UNWANTED TUNNELING ALERT SYSTEM
    23.
    发明申请

    公开(公告)号:US20180159874A1

    公开(公告)日:2018-06-07

    申请号:US15891873

    申请日:2018-02-08

    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.

    Unwanted tunneling alert system
    24.
    发明授权
    Unwanted tunneling alert system 有权
    不需要的隧道警报系统

    公开(公告)号:US09419992B2

    公开(公告)日:2016-08-16

    申请号:US14823935

    申请日:2015-08-11

    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.

    Abstract translation: 提供了检测恶意网络隧道的各种系统和方法。 例如,可以访问VPN日志和数据连接日志。 VPN日志可以列出已经与企业网络建立VPN连接的客户端IP地址。 数据连接日志可能列出已请求企业网络外部连接的客户端IP地址以及请求连接的远程IP地址。 可以解析VPN日志和数据连接日志,以将VPN日志中存在的IP地址识别为客户端IP地址,并将数据连接日志标识为远程IP地址。 如果IP地址如此存在,则可以检索与IP地址相关联的用户数据和流量数据以产生风险分数。 如果风险分数超过阈值,则生成要在GUI中显示的警报。

    Joined and coordinated detection, handling, and prevention of cyberattacks

    公开(公告)号:US11587177B2

    公开(公告)日:2023-02-21

    申请号:US14919506

    申请日:2015-10-21

    Abstract: Methods, devices, systems and computer program products enable monitoring and responding to cyber security attacks. One such system relates to a consortium of monitoring companies and an infrastructure including one or more central monitoring stations or local handling stations for a monitoring company are provided. A central monitoring station of a monitoring company detects a cyberattack that has been launched against a client computer system, and requests a local station to respond to the cyberattack via onsite visits or requests additional resources from other monitoring companies through the consortium system. The central monitoring station also sends to the consortium system updates on a cyberattack that is detected or mitigated by a central monitoring station or local handling station of the monitoring company. The monitoring consortium enables stronger capabilities than any individual monitoring company can offer by the combination and coordination of the efforts and resources of the members.

    TECHNIQUES FOR DATA EXTRACTION
    29.
    发明申请

    公开(公告)号:US20190034488A1

    公开(公告)日:2019-01-31

    申请号:US16147687

    申请日:2018-09-29

    Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.

    TECHNIQUES FOR DATA EXTRACTION
    30.
    发明申请

    公开(公告)号:US20180032575A1

    公开(公告)日:2018-02-01

    申请号:US15225437

    申请日:2016-08-01

    CPC classification number: G06F17/30477 G06F17/30533 G06F17/30563

    Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.

Patent Agency Ranking