Pattern creation based on an attack path

    公开(公告)号:US10826926B2

    公开(公告)日:2020-11-03

    申请号:US16037509

    申请日:2018-07-17

    Applicant: SAP SE

    Abstract: A first Event is identified from a normalized log persistency layer, where the first Event is associated with an attack on a computing system. A plurality of Events are fetched from the normalized log persistency layer, where each fetched Event correlates with its neighboring fetched Event by at least one correlation attribute, and each of the fetched Event and the first Event are presented on a graphical user interface as a chain of events. A workspace is generated, where the workspace comprises a series of attack paths, where each attack path corresponds to one Event in the chain of events. An ETD pattern is created based on the attack paths in the workspace.

    REAL-TIME CONFIGURATION CHECK FRAMEWORK
    14.
    发明申请

    公开(公告)号:US20200044924A1

    公开(公告)日:2020-02-06

    申请号:US16053376

    申请日:2018-08-02

    Applicant: SAP SE

    Abstract: A computer-implemented method receives a program code and a signature associated with the program code from a database persistency associated with an enterprise threat detection (ETD) system. The received program code is associated with a configuration check, and the configuration check is developed at a development computing system and can collect information associated with a computing system. The received program code and the signature associated with the program code is distributed to a plurality of computing systems that are monitored by the ETD system. At least one configuration check result is received, and the configuration check result is generated by executing the program code on the computing system. The at least one configuration check result then transmitted to the database persistence, and the at least one result is displayed on a database graphical user interface (GUI) associated with the database persistency.

    REAL-TIME CONFIGURATION CHECK FRAMEWORK

    公开(公告)号:US20210028986A1

    公开(公告)日:2021-01-28

    申请号:US17066298

    申请日:2020-10-08

    Applicant: SAP SE

    Abstract: A computer-implemented method receives a program code and a signature associated with the program code from a database persistency associated with an enterprise threat detection (ETD) system. The received program code is associated with a configuration check, and the configuration check is developed at a development computing system and can collect information associated with a computing system. The received program code and the signature associated with the program code is distributed to a plurality of computing systems that are monitored by the ETD system. At least one configuration check result is received, and the configuration check result is generated by executing the program code on the computing system. The at least one configuration check result then transmitted to the database persistence, and the at least one result is displayed on a database graphical user interface (GUI) associated with the database persistency.

    Location enrichment in enterprise threat detection

    公开(公告)号:US10542016B2

    公开(公告)日:2020-01-21

    申请号:US15253438

    申请日:2016-08-31

    Applicant: SAP SE

    Abstract: Subnet information and location information is received from a database by a smart data streaming engine (SDS). A particular subnet of the subnet information is associated with a particular location of the location information by a globally unique location ID value. Log event data received in the SDS is normalized as normalized log event data. The normalized log event data is enriched with subnet and location information as enriched log event data and written into a log event persistence in the database. A subnet ID value retrieved from an enriched log event of the enriched log event data is used by an enterprise threat detection (ETD) system to determine a location associated with the enriched log event using a location ID value associated with the subnet ID.

Patent Agency Ranking