SG10201706430PA - Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatus - Google Patents
Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatusInfo
- Publication number
- SG10201706430PA SG10201706430PA SG10201706430PA SG10201706430PA SG10201706430PA SG 10201706430P A SG10201706430P A SG 10201706430PA SG 10201706430P A SG10201706430P A SG 10201706430PA SG 10201706430P A SG10201706430P A SG 10201706430PA SG 10201706430P A SG10201706430P A SG 10201706430PA
- Authority
- SG
- Singapore
- Prior art keywords
- cyber
- attack analysis
- analysis supporting
- recording medium
- attack
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016166294A JP6786960B2 (en) | 2016-08-26 | 2016-08-26 | Cyber attack analysis support program, cyber attack analysis support method and cyber attack analysis support device |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201706430PA true SG10201706430PA (en) | 2018-03-28 |
Family
ID=59626450
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201706430PA SG10201706430PA (en) | 2016-08-26 | 2017-08-07 | Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatus |
Country Status (4)
Country | Link |
---|---|
US (1) | US10476904B2 (en) |
EP (1) | EP3287928A1 (en) |
JP (1) | JP6786960B2 (en) |
SG (1) | SG10201706430PA (en) |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9043903B2 (en) * | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
US10289405B2 (en) | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
US10958667B1 (en) | 2016-06-03 | 2021-03-23 | Mcafee Llc | Determining computing system incidents using node graphs |
US10277735B2 (en) * | 2017-03-10 | 2019-04-30 | Neustar, Inc. | Individual telephone number assignment |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10848397B1 (en) * | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
US10785239B2 (en) * | 2017-12-08 | 2020-09-22 | Mcafee, Llc | Learning maliciousness in cybersecurity graphs |
US10740459B2 (en) | 2017-12-28 | 2020-08-11 | Crowdstrike, Inc. | Kernel- and user-level cooperative security processing |
JP6977625B2 (en) * | 2018-03-07 | 2021-12-08 | 富士通株式会社 | Evaluation program, evaluation method and evaluation device |
KR102118187B1 (en) * | 2018-05-25 | 2020-06-02 | 국방과학연구소 | Method and apparatus for cyber threat intelligence classification |
KR102117696B1 (en) * | 2018-06-08 | 2020-06-01 | 아주대학교산학협력단 | Method and apparatus for security vulnerability quantification using game theory |
WO2020080047A1 (en) * | 2018-10-17 | 2020-04-23 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | Incursion location identification device and incursion location identification method |
US11741196B2 (en) | 2018-11-15 | 2023-08-29 | The Research Foundation For The State University Of New York | Detecting and preventing exploits of software vulnerability using instruction tags |
JP7243329B2 (en) * | 2019-03-15 | 2023-03-22 | 日本電気株式会社 | Computer program, event anomaly detection method, and computer |
US11431734B2 (en) * | 2019-04-18 | 2022-08-30 | Kyndryl, Inc. | Adaptive rule generation for security event correlation |
US11736498B1 (en) * | 2019-08-29 | 2023-08-22 | Trend Micro Incorporated | Stateful detection of cyberattacks |
CA3168656A1 (en) * | 2020-01-22 | 2021-07-29 | Siemens Industry, Inc. | Real-time and independent cyber-attack monitoring and automatic cyber-attack response system |
JP7359002B2 (en) * | 2020-01-23 | 2023-10-11 | 株式会社デンソー | Cyber attack analysis support device |
CN111343161B (en) * | 2020-02-14 | 2021-12-10 | 平安科技(深圳)有限公司 | Abnormal information processing node analysis method, abnormal information processing node analysis device, abnormal information processing node analysis medium and electronic equipment |
CN111988322B (en) * | 2020-08-24 | 2022-06-17 | 北京微步在线科技有限公司 | Attack event display system |
JP7408530B2 (en) | 2020-11-13 | 2024-01-05 | 株式会社日立製作所 | Security management system and security management method |
US11907873B1 (en) * | 2021-01-12 | 2024-02-20 | Wells Fargo Bank, N.A. | Systems and methods for business syndicate geolocated skill matching |
CN114785579B (en) * | 2022-04-14 | 2022-11-25 | 福建实达集团股份有限公司 | Network attack analysis method and server applied to cloud side-end computing |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7246156B2 (en) | 2003-06-09 | 2007-07-17 | Industrial Defender, Inc. | Method and computer program product for monitoring an industrial network |
US20070140131A1 (en) * | 2005-12-15 | 2007-06-21 | Malloy Patrick J | Interactive network monitoring and analysis |
