-
1.
公开(公告)号:US20180219896A1
公开(公告)日:2018-08-02
申请号:US15885709
申请日:2018-01-31
Applicant: Splunk Inc.
Inventor: Kurt Kokko , Damien Lindauer , Brad Lovering , Lynn Kasel
CPC classification number: H04L63/1425 , G06F21/53 , G06F21/54 , G06N20/00 , H04L63/1433
Abstract: Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.
-
2.
公开(公告)号:US20200344254A1
公开(公告)日:2020-10-29
申请号:US16872077
申请日:2020-05-11
Applicant: Splunk Inc.
Inventor: Kurt Kokko , Damien Lindauer , Brad Lovering , Lynn Kasel
Abstract: Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.
-
公开(公告)号:US11588841B2
公开(公告)日:2023-02-21
申请号:US16872077
申请日:2020-05-11
Applicant: Splunk Inc.
Inventor: Kurt Kokko , Damien Lindauer , Brad Lovering , Lynn Kasel
Abstract: Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.
-
4.
公开(公告)号:US10652261B2
公开(公告)日:2020-05-12
申请号:US15885709
申请日:2018-01-31
Applicant: Splunk Inc.
Inventor: Kurt Kokko , Damien Lindauer , Brad Lovering , Lynn Kasel
Abstract: Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.
-
-
-