首页> 外国专利> Attack Kill Chain Generation and Utilization for Threat Analysis

Attack Kill Chain Generation and Utilization for Threat Analysis

机译:攻击杀死链的生成和用于威胁分析

摘要

The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis. The method comprises receiving a first security event captured by a first security operation associated with a computing device, and receiving a second security event captured by a second security operation associated with the computing device. The first security event and the second security event are associated with an attack campaign. The method further comprises mapping the first security event to first security data in an attack repository, and mapping the second security event to second security data in the attack repository. The method also comprises determining based on the mapping, one or more attack execution operations for executing the attack campaign associated with the first security event and the second security event. Additionally, the method sequences the one or more attack execution operations to form an attack kill chain.
机译:本公开涉及用于生成用于威胁分析的攻击终止链的方法,系统和计算机程序产品。该方法包括:接收由与计算设备相关联的第一安全操作捕获的第一安全事件;以及接收由与计算设备相关联的第二安全操作捕获的第二安全事件。第一安全事件和第二安全事件与攻击活动相关联。该方法还包括将第一安全事件映射到攻击库中的第一安全数据,以及将第二安全事件映射到攻击库中的第二安全数据。该方法还包括基于该映射确定用于执行与第一安全事件和第二安全事件相关联的攻击活动的一个或多个攻击执行操作。另外,该方法对一个或多个攻击执行操作进行排序以形成攻击终止链。

著录项

  • 公开/公告号US2020327224A1

    专利类型

  • 公开/公告日2020-10-15

    原文格式PDF

  • 申请/专利权人 QUALYS INC.;

    申请/专利号US201916384543

  • 发明设计人 ANKUR S. TYAGI;MAYURESH VISHWAS DANI;

    申请日2019-04-15

  • 分类号G06F21/55;

  • 国家 US

  • 入库时间 2022-08-21 11:26:12

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号