-
1.
公开(公告)号:US20180351991A1
公开(公告)日:2018-12-06
申请号:US16035956
申请日:2018-07-16
Applicant: Palantir Technologies Inc.
Inventor: Samuel Jones , Joseph Staehle , Lucy Cheng
CPC classification number: H04L63/1433 , G06F21/55 , G06F21/577 , H04L63/102 , H04L63/107 , H04L63/14 , H04L63/1425
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.
-
公开(公告)号:US10044745B1
公开(公告)日:2018-08-07
申请号:US15207343
申请日:2016-07-11
Applicant: PALANTIR TECHNOLOGIES INC.
Inventor: Samuel Jones , Joseph Staehle , Lucy Cheng
CPC classification number: H04L63/1433 , G06F21/55 , G06F21/577 , H04L63/102 , H04L63/107 , H04L63/14 , H04L63/1425
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.
-
公开(公告)号:US11956267B2
公开(公告)日:2024-04-09
申请号:US17443272
申请日:2021-07-23
Applicant: Palantir Technologies Inc.
Inventor: Samuel Jones , Joseph Staehle , Lucy Cheng
CPC classification number: H04L63/1433 , G06F21/55 , G06F21/577 , H04L63/102 , H04L63/107 , H04L63/14 , H04L63/1425
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.
-
公开(公告)号:US11089043B2
公开(公告)日:2021-08-10
申请号:US16035956
申请日:2018-07-16
Applicant: Palantir Technologies Inc.
Inventor: Samuel Jones , Joseph Staehle , Lucy Cheng
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.
-
-
-