GRAPH-BASED ATTACK CHAIN DISCOVERY IN ENTERPRISE SECURITY SYSTEMS
    13.
    发明申请
    GRAPH-BASED ATTACK CHAIN DISCOVERY IN ENTERPRISE SECURITY SYSTEMS 审中-公开
    企业安全系统中基于图形的攻击链发现

    公开(公告)号:WO2018071356A1

    公开(公告)日:2018-04-19

    申请号:PCT/US2017/055826

    申请日:2017-10-10

    CPC classification number: G06F21/554 G06F21/55 G06F21/60

    Abstract: Methods and systems for detecting anomalous events include detecting anomalous events (42, 43) in monitored system data. An event correlation graph is generated (302) based on the monitored system data that characterizes the tendency of processes to access system targets. Kill chains are generated (310) that connect malicious events over a span of time from the event correlation graph that characterize events in an attack path over time by sorting events according to a maliciousness value and determining at least one sub-graph within the event correlation graph with an above-threshold maliciousness rank. A security management action is performed (412) based on the kill chains.

    Abstract translation: 用于检测异常事件的方法和系统包括检测所监视的系统数据中的异常事件(42,43)。 基于监视的系统数据生成(302)事件关联图,表征过程访问系统目标的倾向。 通过根据恶意值对事件进行排序并确定事件相关内的至少一个子图,产生(310)从事件关联图中连接恶意事件的杀死链(310),所述事件关联图随时间表征攻击路径中的事件 图表具有高于阈值的恶意级别。 基于杀链来执行安全管理操作(412)。

    CONSTRUCTING GRAPH MODELS OF EVENT CORRELATION IN ENTERPRISE SECURITY SYSTEMS
    14.
    发明申请
    CONSTRUCTING GRAPH MODELS OF EVENT CORRELATION IN ENTERPRISE SECURITY SYSTEMS 审中-公开
    企业安全系统中事件相关性的图形模型构建

    公开(公告)号:WO2018071355A1

    公开(公告)日:2018-04-19

    申请号:PCT/US2017/055825

    申请日:2017-10-10

    CPC classification number: G06F21/552 G06F21/554

    Abstract: Methods and systems for detecting anomalous events include detecting anomalous events (42,43) in monitored system data. An event correlation graph is generated (302) by determining a tendency for a first process to access a system target, include an innate tendency of the first process to access the system target, an influence of previous events from the first process, and an influence of processes other than the first process. Kill chains are generated (310) from the event correlation graph that characterize events in an attack path over time. A security management action is performed (412) based on the kill chains.

    Abstract translation: 用于检测异常事件的方法和系统包括检测监测到的系统数据中的异常事件(42,43)。 通过确定第一过程访问系统目标的趋势,包括第一过程访问系统目标的先天趋势,来自第一过程的先前事件的影响以及影响第一过程的影响来生成事件相关图(302) 除第一个过程以外的过程。 从事件关联图生成(310)杀死链,表征攻击路径随时间的事件。 基于杀链来执行安全管理操作(412)。

    PROTOCOL-INDEPENDENT ANOMALY DETECTION
    16.
    发明申请

    公开(公告)号:WO2020036850A1

    公开(公告)日:2020-02-20

    申请号:PCT/US2019/046112

    申请日:2019-08-12

    Abstract: A computer-implemented method for implementing protocol-independent anomaly detection within an industrial control system (ICS) includes implementing a detection stage (1400), including performing byte filtering using a byte filtering model based on at least one new network packet associated with the ICS (1430), performing horizontal detection to determine whether a horizontal constraint anomaly exists in the at least one network packet based on the byte filtering and a horizontal model (1440), including analyzing constraints across different bytes of the at least one new network packet, performing message clustering based on the horizontal detection to generate first cluster information (1450), and performing vertical detection to determine whether a vertical anomaly exists based on the first cluster information and a vertical model (1460), including analyzing a temporal pattern of each byte of the at least one new network packet.

