Patent
Anonymized network data collection and network threat assessment and monitoring systems and methods
William Peteroy,Josh Carlson +1 more
TLDR
In this paper, the authors present a system for data collection and processing in a network, including one or more sensors disposed in the network interface and configured to collect raw signal traffic data where each sensor is further configured to parse the raw signal data into network protocols; split the network protocols into content data and metadata; derive contextual metadata from the content data; compile the metadata and the derived metadata to produce anonymized metadata; encrypt the anonymised metadata; and transmit to the encrypted anonymizedmetadata to a unified data server.Abstract:
Systems and methods for data collection and processing in a network, including one or more sensors disposed in a network interface and configured to collect raw signal traffic data where each sensor is further configured to parse the raw signal traffic data into network protocols; split the network protocols into content data and metadata; derive contextual metadata from the content data; compile the metadata and the derived metadata to produce anonymized metadata; encrypt the anonymized metadata; and transmit to the encrypted anonymized metadata to a unified data server.read more
Citations
More filters
Patent
Detection of security incidents with low confidence security events
Kevin Roundy,Michael Spertus +1 more
TL;DR: In this paper, a security management server aggregates a collection of security events received from logs from one or more devices and reports the occurrence of the security incident to an analyst based on a confidence score assigned to each distinct type of security event.
Patent
System and method for visualizing and analyzing cyber-attacks using a graph model
TL;DR: In this article, a system and method for implementing a graph database to analyze and monitor a status of an enterprise computer network is provided, where a plurality of sensors can be inputted into sensor interface in which all of the data associated with the sensors in converted into a common data format.
Patent
Detecting security threats in a local network
TL;DR: In this paper, a security analytics system for detecting security threats in a local network is presented, which collects data about entities in the local network and determines a set of properties about each of the identified entities.
Patent
Cognitive offense analysis using contextual data and knowledge graphs
William A. Bird,Suzanne C. Deffeyes,Jiyong Jang,Kirat Dhilung Hang,Youngja Park,Josyula R. Rao,Stoecklin Marc Philippe +6 more
TL;DR: In this article, an automated method for processing security events in association with a cybersecurity knowledge graph is presented, where the method begins upon receiving information from a security system representing an offense and builds an initial context graph based on context data about the offense.
Patent
Cognitive offense analysis using enriched graphs
TL;DR: In this paper, an automated method for processing security events is proposed, based on context data extracted from the offensive context graph, which is built by mining information about other events that are determined to share a local contextual relationship with the offense represented by the offense context graph.
References
More filters
Patent
Secure online distributed data storage services
Sanjoy Paul,Shubhashis Sengupta,Annervaz Karukapadath Mohamedrasheed,Amitabh Saxena,Vikrant Kaulgud +4 more
TL;DR: The data vaporizer as mentioned in this paper provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud, and is configurable for different domain requirements including data privacy and anonymization requirements, encryption mechanisms, regulatory compliance of storage locations and backup and recovery constraints.
Patent
Assessment and analysis of software security flaws
Malcolm Wright Lockhart,Chris Wysopal,Christopher James Eng,Matthew Patrick Moynahan,Simeon Simeonov +4 more
TL;DR: In this article, security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis.
Patent
Entity Group Behavior Profiling
TL;DR: In this paper, an entity group is created that includes multiple entities, where each entity represents one of a user, a machine, and a service and a behavior profile is created for each one of the entities of the entity group.
Patent
Applications of a Network-Centric Information Distribution Platform on the Internet
TL;DR: In this paper, the authors use the http header in an http get request as a distribution mechanism of anonymized and unique metadata between the user and the web server, and then for the Web server to interrogate an information storage system hosted in the cloud or in a server to get real-time information, classification, categorization of that device in real time.
Patent
Mathematical method for performing homomorphic operations
Stanley Trepetin,Mark Reston +1 more
TL;DR: In this paper, the authors present a method and system for querying an anonymized database without the need to decrypt queried data while it's being processed, while still retaining the ability to not decrypt requested data.