会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHODS, SYSTEMS, AND MEDIA FOR MASQUERADE ATTACK DETECTION BY MONITORING COMPUTER USER BEHAVIOR
    • 监控计算机用户行为的MASTERERADE攻击检测方法,系统和媒体
    • US20160065614A1
    • 2016-03-03
    • US14272099
    • 2014-05-07
    • The Trustees of Columbia University in the City of New York
    • Salvatore J. StolfoMalek Ben SalemShlomo Hershkop
    • H04L29/06
    • H04L63/1416G06F21/50G06F21/55G06F21/552G06F21/554G06F21/566H04L29/06884H04L29/06897H04L63/1408H04L63/1425H04L63/1491
    • Methods, systems, and media for masquerade attack detection by monitoring computer user behavior are provided. In accordance with some embodiments, a method for detecting masquerade attacks is provided, the method comprising: monitoring, using a hardware processor, a first plurality of user actions in a computing environment; generating a user intent model based on the first plurality of user actions; monitoring a second plurality of user actions in the computing environment; determining whether at least one of the second plurality of user actions deviates from the generated user intent model; determining whether the second plurality of user actions include performing an action on a file in the computing environment that contains decoy information in response to determining that at least one of the second plurality of user actions deviates from the generated user intent model; and generating an alert in response to determining that the second plurality of user actions include performing an action on a file in the computing environment that contains decoy information.
    • 提供了通过监控计算机用户行为进行伪装攻击检测的方法,系统和媒体。 根据一些实施例,提供了一种用于检测伪装攻击的方法,所述方法包括:使用硬件处理器监视计算环境中的第一多个用户动作; 基于所述第一多个用户动作生成用户意图模型; 在所述计算环境中监视第二多个用户动作; 确定所述第二多个用户动作中的至少一个是否偏离所生成的用户意图模型; 确定所述第二多个用户动作是否包括响应于确定所述第二多个用户动作中的至少一个偏离所生成的用户意图模型而对包含诱饵信息的所述计算环境中的文件执行动作; 以及响应于确定所述第二多个用户动作包括对包含诱饵信息的所述计算环境中的文件执行动作来生成警报。
    • 5. 发明授权
    • Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
    • 通过监控计算机用户行为进行伪装攻击检测的方法,系统和媒体
    • US09311476B2
    • 2016-04-12
    • US14272099
    • 2014-05-07
    • The Trustees of Columbia University in the City of New York
    • Salvatore J. StolfoMalek Ben SalemShlomo Hershkop
    • G06F21/00G06F21/55H04L29/06G06F21/50G06F21/56
    • H04L63/1416G06F21/50G06F21/55G06F21/552G06F21/554G06F21/566H04L29/06884H04L29/06897H04L63/1408H04L63/1425H04L63/1491
    • Methods, systems, and media for masquerade attack detection by monitoring computer user behavior are provided. In accordance with some embodiments, a method for detecting masquerade attacks is provided, the method comprising: monitoring, using a hardware processor, a first plurality of user actions in a computing environment; generating a user intent model based on the first plurality of user actions; monitoring a second plurality of user actions in the computing environment; determining whether at least one of the second plurality of user actions deviates from the generated user intent model; determining whether the second plurality of user actions include performing an action on a file in the computing environment that contains decoy information in response to determining that at least one of the second plurality of user actions deviates from the generated user intent model; and generating an alert in response to determining that the second plurality of user actions include performing an action on a file in the computing environment that contains decoy information.
    • 提供了通过监控计算机用户行为进行伪装攻击检测的方法,系统和媒体。 根据一些实施例,提供了一种用于检测伪装攻击的方法,所述方法包括:使用硬件处理器监视计算环境中的第一多个用户动作; 基于所述第一多个用户动作生成用户意图模型; 在所述计算环境中监视第二多个用户动作; 确定所述第二多个用户动作中的至少一个是否偏离所生成的用户意图模型; 确定所述第二多个用户动作是否包括响应于确定所述第二多个用户动作中的至少一个偏离所生成的用户意图模型而对包含诱饵信息的所述计算环境中的文件执行动作; 以及响应于确定所述第二多个用户动作包括对包含诱饵信息的所述计算环境中的文件执行动作来生成警报。