首页> 外国专利> GRAPH-BASED ATTACK CHAIN DISCOVERY IN ENTERPRISE SECURITY SYSTEMS

GRAPH-BASED ATTACK CHAIN DISCOVERY IN ENTERPRISE SECURITY SYSTEMS

机译:企业安全系统中基于图形的攻击链发现

摘要

Methods and systems for detecting anomalous events include detecting anomalous events (42, 43) in monitored system data. An event correlation graph is generated (302) based on the monitored system data that characterizes the tendency of processes to access system targets. Kill chains are generated (310) that connect malicious events over a span of time from the event correlation graph that characterize events in an attack path over time by sorting events according to a maliciousness value and determining at least one sub-graph within the event correlation graph with an above-threshold maliciousness rank. A security management action is performed (412) based on the kill chains.
机译:用于检测异常事件的方法和系统包括在监视的系统数据中检测异常事件(42、43)。基于所监视的系统数据来生成事件相关图(302),该事件相关图表征了进程访问系统目标的趋势。通过根据恶意度值对事件进行排序并确定事件相关性内的至少一个子图,生成杀死链,将其与事件相关性图关联起来,从而在一段时间内连接恶意事件,该事件相关性图描述了攻击路径中的事件随时间变化的特征具有最高阈值恶意排名的图表。基于查杀链执行安全管理动作(412)。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号