    A GRAPH MODEL FOR ALERT INTERPRETATION IN ENTERPRISE SECURITY SYSTEM

    公开(公告)号:WO2019084072A1

    公开(公告)日:2019-05-02

    申请号:PCT/US2018/057198

    申请日:2018-10-24

    Abstract: A computer-implemented method for implementing alert interpretation in enterprise security systems is presented. The computer-implemented method includes employing a plurality of sensors to monitor streaming data from a plurality of computing devices, generating alerts based on the monitored streaming data, automatically analyzing the alerts, in real-time, by using a graph-based alert interpretation engine employing process-star graph models, retrieving a cause of the alerts, an aftermath of the alerts, and baselines for the alert interpretation, and integrating the cause of the alerts, the aftermath of the alerts, and the baselines to output an alert interpretation graph to a user interface of a user device.

    AUTOMATED SOFTWARE SAFENESS CATEGORIZATION WITH INSTALLATION LINEAGE AND HYBRID INFORMATION SOURCES

    公开(公告)号:WO2019032277A1

    公开(公告)日:2019-02-14

    申请号:PCT/US2018/043405

    申请日:2018-07-24

    Abstract: Systems and methods are disclosed for enhancing cybersecurity in a computer system by detecting safeness levels of executables. An installation lineage of an executable is identified in which entities forming the installation lineage include at least an installer of the monitored executable, and a network address from which the executable is retrieved. Each entity of the entities forming the installation lineage is individually analyzed using at least one safeness analysis. Results of the at least one safeness analysis of each entity are inherited by other entities in the lineage of the executable. A backtrace result for the executable is determined based on the inherited safeness evaluation of the executable. A total safeness of the executable, based on at least the backtrace result, is evaluated against a set of thresholds to detect a safeness level of the executable. The safeness level of the executable is output on a display screen.

    TIMELY CAUSALITY ANALYSIS IN HOMEGENEOUS ENTERPRISE HOSTS

    公开(公告)号:WO2018213061A2

    公开(公告)日:2018-11-22

    申请号:PCT/US2018/031559

    申请日:2018-05-08

    CPC classification number: G06F21/554 G06F2221/034

    Abstract: A method and system are provided for causality analysis of Operating System-level (OS-level) events in heterogeneous enterprise hosts. The method includes storing (720F), by the processor, the OS-level events in a priority queue in a prioritized order based on priority scores determined from event rareness scores and event fanout scores for the OS-level events. The method includes processing (720G), by the processor, the OS-level events stored in the priority queue in the prioritized order to provide a set of potentially anomalous ones of the OS-level events within a set amount of time. The method includes generating (720G), by the processor, a dependency graph showing causal dependencies of at least the set of potentially anomalous ones of the OS-level events, based on results of the causality dependency analysis. The method includes initiating (730), by the processor, an action to improve a functioning of the hosts responsive to the dependency graph or information derived therefrom.

    BLUE PRINT GRAPHS FOR FUSING OF HETEROGENEOUS ALERTS
    20.
    发明申请
    BLUE PRINT GRAPHS FOR FUSING OF HETEROGENEOUS ALERTS 审中-公开
    用于融合非均匀报警的蓝色图表

    公开(公告)号:WO2017176673A1

    公开(公告)日:2017-10-12

    申请号:PCT/US2017/025843

    申请日:2017-04-04

    Abstract: Methods and systems for reporting anomalous events include building a process graph that models states of process-level events in a network. A topology graph is built that models source and destination relationships between connection events in the network. A set of alerts is clustered based on the process graph and the topology graph. Clustered alerts that exceed a threshold level of trustworthiness are reported.

    Abstract translation: 用于报告异常事件的方法和系统包括构建对网络中的过程级事件的状态建模的过程图。 建立一个拓扑图,模拟网络中连接事件之间的源和目标关系。 基于过程图和拓扑图来聚集一组警报。 报告超过可信赖阈值级别的群集警报。

Patent Agency Ranking