scispace - formally typeset
Patent

Anonymized network data collection and network threat assessment and monitoring systems and methods

TLDR
In this paper, the authors present a system for data collection and processing in a network, including one or more sensors disposed in the network interface and configured to collect raw signal traffic data where each sensor is further configured to parse the raw signal data into network protocols; split the network protocols into content data and metadata; derive contextual metadata from the content data; compile the metadata and the derived metadata to produce anonymized metadata; encrypt the anonymised metadata; and transmit to the encrypted anonymizedmetadata to a unified data server.
Abstract
Systems and methods for data collection and processing in a network, including one or more sensors disposed in a network interface and configured to collect raw signal traffic data where each sensor is further configured to parse the raw signal traffic data into network protocols; split the network protocols into content data and metadata; derive contextual metadata from the content data; compile the metadata and the derived metadata to produce anonymized metadata; encrypt the anonymized metadata; and transmit to the encrypted anonymized metadata to a unified data server.

read more

Citations
More filters
Patent

Detection of security incidents with low confidence security events

TL;DR: In this paper, a security management server aggregates a collection of security events received from logs from one or more devices and reports the occurrence of the security incident to an analyst based on a confidence score assigned to each distinct type of security event.
Patent

System and method for visualizing and analyzing cyber-attacks using a graph model

TL;DR: In this article, a system and method for implementing a graph database to analyze and monitor a status of an enterprise computer network is provided, where a plurality of sensors can be inputted into sensor interface in which all of the data associated with the sensors in converted into a common data format.
Patent

Detecting security threats in a local network

TL;DR: In this paper, a security analytics system for detecting security threats in a local network is presented, which collects data about entities in the local network and determines a set of properties about each of the identified entities.
Patent

Cognitive offense analysis using contextual data and knowledge graphs

TL;DR: In this article, an automated method for processing security events in association with a cybersecurity knowledge graph is presented, where the method begins upon receiving information from a security system representing an offense and builds an initial context graph based on context data about the offense.
Patent

Cognitive offense analysis using enriched graphs

TL;DR: In this paper, an automated method for processing security events is proposed, based on context data extracted from the offensive context graph, which is built by mining information about other events that are determined to share a local contextual relationship with the offense represented by the offense context graph.
References
More filters
Patent

Secure online distributed data storage services

TL;DR: The data vaporizer as mentioned in this paper provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud, and is configurable for different domain requirements including data privacy and anonymization requirements, encryption mechanisms, regulatory compliance of storage locations and backup and recovery constraints.
Patent

Assessment and analysis of software security flaws

TL;DR: In this article, security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis.
Patent

Entity Group Behavior Profiling

Jisheng Wang
TL;DR: In this paper, an entity group is created that includes multiple entities, where each entity represents one of a user, a machine, and a service and a behavior profile is created for each one of the entities of the entity group.
Patent

Applications of a Network-Centric Information Distribution Platform on the Internet

TL;DR: In this paper, the authors use the http header in an http get request as a distribution mechanism of anonymized and unique metadata between the user and the web server, and then for the Web server to interrogate an information storage system hosted in the cloud or in a server to get real-time information, classification, categorization of that device in real time.
Patent

Mathematical method for performing homomorphic operations

TL;DR: In this paper, the authors present a method and system for querying an anonymized database without the need to decrypt queried data while it's being processed, while still retaining the ability to not decrypt requested data.