System and method for utilization of threat data for network security
Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and proc...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Brecl, Peter Dubois, David Dehus, Mark Benjamin, Michael |
description | Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US12015644B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US12015644B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US12015644B23</originalsourceid><addsrcrecordid>eNrjZHANriwuSc1VSMxLUchNLcnIT1FIyy9SKC3JzMmsSizJzM9TyE9TKMkoSk0sUUhJLEkES-ellpTnF2UrFKcmlxZlllTyMLCmJeYUp_JCaW4GRTfXEGcP3dSC_PjU4oLE5FSglvjQYEMjA0NTMxMTJyNjYtQAAAm3M4o</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>System and method for utilization of threat data for network security</title><source>esp@cenet</source><creator>Brecl, Peter ; Dubois, David ; Dehus, Mark ; Benjamin, Michael</creator><creatorcontrib>Brecl, Peter ; Dubois, David ; Dehus, Mark ; Benjamin, Michael</creatorcontrib><description>Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.</description><language>eng</language><subject>ALARM SYSTEMS ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; ORDER TELEGRAPHS ; PHYSICS ; SIGNALLING ; SIGNALLING OR CALLING SYSTEMS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240618&DB=EPODOC&CC=US&NR=12015644B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240618&DB=EPODOC&CC=US&NR=12015644B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Brecl, Peter</creatorcontrib><creatorcontrib>Dubois, David</creatorcontrib><creatorcontrib>Dehus, Mark</creatorcontrib><creatorcontrib>Benjamin, Michael</creatorcontrib><title>System and method for utilization of threat data for network security</title><description>Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.</description><subject>ALARM SYSTEMS</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>ORDER TELEGRAPHS</subject><subject>PHYSICS</subject><subject>SIGNALLING</subject><subject>SIGNALLING OR CALLING SYSTEMS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHANriwuSc1VSMxLUchNLcnIT1FIyy9SKC3JzMmsSizJzM9TyE9TKMkoSk0sUUhJLEkES-ellpTnF2UrFKcmlxZlllTyMLCmJeYUp_JCaW4GRTfXEGcP3dSC_PjU4oLE5FSglvjQYEMjA0NTMxMTJyNjYtQAAAm3M4o</recordid><startdate>20240618</startdate><enddate>20240618</enddate><creator>Brecl, Peter</creator><creator>Dubois, David</creator><creator>Dehus, Mark</creator><creator>Benjamin, Michael</creator><scope>EVB</scope></search><sort><creationdate>20240618</creationdate><title>System and method for utilization of threat data for network security</title><author>Brecl, Peter ; Dubois, David ; Dehus, Mark ; Benjamin, Michael</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US12015644B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>ALARM SYSTEMS</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>ORDER TELEGRAPHS</topic><topic>PHYSICS</topic><topic>SIGNALLING</topic><topic>SIGNALLING OR CALLING SYSTEMS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Brecl, Peter</creatorcontrib><creatorcontrib>Dubois, David</creatorcontrib><creatorcontrib>Dehus, Mark</creatorcontrib><creatorcontrib>Benjamin, Michael</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Brecl, Peter</au><au>Dubois, David</au><au>Dehus, Mark</au><au>Benjamin, Michael</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>System and method for utilization of threat data for network security</title><date>2024-06-18</date><risdate>2024</risdate><abstract>Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US12015644B2 |
source | esp@cenet |
subjects | ALARM SYSTEMS ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY ORDER TELEGRAPHS PHYSICS SIGNALLING SIGNALLING OR CALLING SYSTEMS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | System and method for utilization of threat data for network security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T21%3A04%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Brecl,%20Peter&rft.date=2024-06-18&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS12015644B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |