AUTOMATED THREAT RESPONSE IN EXTENDED DETECTION AND RESPONSE (XDR) SYSTEMS

    公开(公告)号:US20240356962A1

    公开(公告)日:2024-10-24

    申请号:US18368392

    申请日:2023-09-14

    CPC classification number: H04L63/1441 H04L63/1416

    Abstract: Techniques and architecture are described for automated threat response and remediation of incidents generated by single or multiple security products. The techniques and architecture provide a framework for automated threat response and remediation of incidents generated by single or multiple security products, especially for extended detection and response (XDR) systems. In particular, the techniques and architecture provide for an automated threat response that is handled by an auto-analyst engine emulating security analysts' steps during incident response and remediation. The automated threat response automatically confirms or disapproves of detection verdicts thereby reducing false positives that analysts usually have to deal with. If any actions are needed from a security analyst, a concise report of actions taken, gathered information and recommended next steps are provided by the automated threat response, significantly reducing the time and resources needed to resolve an incident.

    Graphical representation of security threats in a network

    公开(公告)号:US11956208B2

    公开(公告)日:2024-04-09

    申请号:US17722915

    申请日:2022-04-18

    Abstract: A method includes, at a server in a network, detecting for a user device network incidents relating to one or more security threats in the network using a plurality of threat detectors over a predetermined time period, each of the network incidents including one or more behavior indicators; assigning the network incidents into one or more groups, wherein each group corresponds to a type of security threat; generating a graph for a particular group of the user device, wherein the graph includes a plurality of nodes each representing a behavior indicator in the particular group, and wherein generating the graph includes assigning an edge to connect two nodes of the plurality of nodes if the two nodes correspond to behavior indicators that belong to a same network incident; and displaying the graph on a graphical user interface for a user.

    Private-learned IDS
    17.
    发明授权

    公开(公告)号:US10708284B2

    公开(公告)日:2020-07-07

    申请号:US15643573

    申请日:2017-07-07

    Abstract: In one embodiment, a device in a network maintains a plurality of machine learning-based detectors for an intrusion detection system. Each detector is associated with a different portion of a feature space of traffic characteristics assessed by the intrusion detection system. The device provides data regarding the plurality of detectors to a user interface. The device receives an adjustment instruction from the user interface based on the data provided to the user interface regarding the plurality of detectors. The device adjusts the portions of the feature space associated with the plurality of detectors based on the adjustment instruction received from the user interface.

    RAPID, TARGETED NETWORK THREAT DETECTION
    19.
    发明申请

    公开(公告)号:US20180063161A1

    公开(公告)日:2018-03-01

    申请号:US15244486

    申请日:2016-08-23

    CPC classification number: H04L63/1416 G06F21/55 H04L63/1441

    Abstract: Rapidly detecting network threats with targeted detectors includes, at a computing device having connectivity to a network, determining features of background network traffic. Features are also extracted from a particular type of network threat. A characteristic of the particular type of network threat that best differentiates the features of the particular type of network threat from the features of the background network traffic is determined. A targeted detector for the particular type of network threat is created based on the characteristic and an action is applied to particular incoming network traffic identified by the targeted detector as being associated with the particular type of network threat.

    COMMAND LINE OBFUSCATION DETECTION TECHNIQUES

    公开(公告)号:US20250141893A1

    公开(公告)日:2025-05-01

    申请号:US18385591

    申请日:2023-10-31

    Abstract: Techniques described herein can perform obfuscation detection on command lines used at computing devices in a network. In response to detecting obfuscation in a command line, the disclosed techniques can output a notification for use in connection with network security analysis. The command line obfuscation detection techniques include pre-processing command line input data and converting command lines into token groups. The token groups are then provided as an input to a natural language processor or other machine learned model, which is trained to identify obfuscation probabilities associated with token groups can corresponding command lines. A notification is generated to trigger further analysis in response to an obfuscation probability exceeding a threshold obfuscation probability.

Patent Agency Ranking