SG11201604311TA - System and method for 3d abstract object modelling of high entropic information security threats - Google Patents

System and method for 3d abstract object modelling of high entropic information security threats

Info

Publication number
SG11201604311TA
SG11201604311TA SG11201604311TA SG11201604311TA SG11201604311TA SG 11201604311T A SG11201604311T A SG 11201604311TA SG 11201604311T A SG11201604311T A SG 11201604311TA SG 11201604311T A SG11201604311T A SG 11201604311TA SG 11201604311T A SG11201604311T A SG 11201604311TA
Authority
SG
Singapore
Prior art keywords
information security
security threats
abstract object
object modelling
high entropic
Prior art date
Application number
SG11201604311TA
Inventor
Inventor_Name
Keng Leng Albert Lim
Original Assignee
Certis Cisco Security Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Certis Cisco Security Pte Ltd filed Critical Certis Cisco Security Pte Ltd
Publication of SG11201604311TA publication Critical patent/SG11201604311TA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Processing Or Creating Images (AREA)
  • Length Measuring Devices By Optical Means (AREA)
SG11201604311TA 2015-12-14 2015-12-14 System and method for 3d abstract object modelling of high entropic information security threats SG11201604311TA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2015/050492 WO2017105340A1 (en) 2015-12-14 2015-12-14 System and method for 3d abstract object modelling of high entropic information security threats

Publications (1)

Publication Number Publication Date
SG11201604311TA true SG11201604311TA (en) 2017-07-28

Family

ID=59057132

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201604311TA SG11201604311TA (en) 2015-12-14 2015-12-14 System and method for 3d abstract object modelling of high entropic information security threats

Country Status (7)

Country Link
US (1) US10419453B2 (en)
EP (1) EP3198504B1 (en)
CN (1) CN107111712B (en)
AU (2) AU2015417176A1 (en)
MY (1) MY190965A (en)
SG (1) SG11201604311TA (en)
WO (1) WO2017105340A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483438A (en) * 2017-08-15 2017-12-15 山东华诺网络科技有限公司 A kind of network security situation awareness early warning system and method based on big data
US11985157B2 (en) * 2020-01-24 2024-05-14 The Aerospace Corporation Interactive interfaces and data structures representing physical and/or visual information using smart pins
US11228619B2 (en) * 2020-04-22 2022-01-18 International Busuness Machines Corporation Security threat management framework

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6906709B1 (en) 2001-02-27 2005-06-14 Applied Visions, Inc. Visualizing security incidents in a computer network
JP2005004396A (en) * 2003-06-11 2005-01-06 Sony Corp Information display method, information display unit, and computer program
GB0819985D0 (en) * 2008-10-31 2008-12-10 Intergence Systems Ltd Network visualistion systems
CN102111394B (en) * 2009-12-28 2015-03-11 华为数字技术(成都)有限公司 Network attack protection method, equipment and system
JP5035708B2 (en) * 2010-04-21 2012-09-26 日本電気株式会社 Parallel computer system, job server, job scheduling method, and job scheduling program
CN102340485B (en) * 2010-07-19 2015-01-21 中国科学院计算技术研究所 Network security situation awareness system and method based on information correlation
US9146674B2 (en) * 2010-11-23 2015-09-29 Sectra Ab GUI controls with movable touch-control objects for alternate interactions
US8610743B2 (en) * 2011-06-30 2013-12-17 Bmc Software, Inc. Systems and methods for displaying, viewing and navigating three dimensional representations
US8766997B1 (en) * 2011-11-11 2014-07-01 Google Inc. Side-by-side and synchronized displays for three-dimensional (3D) object data models
KR101522399B1 (en) * 2011-12-23 2015-05-22 주식회사 케이티 Method for displaying image from handheld terminal to display device and handheld terminal thereof
CN102663018B (en) * 2012-03-21 2013-08-07 北京华清泰和科技有限公司 Website monitoring and early-warning method
US8823744B2 (en) * 2012-03-23 2014-09-02 Bluebeam Software, Inc. Method for indicating annotations associated with a particular display view of a three-dimensional model independent of any display view
US9069455B2 (en) * 2012-06-22 2015-06-30 Microsoft Technology Licensing, Llc 3D user interface for application entities
US9142102B2 (en) * 2013-07-02 2015-09-22 Icf International Method and apparatus for visualizing network security alerts
US20150156170A1 (en) * 2013-12-03 2015-06-04 Alcatel-Lucent Usa Inc. Security Event Routing In a Distributed Hash Table
CN104182478A (en) * 2014-08-01 2014-12-03 北京华清泰和科技有限公司 Website monitoring pre-warning method

Also Published As

Publication number Publication date
EP3198504B1 (en) 2022-08-31
CN107111712B (en) 2022-03-25
US20180041523A1 (en) 2018-02-08
US10419453B2 (en) 2019-09-17
EP3198504A1 (en) 2017-08-02
MY190965A (en) 2022-05-25
AU2022204812B2 (en) 2024-03-21
WO2017105340A1 (en) 2017-06-22
EP3198504A4 (en) 2017-08-02
AU2022204812A1 (en) 2022-07-28
CN107111712A (en) 2017-08-29
AU2015417176A1 (en) 2018-05-24

Similar Documents

Publication Publication Date Title
IL265879A (en) Method and systems for the indexing of bioinformatics data
GB2568620B (en) System and method for projecting graphical objects
IL236752B (en) An integrative security system and method
RS66781B1 (en) Smart security inspection system and method
SG11201707149UA (en) Method and system for encryption
EP3475774C0 (en) System and method for threat impact determination
SG10201508390PA (en) Data security system and method for operation thereof
IL250926B (en) System and method for location-based security
SG10201602952VA (en) Multiple turret dircm system and related method of operation
GB201414302D0 (en) Data security system and method
GB2543907B (en) Systems and methods of object identification and database creation
GB201504541D0 (en) Method and system for providing temporary secure access enabled virtual assets
GB201704007D0 (en) System and method for secure analysis of datasets
EP3545645C0 (en) System architecture and method of processing data therein
GB2560833B (en) System and method for foundation of wellheads
SG10201505580VA (en) Method And System For Generating Map Data
GB2545390B (en) Method and system for generating geophysical data
AP2017009685A0 (en) Method of subsea containment and system
SG11201604311TA (en) System and method for 3d abstract object modelling of high entropic information security threats
GB201518383D0 (en) System and method for sharing of data
GB2557954B (en) Method of security threat detection
GB201800032D0 (en) Methods and systems for processing geological data
SG10201504543VA (en) System and method for determining a security classification of an unknown application
GB201505932D0 (en) Method and system for asset and capability analysis
FI20165911A7 (en) Method and system for the encryption of data