US7530105B2 (en) * | 2006-03-21 | 2009-05-05 | 21St Century Technologies, Inc. | Tactical and strategic attack detection and prediction |
JP4773332B2 (en) | 2006-12-28 | 2011-09-14 | 三菱電機株式会社 | Security management apparatus, security management method, and program |
US9746985B1 (en) * | 2008-02-25 | 2017-08-29 | Georgetown University | System and method for detecting, collecting, analyzing, and communicating event-related information |
US9760697B1 (en) * | 2013-06-27 | 2017-09-12 | Interacvault Inc. | Secure interactive electronic vault with dynamic access controls |
US9870465B1 (en) * | 2013-12-04 | 2018-01-16 | Plentyoffish Media Ulc | Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment |
US9886581B2 (en) | 2014-02-25 | 2018-02-06 | Accenture Global Solutions Limited | Automated intelligence graph construction and countermeasure deployment |
CN106105112B (en) | 2014-03-19 | 2019-08-27 | 日本电信电话株式会社 | Analysis rule adjusts device, analysis rule adjustment system and analysis rule method of adjustment |
US9686308B1 (en) * | 2014-05-12 | 2017-06-20 | GraphUS, Inc. | Systems and methods for detecting and/or handling targeted attacks in the email channel |
JP6258189B2 (en) | 2014-12-24 | 2018-01-10 | 日本電信電話株式会社 | Specific apparatus, specific method, and specific program |
US10061824B2 (en) * | 2015-01-30 | 2018-08-28 | Splunk Inc. | Cell-based table manipulation of event data |
US9699205B2 (en) * | 2015-08-31 | 2017-07-04 | Splunk Inc. | Network security system |
DE102015115672A1 (en) * | 2015-09-17 | 2017-03-23 | Peter Kämper | Pre-Crime procedure and system for predictable defense against hacker attacks |
US11558407B2 (en) * | 2016-02-05 | 2023-01-17 | Defensestorm, Inc. | Enterprise policy tracking with security incident integration |
-
2016
- 2016-08-26 JP JP2016166294A patent/JP6786960B2/en active Active
-
2017
- 2017-08-07 SG SG10201706430PA patent/SG10201706430PA/en unknown
- 2017-08-07 US US15/670,031 patent/US10476904B2/en active Active
- 2017-08-09 EP EP17185499.5A patent/EP3287928A1/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
JP6786960B2 (en) | 2020-11-18 |
EP3287928A1 (en) | 2018-02-28 |
US10476904B2 (en) | 2019-11-12 |
JP2018032355A (en) | 2018-03-01 |
US20180063177A1 (en) | 2018-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201706430PA (en) | Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatus | |
SG11202002740SA (en) | Face pose analysis method and apparatus, device, storage medium, and program | |
SG11201802985PA (en) | Method and apparatus for initiating an operation using voice data | |
EP3324183A4 (en) | Image analysis device, image analysis method, image analysis system, image analysis program, and recording medium | |
GB2527883B (en) | Information processing apparatus, method therefor, and measurement apparatus | |
SG10201510145YA (en) | Liquid processing method, liquid processing apparatus and recording medium | |
SG11201701125SA (en) | Image processing apparatus, image processing method, recording medium, and program | |
KR102217253B9 (en) | Apparatus and method for analyzing behavior pattern | |
SG10201408497VA (en) | Evaluation method, evaluation apparatus, and recording medium | |
HK1252835A1 (en) | Service support apparatus, service support method and program | |
GB201617760D0 (en) | Video processing apparatus, video processing method, program, and medium | |
EP3382610A4 (en) | Data analysis apparatus, method, and program | |
GB201808922D0 (en) | Device, method, and recording medium | |
HK1248900A1 (en) | Data analysis apparatus and data analysis method | |
GB2549642B (en) | Image processing device and method, program, and record medium | |
PL3098813T3 (en) | Linear predictive analysis apparatus, method, program and recording medium | |
GB201814927D0 (en) | Analysis device, analysis method and storage medium which stores program | |
SG11201802898PA (en) | Method and apparatus for address analysis | |
PL3462453T3 (en) | Linear predictive analysis apparatus, method, program and recording medium | |
PL3648103T3 (en) | Decoding method, decoding apparatus, corresponding program and recording medium | |
HK1232331A1 (en) | Program, information processing apparatus, control method, and recording medium | |
HK1232330A1 (en) | Program, information processing apparatus, depth definition method, and recording medium | |
GB2565954B (en) | Method and apparatus for analyzing biomolecules | |
SG11202004732QA (en) | Analysis method, analysis device, analysis program, and recording medium for recording analysis program | |
GB201502447D0 (en) | Method and apparatus for sample analysis |