Log in
Enquire now
‌

US Patent 12081569 Graph-based analysis of security incidents

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
120815690
Patent Inventor Names
Evan John Argyle0
Nisha Shahul Hameed0
Rishi Dev Jha0
Date of Patent
September 3, 2024
0
Patent Application Number
176815310
Date Filed
February 25, 2022
0
Patent Citations
‌
US Patent 8577895 Dynamic contacts list management
0
‌
US Patent 9038180 Using new edges for anomaly detection in computer networks
0
‌
US Patent 9070120 Identifying and displaying a set of high priority contacts on a display device
0
‌
US Patent 9288240 System and method for allowing an originating user device to use contact information in a prioritized list to contact a destination user device
0
‌
US Patent 9292695 System and method for cyber security analysis and human behavior prediction
0
‌
US Patent 9374380 Non-harmful insertion of data mimicking computer network attacks
0
‌
US Patent 9444836 Modeling and outlier detection in threat management system data
0
‌
US Patent 9800605 Risk scoring for threat assessment
0
...
Patent Primary Examiner
‌
Roderick Tolentino
0
CPC Code
‌
H04L 63/1441
0
‌
H04L 63/1425
0
‌
H04L 41/14
0
‌
H04L 45/02
0
‌
H04L 67/10
0
‌
H04L 41/12
0
‌
H04L 41/16
0
‌
H04L 43/12
0
Patent abstract

In network security systems, graph-based techniques can be used to analyze data collected for a particular security incident, e.g., a command-and-control incident. In example embodiments, data extracted from data records of network activity and/or security alerts is used to generate a multipartite graph in which different entities (e.g., machines, processes, and domains or IP addresses) are represented as different types of nodes and relationships between the entities are represented as edges. The multipartite graph may be clustered, and the clusters be ranked according to some indicator of maliciousness (e.g., the number of associated security alerts or indicators of compromise (IoCs)). An output generated from the highest-ranking cluster(s) may serve, e.g., to identify new IoCs, or flow into mitigating actions taken in response to the incident.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 12081569 Graph-based analysis of security incidents

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.