Systems and methods identifying and reacting to potentially malicious activity

Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are systems, methods and devices for enabling a user device to implement functions for dynamically identifying and reacting to potentially malic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: RUSSO FRANCESCO, O'REILLY MARTIN MATTHEW, MAHFOUD ROBERT HANNA, BREZINSKI DOMINIQUE IMJYA
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator RUSSO FRANCESCO
O'REILLY MARTIN MATTHEW
MAHFOUD ROBERT HANNA
BREZINSKI DOMINIQUE IMJYA
description Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are systems, methods and devices for enabling a user device to implement functions for dynamically identifying and reacting to potentially malicious activity. In one example, a user device configures a sentinel node to identify potentially malicious behavior by causing the sentinel node to analyze data from selected emitter nodes and selected algorithms. The user device may also specify how the sentinel node reacts to potential malicious activity.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9154515B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9154515B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9154515B13</originalsourceid><addsrcrecordid>eNrjZPALriwuSc0tVkjMS1HITS3JyE8pVshMSc0ryUyrzMxLB4sXpSYml4A4JfkKBfklIMnEnJxKhdzEnMzkzPxSoG6gfFlmSSUPA2taYk5xKi-U5mZQcHMNcfbQTS3Ij08tLkhMTs1LLYkPDbY0NDUxNTR1MjQmQgkADcE3JQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Systems and methods identifying and reacting to potentially malicious activity</title><source>esp@cenet</source><creator>RUSSO FRANCESCO ; O'REILLY MARTIN MATTHEW ; MAHFOUD ROBERT HANNA ; BREZINSKI DOMINIQUE IMJYA</creator><creatorcontrib>RUSSO FRANCESCO ; O'REILLY MARTIN MATTHEW ; MAHFOUD ROBERT HANNA ; BREZINSKI DOMINIQUE IMJYA</creatorcontrib><description>Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are systems, methods and devices for enabling a user device to implement functions for dynamically identifying and reacting to potentially malicious activity. In one example, a user device configures a sentinel node to identify potentially malicious behavior by causing the sentinel node to analyze data from selected emitter nodes and selected algorithms. The user device may also specify how the sentinel node reacts to potential malicious activity.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20151006&amp;DB=EPODOC&amp;CC=US&amp;NR=9154515B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20151006&amp;DB=EPODOC&amp;CC=US&amp;NR=9154515B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>RUSSO FRANCESCO</creatorcontrib><creatorcontrib>O'REILLY MARTIN MATTHEW</creatorcontrib><creatorcontrib>MAHFOUD ROBERT HANNA</creatorcontrib><creatorcontrib>BREZINSKI DOMINIQUE IMJYA</creatorcontrib><title>Systems and methods identifying and reacting to potentially malicious activity</title><description>Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are systems, methods and devices for enabling a user device to implement functions for dynamically identifying and reacting to potentially malicious activity. In one example, a user device configures a sentinel node to identify potentially malicious behavior by causing the sentinel node to analyze data from selected emitter nodes and selected algorithms. The user device may also specify how the sentinel node reacts to potential malicious activity.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPALriwuSc0tVkjMS1HITS3JyE8pVshMSc0ryUyrzMxLB4sXpSYml4A4JfkKBfklIMnEnJxKhdzEnMzkzPxSoG6gfFlmSSUPA2taYk5xKi-U5mZQcHMNcfbQTS3Ij08tLkhMTs1LLYkPDbY0NDUxNTR1MjQmQgkADcE3JQ</recordid><startdate>20151006</startdate><enddate>20151006</enddate><creator>RUSSO FRANCESCO</creator><creator>O'REILLY MARTIN MATTHEW</creator><creator>MAHFOUD ROBERT HANNA</creator><creator>BREZINSKI DOMINIQUE IMJYA</creator><scope>EVB</scope></search><sort><creationdate>20151006</creationdate><title>Systems and methods identifying and reacting to potentially malicious activity</title><author>RUSSO FRANCESCO ; O'REILLY MARTIN MATTHEW ; MAHFOUD ROBERT HANNA ; BREZINSKI DOMINIQUE IMJYA</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9154515B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>RUSSO FRANCESCO</creatorcontrib><creatorcontrib>O'REILLY MARTIN MATTHEW</creatorcontrib><creatorcontrib>MAHFOUD ROBERT HANNA</creatorcontrib><creatorcontrib>BREZINSKI DOMINIQUE IMJYA</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>RUSSO FRANCESCO</au><au>O'REILLY MARTIN MATTHEW</au><au>MAHFOUD ROBERT HANNA</au><au>BREZINSKI DOMINIQUE IMJYA</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Systems and methods identifying and reacting to potentially malicious activity</title><date>2015-10-06</date><risdate>2015</risdate><abstract>Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are systems, methods and devices for enabling a user device to implement functions for dynamically identifying and reacting to potentially malicious activity. In one example, a user device configures a sentinel node to identify potentially malicious behavior by causing the sentinel node to analyze data from selected emitter nodes and selected algorithms. The user device may also specify how the sentinel node reacts to potential malicious activity.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9154515B1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Systems and methods identifying and reacting to potentially malicious activity
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T22%3A40%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=RUSSO%20FRANCESCO&rft.date=2015-10-06&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9154515B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true