PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK

A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Levin Hanan, Vingurt Olga, Kazaz Chen, Kubovsky Matan, Roubach Stephane, Sultan Sharon, Gareh Liad, Ben David Itai, Mischari Assaf, Israeli Ofer, Grimberg Israel, Ozer Adi, Avraham Itay, Cohen Cobby, Touboul Shlomo
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Levin Hanan
Vingurt Olga
Kazaz Chen
Kubovsky Matan
Roubach Stephane
Sultan Sharon
Gareh Liad
Ben David Itai
Mischari Assaf
Israeli Ofer
Grimberg Israel
Ozer Adi
Avraham Itay
Cohen Cobby
Touboul Shlomo
description A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in response to the predicting a target subnet.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2018020022A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2018020022A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2018020022A13</originalsourceid><addsrcrecordid>eNrjZPAKCHJ18XQO8fRzV3D0c1EAcsNc_aBcBceQEEdnb9cg9WAFP9eIEAVHoEJ_v2AFT6CUglOQq6Ozh6sLUCok3D_Im4eBNS0xpziVF0pzMyi7uYY4e-imFuTHpxYXJCan5qWWxIcGGxkYWhgYGRgYGTkaGhOnCgDosi3d</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK</title><source>esp@cenet</source><creator>Levin Hanan ; Vingurt Olga ; Kazaz Chen ; Kubovsky Matan ; Roubach Stephane ; Sultan Sharon ; Gareh Liad ; Ben David Itai ; Mischari Assaf ; Israeli Ofer ; Grimberg Israel ; Ozer Adi ; Avraham Itay ; Cohen Cobby ; Touboul Shlomo</creator><creatorcontrib>Levin Hanan ; Vingurt Olga ; Kazaz Chen ; Kubovsky Matan ; Roubach Stephane ; Sultan Sharon ; Gareh Liad ; Ben David Itai ; Mischari Assaf ; Israeli Ofer ; Grimberg Israel ; Ozer Adi ; Avraham Itay ; Cohen Cobby ; Touboul Shlomo</creatorcontrib><description>A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in response to the predicting a target subnet.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180118&amp;DB=EPODOC&amp;CC=US&amp;NR=2018020022A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180118&amp;DB=EPODOC&amp;CC=US&amp;NR=2018020022A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Levin Hanan</creatorcontrib><creatorcontrib>Vingurt Olga</creatorcontrib><creatorcontrib>Kazaz Chen</creatorcontrib><creatorcontrib>Kubovsky Matan</creatorcontrib><creatorcontrib>Roubach Stephane</creatorcontrib><creatorcontrib>Sultan Sharon</creatorcontrib><creatorcontrib>Gareh Liad</creatorcontrib><creatorcontrib>Ben David Itai</creatorcontrib><creatorcontrib>Mischari Assaf</creatorcontrib><creatorcontrib>Israeli Ofer</creatorcontrib><creatorcontrib>Grimberg Israel</creatorcontrib><creatorcontrib>Ozer Adi</creatorcontrib><creatorcontrib>Avraham Itay</creatorcontrib><creatorcontrib>Cohen Cobby</creatorcontrib><creatorcontrib>Touboul Shlomo</creatorcontrib><title>PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK</title><description>A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in response to the predicting a target subnet.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPAKCHJ18XQO8fRzV3D0c1EAcsNc_aBcBceQEEdnb9cg9WAFP9eIEAVHoEJ_v2AFT6CUglOQq6Ozh6sLUCok3D_Im4eBNS0xpziVF0pzMyi7uYY4e-imFuTHpxYXJCan5qWWxIcGGxkYWhgYGRgYGTkaGhOnCgDosi3d</recordid><startdate>20180118</startdate><enddate>20180118</enddate><creator>Levin Hanan</creator><creator>Vingurt Olga</creator><creator>Kazaz Chen</creator><creator>Kubovsky Matan</creator><creator>Roubach Stephane</creator><creator>Sultan Sharon</creator><creator>Gareh Liad</creator><creator>Ben David Itai</creator><creator>Mischari Assaf</creator><creator>Israeli Ofer</creator><creator>Grimberg Israel</creator><creator>Ozer Adi</creator><creator>Avraham Itay</creator><creator>Cohen Cobby</creator><creator>Touboul Shlomo</creator><scope>EVB</scope></search><sort><creationdate>20180118</creationdate><title>PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK</title><author>Levin Hanan ; Vingurt Olga ; Kazaz Chen ; Kubovsky Matan ; Roubach Stephane ; Sultan Sharon ; Gareh Liad ; Ben David Itai ; Mischari Assaf ; Israeli Ofer ; Grimberg Israel ; Ozer Adi ; Avraham Itay ; Cohen Cobby ; Touboul Shlomo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2018020022A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Levin Hanan</creatorcontrib><creatorcontrib>Vingurt Olga</creatorcontrib><creatorcontrib>Kazaz Chen</creatorcontrib><creatorcontrib>Kubovsky Matan</creatorcontrib><creatorcontrib>Roubach Stephane</creatorcontrib><creatorcontrib>Sultan Sharon</creatorcontrib><creatorcontrib>Gareh Liad</creatorcontrib><creatorcontrib>Ben David Itai</creatorcontrib><creatorcontrib>Mischari Assaf</creatorcontrib><creatorcontrib>Israeli Ofer</creatorcontrib><creatorcontrib>Grimberg Israel</creatorcontrib><creatorcontrib>Ozer Adi</creatorcontrib><creatorcontrib>Avraham Itay</creatorcontrib><creatorcontrib>Cohen Cobby</creatorcontrib><creatorcontrib>Touboul Shlomo</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Levin Hanan</au><au>Vingurt Olga</au><au>Kazaz Chen</au><au>Kubovsky Matan</au><au>Roubach Stephane</au><au>Sultan Sharon</au><au>Gareh Liad</au><au>Ben David Itai</au><au>Mischari Assaf</au><au>Israeli Ofer</au><au>Grimberg Israel</au><au>Ozer Adi</au><au>Avraham Itay</au><au>Cohen Cobby</au><au>Touboul Shlomo</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK</title><date>2018-01-18</date><risdate>2018</risdate><abstract>A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in response to the predicting a target subnet.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2018020022A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T04%3A35%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Levin%20Hanan&rft.date=2018-01-18&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2018020022A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true