Event correlation across heterogeneous operations

    公开(公告)号:US10148685B2

    公开(公告)日:2018-12-04

    申请号:US15651779

    申请日:2017-07-17

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data structure that represents communication events between computing devices of two or more network domains is received. The data structure is analyzed and a threat scenario that is based on a chain of communication events that indicates a potential attack path is determined. The chain of communication events include a sequence of communication events between computing devices proceeding from an originating computing device to a destination computing device, wherein the originating computing device and the destination computing device exist on different network domains. Attack pattern data, for the threat scenario and from a threat intelligence data source, that is associated with communications between computing devices that occurred during one or more prior attacks is received. Based on the threat scenario and the attack pattern data, one or more courses of action for responding to the threat scenario is determined, and information associated with the one or more courses of action is provided.

    EVENT CORRELATION ACROSS HETEROGENEOUS OPERATIONS

    公开(公告)号:US20170318050A1

    公开(公告)日:2017-11-02

    申请号:US15651779

    申请日:2017-07-17

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data structure that represents communication events between computing devices of two or more network domains is received. The data structure is analyzed and a threat scenario that is based on a chain of communication events that indicates a potential attack path is determined. The chain of communication events include a sequence of communication events between computing devices proceeding from an originating computing device to a destination computing device, wherein the originating computing device and the destination computing device exist on different network domains. Attack pattern data, for the threat scenario and from a threat intelligence data source, that is associated with communications between computing devices that occurred during one or more prior attacks is received. Based on the threat scenario and the attack pattern data, one or more courses of action for responding to the threat scenario is determined, and information associated with the one or more courses of action is provided.

    EVENT CORRELATION ACROSS HETEROGENEOUS OPERATIONS
    5.
    发明申请
    EVENT CORRELATION ACROSS HETEROGENEOUS OPERATIONS 有权
    事件相关异常操作

    公开(公告)号:US20160301709A1

    公开(公告)日:2016-10-13

    申请号:US14841227

    申请日:2015-08-31

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for transforming representations of network activity data. A data structure that represents communication events between computing devices of one or more networks is received. The data structure is analyzed and a set of potential attack paths represented in the data structure is determined. A score is assigned to each potential attack path in the set of potential attack paths. Potential attack paths that have scores that do not meet a predetermined threshold are removed from the set of potential attack paths. Potential attack paths that remain in the set of potential attack paths are ranked, based on each score assigned to each potential attack path, and the data structure that includes a ranked set of potential attack paths is provided.

    Abstract translation: 方法,系统和装置,包括在计算机存储介质上编码的计算机程序,用于变换网络活动数据的表示。 接收表示一个或多个网络的计算装置之间的通信事件的数据结构。 分析数据结构,并确定在数据结构中表示的一组潜在攻击路径。 将一个分数分配给潜在攻击路径集合中的每个潜在攻击路径。 具有不符合预定阈值的分数的潜在攻击路径从潜在攻击路径集中移除。 基于分配给每个潜在攻击路径的每个分数,保留在潜在攻击路径集合中的潜在攻击路径被提供,并且提供包括排列的潜在攻击路径集合的数据结构。

    INDUSTRIAL SECURITY AGENT PLATFORM
    6.
    发明申请
    INDUSTRIAL SECURITY AGENT PLATFORM 有权
    工业安全代理平台

    公开(公告)号:US20160085972A1

    公开(公告)日:2016-03-24

    申请号:US14839331

    申请日:2015-08-28

    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network. The encryption relay processor can execute a cryptographic function for a communication between the emulator and a node on the industrial control network when the respective controller device is incapable of performing the cryptographic function.

    Abstract translation: 系统,方法和装置,包括在计算机存储介质上编码的计算机程序,用于促进工业控制网络中的通信。 系统包括工业控制网络,一个或多个控制器设备,一个或多个仿真器和加密中继处理器。 每个控制器设备可操作以控制连接到工业控制网络的一个或多个操作设备。 每个仿真器可被配置为与相应的控制器设备进行通信,并且每个仿真器可被配置为引用包括关于相应控制器设备的安全性能的信息的相应简档。 加密中继处理器可以可操作以便于通过工业控制网络与每个仿真器进行通信。 当相应的控制器设备不能执行加密功能时,加密中继处理器可以执行用于仿真器与工业控制网络上的节点之间的通信的加密功能。

    Industrial security agent platform

    公开(公告)号:US10824736B2

    公开(公告)日:2020-11-03

    申请号:US15822824

    申请日:2017-11-27

    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network. The encryption relay processor can execute a cryptographic function for a communication between the emulator and a node on the industrial control network when the respective controller device is incapable of performing the cryptographic function.

    INDUSTRIAL SECURITY AGENT PLATFORM
    8.
    发明申请

    公开(公告)号:US20180144144A1

    公开(公告)日:2018-05-24

    申请号:US15822824

    申请日:2017-11-27

    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network. The encryption relay processor can execute a cryptographic function for a communication between the emulator and a node on the industrial control network when the respective controller device is incapable of performing the cryptographic function.

    Industrial security agent platform
    10.
    发明授权

    公开(公告)号:US09864864B2

    公开(公告)日:2018-01-09

    申请号:US14839331

    申请日:2015-08-28

    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network. The encryption relay processor can execute a cryptographic function for a communication between the emulator and a node on the industrial control network when the respective controller device is incapable of performing the cryptographic function.

Patent Agency Ranking