首页>
外国专利>
Data mining algorithms adopted for trusted execution environment
Data mining algorithms adopted for trusted execution environment
展开▼
机译:受信任执行环境采用的数据挖掘算法
展开▼
页面导航
摘要
著录项
相似文献
摘要
Distributed systems for protecting networked computer assets from compromise are disclosed. The distributed system includes one or more enterprise event sources, such as endpoint(s). The system also includes a server, such as a Big Data Analytics server, and optionally a security management server such as a Security Information and Event Management server. The Big Data Analytics server processes data collected from the enterprise event sources and produces behavioral profile models for each endpoint (or group of similar endpoints). The profiles, models, and ontology analysis are provided to the endpoints. Endpoint analytics use the output from the analytics servers to detect deviations from the endpoint's behavioral profile.
展开▼