首页> 外国专利> Graph-based attack chain discovery in enterprise security systems

Graph-based attack chain discovery in enterprise security systems

机译:企业安全系统中基于图的攻击链发现

摘要

Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated based on the monitored system data that characterizes the tendency of processes to access system targets. Kill chains are generated that connect malicious events over a span of time from the event correlation graph that characterize events in an attack path over time by sorting events according to a maliciousness value and determining at least one sub-graph within the event correlation graph with an above-threshold maliciousness rank. A security management action is performed based on the kill chains.
机译:用于检测异常事件的方法和系统包括在监视的系统数据中检测异常事件。基于所监视的系统数据生成事件相关图,该事件特征图表征了进程访问系统目标的趋势。通过根据恶意度值对事件进行排序并确定事件相关图中的至少一个子图,可以生成杀死链,这些恶意链从事件相关图中连接一段时间内的恶意事件,这些事件相关图描述了一段时间内攻击路径中的事件的特征。阈值以上恶意级别。基于查杀链执行安全管理操作。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号