EP3655878A4 - Fortschrittliche abschwächung von cybersicherheitsbedrohungen durch verhaltens- und tiefenanalytik - Google Patents

Fortschrittliche abschwächung von cybersicherheitsbedrohungen durch verhaltens- und tiefenanalytik Download PDF

Info

Publication number
EP3655878A4
EP3655878A4 EP18835963.2A EP18835963A EP3655878A4 EP 3655878 A4 EP3655878 A4 EP 3655878A4 EP 18835963 A EP18835963 A EP 18835963A EP 3655878 A4 EP3655878 A4 EP 3655878A4
Authority
EP
European Patent Office
Prior art keywords
mitigation
behavioral
progressive
security threats
cyber security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP18835963.2A
Other languages
English (en)
French (fr)
Other versions
EP3655878A1 (de
Inventor
Jason Crabtree
Andrew Sellers
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qomplx Inc
Original Assignee
Qomplx Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/655,113 external-priority patent/US10735456B2/en
Application filed by Qomplx Inc filed Critical Qomplx Inc
Publication of EP3655878A1 publication Critical patent/EP3655878A1/de
Publication of EP3655878A4 publication Critical patent/EP3655878A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
EP18835963.2A 2017-07-20 2018-07-20 Fortschrittliche abschwächung von cybersicherheitsbedrohungen durch verhaltens- und tiefenanalytik Withdrawn EP3655878A4 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/655,113 US10735456B2 (en) 2015-10-28 2017-07-20 Advanced cybersecurity threat mitigation using behavioral and deep analytics
PCT/US2018/043191 WO2019018829A1 (en) 2017-07-20 2018-07-20 MITIGATING IMPROVED CYBERSECURITY THREATS USING DEEP AND BEHAVIORAL ANALYTICS

Publications (2)

Publication Number Publication Date
EP3655878A1 EP3655878A1 (de) 2020-05-27
EP3655878A4 true EP3655878A4 (de) 2021-04-07

Family

ID=65015309

Family Applications (1)

Application Number Title Priority Date Filing Date
EP18835963.2A Withdrawn EP3655878A4 (de) 2017-07-20 2018-07-20 Fortschrittliche abschwächung von cybersicherheitsbedrohungen durch verhaltens- und tiefenanalytik

Country Status (3)

Country Link
EP (1) EP3655878A4 (de)
CN (1) CN111316272A (de)
WO (1) WO2019018829A1 (de)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12500920B2 (en) 2015-10-28 2025-12-16 Qomplx Llc Computer-implemented system and method for cybersecurity threat analysis using federated machine learning and hierarchical task networks
CN108011893A (zh) * 2017-12-26 2018-05-08 广东电网有限责任公司信息中心 一种基于网络资产信息采集的资产管理系统
US12041065B2 (en) * 2019-10-15 2024-07-16 Fortinet, Inc. Resolving the disparate impact of security exploits to resources within a resource group
US11444961B2 (en) * 2019-12-20 2022-09-13 Intel Corporation Active attack detection in autonomous vehicle networks
CN114143052B (zh) * 2021-11-19 2023-04-28 北京灰度科技有限公司 基于可控入侵模拟的网络防御体系风险评估方法、设备及存储介质
CN115118422B (zh) * 2022-03-10 2025-06-17 西安邮电大学 一种未披露漏洞的群智协同共享抗泄露系统及方法
CN114860585B (zh) * 2022-04-22 2024-11-19 中国人民解放军国防科技大学 一种基于多层语义恢复的网络协议软件分析方法
CN115277404B (zh) * 2022-05-13 2023-06-02 清华大学 云网络大规模变更发布编排方法、装置、设备和存储介质
WO2025019721A1 (en) * 2023-07-19 2025-01-23 Qomplx Llc A system and method for cyber exploitation path analysis and task plan optimization
CN120430879B (zh) * 2025-07-08 2025-09-12 南京财经大学 一种基于大数据的综合财务审计系统

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170126712A1 (en) * 2015-10-28 2017-05-04 Fractal Industries, Inc. Detection mitigation and remediation of cyberattacks employing an advanced cyber-decision platform
US20170324768A1 (en) * 2015-10-28 2017-11-09 Fractal Industries, Inc. Advanced cybersecurity threat mitigation using behavioral and deep analytics

