DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM

Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is d...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: VETRIVEL, Puhazholi, NEWMAN, Philip K, PALANI, Suresh C, MISHRA, Ashish, NARAYANAMURTHY, Sudhakar, OFUONYE, Ejike E
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator VETRIVEL, Puhazholi
NEWMAN, Philip K
PALANI, Suresh C
MISHRA, Ashish
NARAYANAMURTHY, Sudhakar
OFUONYE, Ejike E
description Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2020304538A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2020304538A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2020304538A13</originalsourceid><addsrcrecordid>eNrjZHBzcQ1xdQ7x9PdTcPRzUfB0cfUL8XTzdHYEC_m7KYQ4BrkDlbgoOIaEODp7ByuAVCo4-_sGhIZ4-rkrBEcGh7j68jCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-NBgIwMjA2MDE1NjC0dDY-JUAQBO4y0c</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM</title><source>esp@cenet</source><creator>VETRIVEL, Puhazholi ; NEWMAN, Philip K ; PALANI, Suresh C ; MISHRA, Ashish ; NARAYANAMURTHY, Sudhakar ; OFUONYE, Ejike E</creator><creatorcontrib>VETRIVEL, Puhazholi ; NEWMAN, Philip K ; PALANI, Suresh C ; MISHRA, Ashish ; NARAYANAMURTHY, Sudhakar ; OFUONYE, Ejike E</creatorcontrib><description>Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200924&amp;DB=EPODOC&amp;CC=US&amp;NR=2020304538A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200924&amp;DB=EPODOC&amp;CC=US&amp;NR=2020304538A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>VETRIVEL, Puhazholi</creatorcontrib><creatorcontrib>NEWMAN, Philip K</creatorcontrib><creatorcontrib>PALANI, Suresh C</creatorcontrib><creatorcontrib>MISHRA, Ashish</creatorcontrib><creatorcontrib>NARAYANAMURTHY, Sudhakar</creatorcontrib><creatorcontrib>OFUONYE, Ejike E</creatorcontrib><title>DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM</title><description>Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHBzcQ1xdQ7x9PdTcPRzUfB0cfUL8XTzdHYEC_m7KYQ4BrkDlbgoOIaEODp7ByuAVCo4-_sGhIZ4-rkrBEcGh7j68jCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-NBgIwMjA2MDE1NjC0dDY-JUAQBO4y0c</recordid><startdate>20200924</startdate><enddate>20200924</enddate><creator>VETRIVEL, Puhazholi</creator><creator>NEWMAN, Philip K</creator><creator>PALANI, Suresh C</creator><creator>MISHRA, Ashish</creator><creator>NARAYANAMURTHY, Sudhakar</creator><creator>OFUONYE, Ejike E</creator><scope>EVB</scope></search><sort><creationdate>20200924</creationdate><title>DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM</title><author>VETRIVEL, Puhazholi ; NEWMAN, Philip K ; PALANI, Suresh C ; MISHRA, Ashish ; NARAYANAMURTHY, Sudhakar ; OFUONYE, Ejike E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2020304538A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>VETRIVEL, Puhazholi</creatorcontrib><creatorcontrib>NEWMAN, Philip K</creatorcontrib><creatorcontrib>PALANI, Suresh C</creatorcontrib><creatorcontrib>MISHRA, Ashish</creatorcontrib><creatorcontrib>NARAYANAMURTHY, Sudhakar</creatorcontrib><creatorcontrib>OFUONYE, Ejike E</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>VETRIVEL, Puhazholi</au><au>NEWMAN, Philip K</au><au>PALANI, Suresh C</au><au>MISHRA, Ashish</au><au>NARAYANAMURTHY, Sudhakar</au><au>OFUONYE, Ejike E</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM</title><date>2020-09-24</date><risdate>2020</risdate><abstract>Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2020304538A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T21%3A50%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=VETRIVEL,%20Puhazholi&rft.date=2020-09-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2020304538A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true