METHOD, PRODUCT, AND SYSTEM FOR GENERATING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA OF A COMPUTER NETWORK FOR USE IN SECURITY MANAGEMENT
Disclosed is an approach for generating a software representation that embodies network configuration and policy data of a computer network for use in security management. The software representation comprises a state machine where different states can be reached using respective transitions or prop...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Beauchesne, Nicolas Lynn, Karl Matthew Finlayson IV, William Stow Kazerounian, Sohrob |
description | Disclosed is an approach for generating a software representation that embodies network configuration and policy data of a computer network for use in security management. The software representation comprises a state machine where different states can be reached using respective transitions or properties which are possible as determined based on the network configuration and network policy data. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection. The software representation can then be stimulated with various inputs to identify sequences of state-to-state transitions which may in turn be processed to generate corresponding detection signatures for use in monitoring the network. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP4254869A2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP4254869A2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP4254869A23</originalsourceid><addsrcrecordid>eNqNjbFOAzEQRK-hQMA_zAeEJgQE5WKv7yyw11qvFV0VRchUCCKF3-IfuQhETTXFzLx3Pnwltkn8CkXFN2crUPaoczVOCKIYObOSxTyCUCXYlpShXJQrZ1saybCJDJwexUeuyGxb0Sc4ySGOTX82J26R5-hmeDKChAXoJJVmrH-fk7JVRsyo7JpGm5Eo08hpsV0OZ6_7t2O_-s2LAYHNTdf98LHrx8P-pb_3zx2Xzfp2c3_3QOubf0y-AY91SE0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>METHOD, PRODUCT, AND SYSTEM FOR GENERATING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA OF A COMPUTER NETWORK FOR USE IN SECURITY MANAGEMENT</title><source>esp@cenet</source><creator>Beauchesne, Nicolas ; Lynn, Karl Matthew ; Finlayson IV, William Stow ; Kazerounian, Sohrob</creator><creatorcontrib>Beauchesne, Nicolas ; Lynn, Karl Matthew ; Finlayson IV, William Stow ; Kazerounian, Sohrob</creatorcontrib><description>Disclosed is an approach for generating a software representation that embodies network configuration and policy data of a computer network for use in security management. The software representation comprises a state machine where different states can be reached using respective transitions or properties which are possible as determined based on the network configuration and network policy data. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection. The software representation can then be stimulated with various inputs to identify sequences of state-to-state transitions which may in turn be processed to generate corresponding detection signatures for use in monitoring the network.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20231004&DB=EPODOC&CC=EP&NR=4254869A2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20231004&DB=EPODOC&CC=EP&NR=4254869A2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Beauchesne, Nicolas</creatorcontrib><creatorcontrib>Lynn, Karl Matthew</creatorcontrib><creatorcontrib>Finlayson IV, William Stow</creatorcontrib><creatorcontrib>Kazerounian, Sohrob</creatorcontrib><title>METHOD, PRODUCT, AND SYSTEM FOR GENERATING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA OF A COMPUTER NETWORK FOR USE IN SECURITY MANAGEMENT</title><description>Disclosed is an approach for generating a software representation that embodies network configuration and policy data of a computer network for use in security management. The software representation comprises a state machine where different states can be reached using respective transitions or properties which are possible as determined based on the network configuration and network policy data. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection. The software representation can then be stimulated with various inputs to identify sequences of state-to-state transitions which may in turn be processed to generate corresponding detection signatures for use in monitoring the network.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjbFOAzEQRK-hQMA_zAeEJgQE5WKv7yyw11qvFV0VRchUCCKF3-IfuQhETTXFzLx3Pnwltkn8CkXFN2crUPaoczVOCKIYObOSxTyCUCXYlpShXJQrZ1saybCJDJwexUeuyGxb0Sc4ySGOTX82J26R5-hmeDKChAXoJJVmrH-fk7JVRsyo7JpGm5Eo08hpsV0OZ6_7t2O_-s2LAYHNTdf98LHrx8P-pb_3zx2Xzfp2c3_3QOubf0y-AY91SE0</recordid><startdate>20231004</startdate><enddate>20231004</enddate><creator>Beauchesne, Nicolas</creator><creator>Lynn, Karl Matthew</creator><creator>Finlayson IV, William Stow</creator><creator>Kazerounian, Sohrob</creator><scope>EVB</scope></search><sort><creationdate>20231004</creationdate><title>METHOD, PRODUCT, AND SYSTEM FOR GENERATING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA OF A COMPUTER NETWORK FOR USE IN SECURITY MANAGEMENT</title><author>Beauchesne, Nicolas ; Lynn, Karl Matthew ; Finlayson IV, William Stow ; Kazerounian, Sohrob</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP4254869A23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Beauchesne, Nicolas</creatorcontrib><creatorcontrib>Lynn, Karl Matthew</creatorcontrib><creatorcontrib>Finlayson IV, William Stow</creatorcontrib><creatorcontrib>Kazerounian, Sohrob</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Beauchesne, Nicolas</au><au>Lynn, Karl Matthew</au><au>Finlayson IV, William Stow</au><au>Kazerounian, Sohrob</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>METHOD, PRODUCT, AND SYSTEM FOR GENERATING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA OF A COMPUTER NETWORK FOR USE IN SECURITY MANAGEMENT</title><date>2023-10-04</date><risdate>2023</risdate><abstract>Disclosed is an approach for generating a software representation that embodies network configuration and policy data of a computer network for use in security management. The software representation comprises a state machine where different states can be reached using respective transitions or properties which are possible as determined based on the network configuration and network policy data. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection. The software representation can then be stimulated with various inputs to identify sequences of state-to-state transitions which may in turn be processed to generate corresponding detection signatures for use in monitoring the network.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre ; ger |
recordid | cdi_epo_espacenet_EP4254869A2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | METHOD, PRODUCT, AND SYSTEM FOR GENERATING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA OF A COMPUTER NETWORK FOR USE IN SECURITY MANAGEMENT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T00%3A38%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Beauchesne,%20Nicolas&rft.date=2023-10-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP4254869A2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |