会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明申请
    • SYSTEMS AND METHODS FOR CLASSIFYING SECURITY EVENTS AS TARGETED ATTACKS
    • 将安全事件分类为有针对性的攻击的系统和方法
    • US20160103992A1
    • 2016-04-14
    • US14513804
    • 2014-10-14
    • Symantec Corporation
    • Kevin Alejandro RoundySandeep Bhatkar
    • G06F21/55H04L29/06
    • G06F21/554G06F21/55H04L63/1416
    • The disclosed computer-implemented method for classifying security events as targeted attacks may include (1) detecting a security event in connection with at least one organization, (2) comparing the security event against a targeted-attack taxonomy that identifies a plurality of characteristics of targeted attacks, (3) determining that the security event is likely targeting the organization based at least in part on comparing the security event against the targeted-attack taxonomy, and then in response to determining that the security event is likely targeting the organization, (4) classifying the security event as a targeted attack. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于将安全事件分类为目标攻击的公开的计算机实现的方法可以包括(1)检测与至少一个组织有关的安全事件,(2)将安全事件与标识多个特征的目标攻击分类法进行比较 (3)至少部分地基于将安全事件与目标攻击分类法进行比较来确定安全事件可能针对组织,然后响应于确定安全事件可能针对组织(( 4)将安全事件分类为有针对性的攻击。 还公开了各种其它方法,系统和计算机可读介质。
    • 9. 发明授权
    • Systems and methods for using event-correlation graphs to generate remediation procedures
    • 使用事件关联图生成修复程序的系统和方法
    • US09256739B1
    • 2016-02-09
    • US14221703
    • 2014-03-21
    • Symantec Corporation
    • Kevin Alejandro RoundySandeep Bhatkar
    • G06F21/55H04L29/06G06F21/56H04L12/24G06F21/54
    • G06F21/554G06F21/54G06F21/552G06F21/566H04L41/0631H04L63/1425
    • A computer-implemented method for using event-correlation graphs to generate remediation procedures may include (1) detecting a suspicious event involving a first actor within a computing system, (2) constructing, in response to detecting the suspicious event involving the first actor, an event-correlation graph that includes (i) a first node that represents the first actor, (ii) a second node that represents a second actor, and (iii) an edge that interconnects the first node and the second node and represents an additional suspicious event involving the first actor and the second actor, and (3) using the event-correlation graph to generate a procedure for remediating an effect of an attack on the computing system that is reflected in the event-correlation graph. Various other methods, systems, and computer-readable media are also disclosed.
    • 一种用于使用事件相关图来产生修复过程的计算机实现的方法可以包括:(1)检测涉及计算系统内的第一actor的可疑事件,(2)响应于检测到涉及第一actor的可疑事件, 事件相关图,其包括(i)表示第一演员的第一节点,(ii)表示第二演员的第二节点,以及(iii)将第一节点和第二节点互连并表示附加的边缘 涉及第一演员和第二演员的可疑事件,以及(3)使用事件相关图来生成反映在事件相关图中的针对计算系统的攻击的影响的过程。 还公开了各种其它方法,系统和计算机可读介质。