首页> 外国专利> Method And System For Modeling All Operations And Executions Of An Attack And Malicious Process Entry

Method And System For Modeling All Operations And Executions Of An Attack And Malicious Process Entry

机译:对攻击和恶意进程进入的所有操作和执行进行建模的方法和系统

摘要

Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.
机译:计算机化的方法和系统确定对端点(例如机器,例如计算机,网络,系统的节点)的攻击的入口点或来源。这些计算机化的方法和系统利用攻击执行/攻击或起始根来构建攻击树,该树显示在端点上的攻击以及通过计算机,网络,系统或网络传播的攻击所造成的破坏。喜欢。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号