首页>
外国专利>
Attack Kill Chain Generation and Utilization for Threat Analysis
Attack Kill Chain Generation and Utilization for Threat Analysis
展开▼
机译:攻击杀死链的生成和用于威胁分析
展开▼
页面导航
摘要
著录项
相似文献
摘要
The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis. The method comprises receiving a first security event captured by a first security operation associated with a computing device, and receiving a second security event captured by a second security operation associated with the computing device. The first security event and the second security event are associated with an attack campaign. The method further comprises mapping the first security event to first security data in an attack repository, and mapping the second security event to second security data in the attack repository. The method also comprises determining based on the mapping, one or more attack execution operations for executing the attack campaign associated with the first security event and the second security event. Additionally, the method sequences the one or more attack execution operations to form an attack kill chain.
展开▼