会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Detecting advanced persistent threats
    • 检测高级持续威胁
    • US08904531B1
    • 2014-12-02
    • US13172979
    • 2011-06-30
    • Samir D. SaklikarAditya KuppaDennis Ray MoreauRiaz Zolfonoon
    • Samir D. SaklikarAditya KuppaDennis Ray MoreauRiaz Zolfonoon
    • G06F12/14
    • G06F21/552H04L63/1416
    • Techniques are provided for detecting the source of an APT-based leaked document by iteratively or recursively evaluating a set of network security logs (e.g., SIEM logs and FPC logs) for events consistent with APT behavior according to a set of heuristics to generate a reduced set of security events for consideration by the CIRT. A method of detecting an APT attack on an enterprise system is provided. The method includes (a) receiving, in a computerized device, an indication that a document has been leaked outside the enterprise system, (b) evaluating a log of security events of the enterprise system using a set of heuristics to produce a reduced set of events potentially relevant to the APT attack, and (c) outputting the reduced set of events over a user interface for consideration by a security analysis team. A system and computer program product for performing this method are also provided.
    • 提供了用于通过根据一组启发式反复地或递归地评估一组网络安全日志(例如,SIEM日志和FPC日志)以用于与APT行为一致的事件来产生减少的基于APT的泄露文档的源的技术 一套安全事件供CIRT考虑。 提供了一种检测企业系统上APT攻击的方法。 该方法包括(a)在计算机化的设备中接收文档已经泄漏到企业系统之外的指示,(b)使用一组启发式方法来评估企业系统的安全事件的日志,以产生一组减少的 与APT攻击有潜在关联的事件,(c)通过用户界面输出减少的事件集,供安全分析小组考虑。 还提供了用于执行该方法的系统和计算机程序产品。