会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明专利
    • EVENT CORRELATION ACROSS HETEROGENEOUS OPERATIONS
    • AU2017204666A1
    • 2017-07-27
    • AU2017204666
    • 2017-07-07
    • ACCENTURE GLOBAL SERVICES LTD
    • HASSANZADEH AMINMODI SHIMONMULCHANDANI SHAANNEGM WALID
    • G06F21/00G06F11/32H04L12/22
    • A computer-implemented method when used to detect potential attack paths in two or more network domains, the method being executed by one or more processors and including receiving a data structure that represents communication events, including events identified by one or more sensors, between computing devices of the two or more network domains, wherein the data structure is a directed graph stored in a graph database, analyzing the data structure and determining a set of potential attack paths represented in the data structure, each potential attack path being based on the communication events between computing devices and including a respective sequence of computing devices proceeding from an originating computing device to a destination computing device, wherein the originating computing device and the destination computing device of at least one potential attack path exist on different network domains, assigning a score to each potential attack path in the set of potential attack paths, based on the computing devices included in the potential attack path, communication events between the computing devices, or both, removing potential attack paths from the set of potential attack paths that have scores that do not meet a predetermined threshold, ranking potential attack paths that remain in the set of potential attack paths, based on each score assigned to each potential attack path, determining one or more threat scenarios using the data structure that includes a ranked set of potential attack paths, analyzing the threat scenarios to generate data associated with one or more courses of action relevant to each threat scenario, and implementing one or more courses of action using the generated data, the courses of action including any one or more of closing ports on one or more of the computing devices, blocking communications that originate from particular internet protocol addresses, and shutting down one or more of the computing devices. co w o Co c =I- o (00 U)= U, C.)> C/) co C6 ) co U)) C/)