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015149062A1 (en) * 2014-03-28 2015-10-01 Zitovault, Inc. System and method for predicting impending cyber security events using multi channel behavioral analysis in a distributed computing environment
DE102015119597B4 (de) * 2015-11-13 2022-07-14 Kriwan Industrie-Elektronik Gmbh Cyber-physikalisches System
US10367829B2 (en) * 2015-11-19 2019-07-30 Anomali Incorporated Protecting threat indicators from third party abuse

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170126712A1 (en) * 2015-10-28 2017-05-04 Fractal Industries, Inc. Detection mitigation and remediation of cyberattacks employing an advanced cyber-decision platform
US20170324768A1 (en) * 2015-10-28 2017-11-09 Fractal Industries, Inc. Advanced cybersecurity threat mitigation using behavioral and deep analytics

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
IGOR KOTENKO ET AL: "A Cyber Attack Modeling and Impact Assessment framework", 2014 6TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2014), 1 June 2013 (2013-06-01), pages 1 - 24, XP055499649, ISSN: 2325-5366, ISBN: 978-9949-9544-0-7 *
S HAQUE ET AL: "An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling", PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT (SAM), 1 January 2017 (2017-01-01), Athens, pages 224 - 229, XP055777875, Retrieved from the Internet <URL:http://dcsl.cs.ua.edu/papers/SAM9712.pdf> [retrieved on 20210222] *
See also references of WO2019018829A1 *

Also Published As

Publication number Publication date
CN111316272A (zh) 2020-06-19
WO2019018829A1 (en) 2019-01-24
EP3655878A1 (de) 2020-05-27

Similar Documents

Publication Publication Date Title
EP3655878A4 (de) Fortschrittliche abschwächung von cybersicherheitsbedrohungen durch verhaltens- und tiefenanalytik
EP3622402A4 (de) Echtzeiterkennung von cyberbedrohungen mittels verhaltensanalyse
IL243426A0 (en) A platform to protect small and medium enterprises from online threats
IL261000B (en) Cybersecurity system
DK3528463T3 (da) Cybersikkerhedsanalytiker med kunstig intelligens
EP3710981A4 (de) Vollständig konvolutionierte erkennung und beschreibung von interessenpunkten durch homografische anpassung
IL262814A (en) Combination therapies of hdac inhibitors and pd-1 inhibitors
EP3635603C0 (de) Echtzeitdetektion und -schutz vor malware und steganographie in einem kernmodus
PL3319813T3 (pl) Dokumenty zabezpieczone i urządzenia zabezpieczające oraz sposób ich wytwarzania
MA46700A (fr) Variants polypeptidiques et ses utilisations
EP3491524A4 (de) System und verfahren zur verwaltung von cybersicherheitsschwachstellen
PT3468990T (pt) Anticorpos anti-c5 e utilizações dos mesmos
EP2941729A4 (de) Schutz und vertraulichkeit von sicheren dienstmanagerdaten
EP3356416A4 (de) Pd-1-antikörper und verwendungen davon
EP3278082A4 (de) Laserrauschdetektion und -minderung in partikelzählenden instrumenten
MA44262A (fr) Bioconjugués et utilisations de ceux-ci
EP3590063A4 (de) Erkennung von maligem verhalten in lokalen netzwerken
FR3034778B1 (fr) Additif dispersant des asphaltenes et ses utilisations
EP4022247A4 (de) Sicherheitsgerät zur abschwächung mehrerer bedrohungen zum schutz von personen, anlagen und kritischer infrastruktur
EP4028919A4 (de) Bedrohungsabschwächungssystem und -verfahren
EP3198503A4 (de) Erkennung und verringerung von bösartigem aufrufen eines empfindlichen codes
IL253987A0 (en) System and method for identifying cyber threats
EP3582463A4 (de) Bedrohungsdetektionsverfahren und -vorrichtung
EP3365321A4 (de) Solabegron-zwitterion und verwendungen davon
ZA201900309B (en) Security of ciphering and integrity protection

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20200218

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RIN1 Information on inventor provided before grant (corrected)

Inventor name: CRABTREE, JASON

Inventor name: SELLERS, ANDREW

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20210305

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 29/06 20060101ALI20210301BHEP

Ipc: G06F 21/50 20130101ALI20210301BHEP

Ipc: G06F 21/62 20130101AFI20210301BHEP

Ipc: G06F 21/57 20130101ALI20210301BHEP

Ipc: G06F 21/55 20130101ALI20210301BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20211125