Joined and coordinated detection, handling, and prevention of cyberattacks

    公开(公告)号:US11587177B2

    公开(公告)日:2023-02-21

    申请号:US14919506

    申请日:2015-10-21

    Abstract: Methods, devices, systems and computer program products enable monitoring and responding to cyber security attacks. One such system relates to a consortium of monitoring companies and an infrastructure including one or more central monitoring stations or local handling stations for a monitoring company are provided. A central monitoring station of a monitoring company detects a cyberattack that has been launched against a client computer system, and requests a local station to respond to the cyberattack via onsite visits or requests additional resources from other monitoring companies through the consortium system. The central monitoring station also sends to the consortium system updates on a cyberattack that is detected or mitigated by a central monitoring station or local handling station of the monitoring company. The monitoring consortium enables stronger capabilities than any individual monitoring company can offer by the combination and coordination of the efforts and resources of the members.

    Security sharing system
    9.
    发明授权
    Security sharing system 有权
    安全共享系统

    公开(公告)号:US09009827B1

    公开(公告)日:2015-04-14

    申请号:US14280490

    申请日:2014-05-16

    CPC classification number: H04L63/20 G06F21/50 G06F21/55 H04L63/14 H04L63/1441

    Abstract: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.

    Abstract translation: 本文描述了用于共享安全数据的系统和技术。 实体可以自动共享,调查,启用和/或使用安全规则和/或攻击数据。 可以在包括不同计算系统的不同实体上启用安全规则以对抗类似的安全威胁和/或攻击。 可以修改安全规则和/或攻击数据以修正敏感信息和/或通过访问控制进行配置以进行共享。

Patent Agency Ranking