DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM
Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is d...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | VETRIVEL, Puhazholi NEWMAN, Philip K PALANI, Suresh C MISHRA, Ashish NARAYANAMURTHY, Sudhakar OFUONYE, Ejike E |
description | Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2020304538A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2020304538A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2020304538A13</originalsourceid><addsrcrecordid>eNrjZHBzcQ1xdQ7x9PdTcPRzUfB0cfUL8XTzdHYEC_m7KYQ4BrkDlbgoOIaEODp7ByuAVCo4-_sGhIZ4-rkrBEcGh7j68jCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-NBgIwMjA2MDE1NjC0dDY-JUAQBO4y0c</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM</title><source>esp@cenet</source><creator>VETRIVEL, Puhazholi ; NEWMAN, Philip K ; PALANI, Suresh C ; MISHRA, Ashish ; NARAYANAMURTHY, Sudhakar ; OFUONYE, Ejike E</creator><creatorcontrib>VETRIVEL, Puhazholi ; NEWMAN, Philip K ; PALANI, Suresh C ; MISHRA, Ashish ; NARAYANAMURTHY, Sudhakar ; OFUONYE, Ejike E</creatorcontrib><description>Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200924&DB=EPODOC&CC=US&NR=2020304538A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200924&DB=EPODOC&CC=US&NR=2020304538A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>VETRIVEL, Puhazholi</creatorcontrib><creatorcontrib>NEWMAN, Philip K</creatorcontrib><creatorcontrib>PALANI, Suresh C</creatorcontrib><creatorcontrib>MISHRA, Ashish</creatorcontrib><creatorcontrib>NARAYANAMURTHY, Sudhakar</creatorcontrib><creatorcontrib>OFUONYE, Ejike E</creatorcontrib><title>DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM</title><description>Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHBzcQ1xdQ7x9PdTcPRzUfB0cfUL8XTzdHYEC_m7KYQ4BrkDlbgoOIaEODp7ByuAVCo4-_sGhIZ4-rkrBEcGh7j68jCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-NBgIwMjA2MDE1NjC0dDY-JUAQBO4y0c</recordid><startdate>20200924</startdate><enddate>20200924</enddate><creator>VETRIVEL, Puhazholi</creator><creator>NEWMAN, Philip K</creator><creator>PALANI, Suresh C</creator><creator>MISHRA, Ashish</creator><creator>NARAYANAMURTHY, Sudhakar</creator><creator>OFUONYE, Ejike E</creator><scope>EVB</scope></search><sort><creationdate>20200924</creationdate><title>DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM</title><author>VETRIVEL, Puhazholi ; NEWMAN, Philip K ; PALANI, Suresh C ; MISHRA, Ashish ; NARAYANAMURTHY, Sudhakar ; OFUONYE, Ejike E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2020304538A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>VETRIVEL, Puhazholi</creatorcontrib><creatorcontrib>NEWMAN, Philip K</creatorcontrib><creatorcontrib>PALANI, Suresh C</creatorcontrib><creatorcontrib>MISHRA, Ashish</creatorcontrib><creatorcontrib>NARAYANAMURTHY, Sudhakar</creatorcontrib><creatorcontrib>OFUONYE, Ejike E</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>VETRIVEL, Puhazholi</au><au>NEWMAN, Philip K</au><au>PALANI, Suresh C</au><au>MISHRA, Ashish</au><au>NARAYANAMURTHY, Sudhakar</au><au>OFUONYE, Ejike E</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM</title><date>2020-09-24</date><risdate>2020</risdate><abstract>Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2020304538A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T21%3A50%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=VETRIVEL,%20Puhazholi&rft.date=2020-09-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2020304538A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |