白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Context informed abnormal endpoint behavior detection

專利號
US11888881B2
公開日期
2024-01-30
申請人
Palo Alto Networks, Inc.(US CA Santa Clara)
發(fā)明人
Shai Meir; Dany Cohen; Arkady Miasnikov; Ohad Ohayon
IPC分類
H04L9/40; G06N20/00
技術領域
causality,event,endpoint,adaptive,profile,malicious,security,file,normal,events
地域: CA CA Santa Clara

摘要

Adaptive normal profiles are generated at a hierarchical scope corresponding to a set of endpoints and a process. Abnormal endpoint activity is detected by verifying whether event data tracking activity on the set of endpoints conforms to the adaptive normal profiles. False positives are reduced by verifying alarms correspond to normal endpoint activity. Abnormal event data is forwarded to a causality chain identifier that identifies abnormal chains of processes for the abnormal endpoint activity. A trained threat detection model receives abnormal causality chains from the causality chain identifier and indicates a likelihood of corresponding to a malicious attack that indicates abnormal endpoint behavior.

說明書

The causality chain identifier can be pretrained on causality chains generated on endpoints with substantially similar context with known normal or abnormal behavior. The scope of the group of endpoints can contain the groups of endpoints corresponding to the causality graph and the causality chain identifier can be applied to multiple groups of endpoints. This avoids the need to train many identifiers for a large domain of endpoints. Abnormal event data used to train the causality chain identifier can correspond to a synthetic or real-world attack. A synthetic attack can be performed in a closed network using techniques from known real-world attacks. Real world or synthetic data can be augmented by appropriate randomization to generate more data. For example, identifiers for hierarchical endpoint levels can be randomized within certain identifier ranges, events can be added or removed at random, event severity indicators can be randomized within certain ranges, etc.

At block 815, the causality chain identifier provides the security monitor indications of the abnormal causality chains that have been identified. The identified abnormal causality chains can be used to train a thread detection model. This providing of the abnormal causality chains can be storing them in a database of abnormal causality chains or passing references to the security monitor.

FIG. 9 is a flowchart of example operations for detecting malicious attack chains. The security monitor relies on the abnormal causality chains that have been identified and a threat detection model that has been trained with the abnormal causality chains and benign causality chains.

權利要求

1
微信群二維碼
意見反饋