PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK
A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Levin Hanan Vingurt Olga Kazaz Chen Kubovsky Matan Roubach Stephane Sultan Sharon Gareh Liad Ben David Itai Mischari Assaf Israeli Ofer Grimberg Israel Ozer Adi Avraham Itay Cohen Cobby Touboul Shlomo |
description | A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in response to the predicting a target subnet. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2018020022A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2018020022A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2018020022A13</originalsourceid><addsrcrecordid>eNrjZPAKCHJ18XQO8fRzV3D0c1EAcsNc_aBcBceQEEdnb9cg9WAFP9eIEAVHoEJ_v2AFT6CUglOQq6Ozh6sLUCok3D_Im4eBNS0xpziVF0pzMyi7uYY4e-imFuTHpxYXJCan5qWWxIcGGxkYWhgYGRgYGTkaGhOnCgDosi3d</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK</title><source>esp@cenet</source><creator>Levin Hanan ; Vingurt Olga ; Kazaz Chen ; Kubovsky Matan ; Roubach Stephane ; Sultan Sharon ; Gareh Liad ; Ben David Itai ; Mischari Assaf ; Israeli Ofer ; Grimberg Israel ; Ozer Adi ; Avraham Itay ; Cohen Cobby ; Touboul Shlomo</creator><creatorcontrib>Levin Hanan ; Vingurt Olga ; Kazaz Chen ; Kubovsky Matan ; Roubach Stephane ; Sultan Sharon ; Gareh Liad ; Ben David Itai ; Mischari Assaf ; Israeli Ofer ; Grimberg Israel ; Ozer Adi ; Avraham Itay ; Cohen Cobby ; Touboul Shlomo</creatorcontrib><description>A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in response to the predicting a target subnet.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180118&DB=EPODOC&CC=US&NR=2018020022A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180118&DB=EPODOC&CC=US&NR=2018020022A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Levin Hanan</creatorcontrib><creatorcontrib>Vingurt Olga</creatorcontrib><creatorcontrib>Kazaz Chen</creatorcontrib><creatorcontrib>Kubovsky Matan</creatorcontrib><creatorcontrib>Roubach Stephane</creatorcontrib><creatorcontrib>Sultan Sharon</creatorcontrib><creatorcontrib>Gareh Liad</creatorcontrib><creatorcontrib>Ben David Itai</creatorcontrib><creatorcontrib>Mischari Assaf</creatorcontrib><creatorcontrib>Israeli Ofer</creatorcontrib><creatorcontrib>Grimberg Israel</creatorcontrib><creatorcontrib>Ozer Adi</creatorcontrib><creatorcontrib>Avraham Itay</creatorcontrib><creatorcontrib>Cohen Cobby</creatorcontrib><creatorcontrib>Touboul Shlomo</creatorcontrib><title>PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK</title><description>A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in response to the predicting a target subnet.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPAKCHJ18XQO8fRzV3D0c1EAcsNc_aBcBceQEEdnb9cg9WAFP9eIEAVHoEJ_v2AFT6CUglOQq6Ozh6sLUCok3D_Im4eBNS0xpziVF0pzMyi7uYY4e-imFuTHpxYXJCan5qWWxIcGGxkYWhgYGRgYGTkaGhOnCgDosi3d</recordid><startdate>20180118</startdate><enddate>20180118</enddate><creator>Levin Hanan</creator><creator>Vingurt Olga</creator><creator>Kazaz Chen</creator><creator>Kubovsky Matan</creator><creator>Roubach Stephane</creator><creator>Sultan Sharon</creator><creator>Gareh Liad</creator><creator>Ben David Itai</creator><creator>Mischari Assaf</creator><creator>Israeli Ofer</creator><creator>Grimberg Israel</creator><creator>Ozer Adi</creator><creator>Avraham Itay</creator><creator>Cohen Cobby</creator><creator>Touboul Shlomo</creator><scope>EVB</scope></search><sort><creationdate>20180118</creationdate><title>PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK</title><author>Levin Hanan ; Vingurt Olga ; Kazaz Chen ; Kubovsky Matan ; Roubach Stephane ; Sultan Sharon ; Gareh Liad ; Ben David Itai ; Mischari Assaf ; Israeli Ofer ; Grimberg Israel ; Ozer Adi ; Avraham Itay ; Cohen Cobby ; Touboul Shlomo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2018020022A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Levin Hanan</creatorcontrib><creatorcontrib>Vingurt Olga</creatorcontrib><creatorcontrib>Kazaz Chen</creatorcontrib><creatorcontrib>Kubovsky Matan</creatorcontrib><creatorcontrib>Roubach Stephane</creatorcontrib><creatorcontrib>Sultan Sharon</creatorcontrib><creatorcontrib>Gareh Liad</creatorcontrib><creatorcontrib>Ben David Itai</creatorcontrib><creatorcontrib>Mischari Assaf</creatorcontrib><creatorcontrib>Israeli Ofer</creatorcontrib><creatorcontrib>Grimberg Israel</creatorcontrib><creatorcontrib>Ozer Adi</creatorcontrib><creatorcontrib>Avraham Itay</creatorcontrib><creatorcontrib>Cohen Cobby</creatorcontrib><creatorcontrib>Touboul Shlomo</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Levin Hanan</au><au>Vingurt Olga</au><au>Kazaz Chen</au><au>Kubovsky Matan</au><au>Roubach Stephane</au><au>Sultan Sharon</au><au>Gareh Liad</au><au>Ben David Itai</au><au>Mischari Assaf</au><au>Israeli Ofer</au><au>Grimberg Israel</au><au>Ozer Adi</au><au>Avraham Itay</au><au>Cohen Cobby</au><au>Touboul Shlomo</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK</title><date>2018-01-18</date><risdate>2018</risdate><abstract>A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in response to the predicting a target subnet.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2018020022A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T04%3A35%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Levin%20Hanan&rft.date=2018-01-18&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2018020022A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |