WO2019051131A3 - Advanced cybersecurity threat mitigation for inter-bank financial transactions - Google Patents

Advanced cybersecurity threat mitigation for inter-bank financial transactions Download PDF

Info

Publication number
WO2019051131A3
WO2019051131A3 PCT/US2018/049807 US2018049807W WO2019051131A3 WO 2019051131 A3 WO2019051131 A3 WO 2019051131A3 US 2018049807 W US2018049807 W US 2018049807W WO 2019051131 A3 WO2019051131 A3 WO 2019051131A3
Authority
WO
WIPO (PCT)
Prior art keywords
advanced
inter
financial transactions
network
threat mitigation
Prior art date
Application number
PCT/US2018/049807
Other languages
French (fr)
Other versions
WO2019051131A2 (en
Inventor
Jason Crabtree
Andrew Sellers
Original Assignee
Fractal Industries, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US15/696,367 priority Critical patent/US20180013771A1/en
Priority to US15/696,367 priority
Application filed by Fractal Industries, Inc. filed Critical Fractal Industries, Inc.
Publication of WO2019051131A2 publication Critical patent/WO2019051131A2/en
Publication of WO2019051131A3 publication Critical patent/WO2019051131A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Abstract

A system for mitigation of cyberattacks employing an advanced cyber decision platform comprising a time series data store, a directed computational graph module, an action outcome simulation module, and observation and state estimation module, wherein the state of a network is monitored and used to produce a cyber-physical graph representing network resources, simulated network events are produced and monitored, and the network events and their effects are analyzed to produce security recommendations.
PCT/US2018/049807 2015-10-28 2018-09-06 Advanced cybersecurity threat mitigation for inter-bank financial transactions WO2019051131A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US15/696,367 US20180013771A1 (en) 2015-10-28 2017-09-06 Advanced cybersecurity threat mitigation for inter-bank financial transactions
US15/696,367 2017-09-06

Publications (2)

Publication Number Publication Date
WO2019051131A2 WO2019051131A2 (en) 2019-03-14
WO2019051131A3 true WO2019051131A3 (en) 2019-04-04

Family

ID=65635202

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/049807 WO2019051131A2 (en) 2015-10-28 2018-09-06 Advanced cybersecurity threat mitigation for inter-bank financial transactions

Country Status (1)

Country Link
WO (1) WO2019051131A2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130198840A1 (en) * 2012-01-31 2013-08-01 International Business Machines Corporation Systems, methods and computer programs providing impact mitigation of cyber-security failures
US8768838B1 (en) * 2005-02-02 2014-07-01 Nexus Payments, LLC Financial transactions using a rule-module nexus and a user account registry
US20150295948A1 (en) * 2012-10-23 2015-10-15 Suzanne P. Hassell Method and device for simulating network resiliance against attacks
US9225730B1 (en) * 2014-03-19 2015-12-29 Amazon Technologies, Inc. Graph based detection of anomalous activity

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8768838B1 (en) * 2005-02-02 2014-07-01 Nexus Payments, LLC Financial transactions using a rule-module nexus and a user account registry
US20130198840A1 (en) * 2012-01-31 2013-08-01 International Business Machines Corporation Systems, methods and computer programs providing impact mitigation of cyber-security failures
US20150295948A1 (en) * 2012-10-23 2015-10-15 Suzanne P. Hassell Method and device for simulating network resiliance against attacks
US9225730B1 (en) * 2014-03-19 2015-12-29 Amazon Technologies, Inc. Graph based detection of anomalous activity

Also Published As

Publication number Publication date
WO2019051131A2 (en) 2019-03-14

Similar Documents

Publication Publication Date Title
Khorshed et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
TW201631574A (en) Multiplication operations in memory
Fielder et al. Decision support approaches for cyber security investment
MX2007015510A (en) Credit score simulation.
WO2008147874A3 (en) Event capture, cross device event correlation, and responsive actions
GB2541625A (en) Systems and techniques for predictive data analytics
WO2013113025A3 (en) Authenticating entities engaging in automated or electronic transactions or activities
MX2015004002A (en) Identifying fracture planes from microseismic data.
Voas Networks of ‘things’
Parinova et al. Analytical models of information-psychological impact of social information networks on users
Cousins et al. Reduced-order precursors of rare events in unidirectional nonlinear water waves
AR085160A1 (en) Method and system for improving the detection of security threats in communication networks
AlJahdali et al. Multi-tenancy in cloud computing
Sayin et al. Compressive diffusion strategies over distributed networks for reduced communication load
WO2016199127A3 (en) Predicting and preventing an attacker's next actions in a breached network
Hausken et al. The timing and deterrence of terrorist attacks due to exogenous dynamics
Hlavacs et al. Energy consumption side-channel attack at virtual machines in a cloud
Kulawiak et al. SafeCity—A GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
Onyeji et al. Cyber security and critical energy infrastructure
TW201334475A (en) Transmitting method, receiving method, transmitter and receiver
WO2014108835A3 (en) A method for providing security using secure computation
Li et al. A neural network based distributed intrusion detection system on cloud platform
Wang et al. Modeling network diversity for evaluating the robustness of networks against zero-day attacks
WO2014200669A3 (en) Determining well parameters for optimization of well performance
Zhang et al. A game theoretic model for defending against stealthy attacks with limited resources

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18852934

Country of ref document: EP

Kind code of ref document: A2