-
1.
公开(公告)号:US20240137283A1
公开(公告)日:2024-04-25
申请号:US17969389
申请日:2022-10-18
发明人: Michael Bastian KOUREMETIS , Christopher David JELLEN , William Bryan BOOTH , Andrew Fred APPLEBAUM
IPC分类号: H04L41/14 , G06F40/295 , G06F40/40
CPC分类号: H04L41/145 , G06F40/295 , G06F40/40
摘要: Described herein are systems and methods for generating a computing network from natural language descriptions of the computing network are provided. In one or more examples, the systems and methods described below can be used harvest publically available (or even privately available) natural language descriptions of a computing network, and convert those descriptions into an operational replica of the described computing network. By harvesting both publically available data, as well as other resources, the systems and methods described herein can allow for an analyst tasked with analyzing a given computing network to generate a fully operational replica of the computing network without having to have direct access to the network. In one or more examples, the analyst can recreate a fully-functional replica of the network to be analyzed based on partial descriptions of the computing network, thereby greatly improving the level of analysis capable of being performed.
-
2.
公开(公告)号:US20240235948A9
公开(公告)日:2024-07-11
申请号:US17969389
申请日:2022-10-19
发明人: Michael Bastian KOUREMETIS , Christopher David JELLEN , William Bryan BOOTH , Andrew Fred APPLEBAUM
IPC分类号: H04L41/14 , G06F40/295 , G06F40/40
CPC分类号: H04L41/145 , G06F40/295 , G06F40/40
摘要: Described herein are systems and methods for generating a computing network from natural language descriptions of the computing network are provided. In one or more examples, the systems and methods described below can be used harvest publically available (or even privately available) natural language descriptions of a computing network, and convert those descriptions into an operational replica of the described computing network. By harvesting both publically available data, as well as other resources, the systems and methods described herein can allow for an analyst tasked with analyzing a given computing network to generate a fully operational replica of the computing network without having to have direct access to the network. In one or more examples, the analyst can recreate a fully-functional replica of the network to be analyzed based on partial descriptions of the computing network, thereby greatly improving the level of analysis capable of being performed.
-