会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SYSTEMS AND METHODS FOR DETECTING SECURITY THREATS
    • 用于检测安全威胁的系统和方法
    • WO2017171954A1
    • 2017-10-05
    • PCT/US2016/069027
    • 2016-12-28
    • SYMANTEC CORPORATION
    • ROUNDY, Kevin AlejandroHART, MichaelGATES, Christopher
    • H04L29/06G06F21/55
    • The disclosed computer-implemented method for detecting security threats may include (1) detecting, by a software security program, a security incident at a client device such that the software security program generates a signature report to identify the security incident, (2) querying an association database with the signature report to deduce another signature report that a different software security program would have predictably generated at the client device, the different software security program having been unavailable at the client device at a time of detecting the security incident, and (3) performing at least one protective action to protect the client device from a security threat associated with the security incident based on the other signature report deduced by querying the association database. Various other methods, systems, and computer-readable media are also disclosed.
    • 所公开的用于检测安全威胁的计算机实现的方法可以包括(1)由软件安全程序检测客户端设备处的安全事件,使得软件安全程序生成签名报告以识别 (2)用签名报告查询关联数据库以推导出另一个签名报告,即另一个软件安全程序将在客户端设备处预测地产生,不同的软件安全程序一次在客户端设备处不可用 (3)基于通过查询关联数据库推导出的另一个签名报告来执行至少一个保护动作以保护客户端设备免受与安全事件相关联的安全威胁。 还公开了各种其他方法,系统和计算机可读介质。
    • 2. 发明申请
    • DETECTION OF SECURITY INCIDENTS WITH LOW CONFIDENCE SECURITY EVENTS
    • 检测安全事故低安全事件
    • WO2017058313A1
    • 2017-04-06
    • PCT/US2016/038499
    • 2016-06-21
    • SYMANTEC CORPORATION
    • ROUNDY, Kevin AlejandroSPERTUS, Michael
    • G06F21/55H04L29/06H04L12/24
    • H04L63/1433G06F21/552G06F21/554H04L41/0604H04L63/1416H04L63/1425
    • Techniques are disclosed for detecting security incidents based on low confidence security events. A security management server aggregates a collection of security events received from logs from one or more devices. The security management server evaluates the collection of security events based on a confidence score assigned to each distinct type of security event. Each confidence score indicates a likelihood that a security incident has occurred. The security management server determines, based on the confidence scores, at least one threshold for determining when to report an occurrence of a security incident from the collection of security events. Upon determining that at least one security event of the collection has crossed the at least one threshold, the security management server reports the occurrence of the security incident to an analyst.
    • 公开了基于低置信度安全事件来检测安全事件的技术。 安全管理服务器聚合从一个或多个设备的日志接收的一组安全事件。 安全管理服务器根据分配给每个不同类型的安全事件的置信度评估安全事件的收集。 每个置信度分数都表明发生安全事件的可能性。 安全管理服务器基于置信度得分确定至少一个阈值,用于确定何时从安全事件的收集中报告安全事件的发生。 在确定所述集合的至少一个安全事件已经超过所述至少一个阈值时,所述安全管理服务器向所述分析者报告所述安全事件的发生。
    • 3. 发明申请
    • SYSTEMS AND METHODS FOR CLASSIFYING SECURITY EVENTS AS TARGETED ATTACKS
    • 将安全事件分类为有针对性的攻击的系统和方法
    • WO2016061038A1
    • 2016-04-21
    • PCT/US2015/055228
    • 2015-10-13
    • SYMANTEC CORPORATION
    • ROUNDY, Kevin AlejandroBHATKAR, Sandeep
    • G06F21/55
    • G06F21/554G06F21/55H04L63/1416
    • The disclosed computer-implemented method for classifying security events as targeted attacks may include (1) detecting a security event in connection with at least one organization, (2) comparing the security event against a targeted-attack taxonomy that identifies a plurality of characteristics of targeted attacks, (3) determining that the security event is likely targeting the organization based at least in part on comparing the security event against the targeted-attack taxonomy, and then in response to determining that the security event is likely targeting the organization, (4) classifying the security event as a targeted attack. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于将安全事件分类为目标攻击的公开的计算机实现的方法可以包括(1)检测与至少一个组织有关的安全事件,(2)将安全事件与标识多个特征的目标攻击分类法进行比较 (3)至少部分地基于将安全事件与目标攻击分类法进行比较,确定安全事件可能针对组织,然后响应于确定安全事件可能针对组织(( 4)将安全事件分类为有针对性的攻击。 还公开了各种其它方法,系统和计算机可读介质。