白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Using neural networks to process forensics and generate threat intelligence information

專利號
US11888895B2
公開日期
2024-01-30
申請人
Proofpoint, Inc.(US CA Sunnyvale)
發(fā)明人
Zachary Mitchell Abzug; Kevin Patrick Blissett; Brian Sanford Jones
IPC分類
G06F7/04; H04L9/40; G06N3/08; G06N3/045
技術(shù)領(lǐng)域
campaign,platform,neural,or,may,forensics,threat,compromise,networks,threats
地域: CA CA Sunnyvale

摘要

Aspects of the disclosure relate to generating threat intelligence information. A computing platform may receive forensics information corresponding to message attachments. For each message attachment, the computing platform may generate a feature representation. The computing platform may input the feature representations into a neural network, which may result in a numeric representation for each message attachments. The computing platform may apply a clustering algorithm to cluster each message attachments based on the numeric representations, which may result in clustering information. The computing platform may extract, from the clustering information, one or more indicators of compromise indicating that one or more attachments corresponds to a threat campaign. The computing platform may send, to an enterprise user device, user interface information comprising the one or more indicators of compromise, which may cause the enterprise user device to display a user interface identifying the one or more indicators of compromise.

說明書

In some instances, in inputting this information and/or message metadata into the one or more neural networks, the campaign identification platform 110 may input unordered data of variable sizes. For example, the campaign identification platform 110 may input data corresponding to a first attachment that has five associated features and a second attachment that has three associated features. Typically, neural networks may be applied to fixed representations or sequences of data. One or more aspects of the disclosure provide a solution that overcomes this constraint, however, and these aspects enable successful analysis of unordered and variable data by neural networks. For example, such aspects of the disclosure enable processing of unordered data of variable size as opposed to merely data of a fixed sequence or representation.

Referring to FIG. 2C, at step 213, the campaign identification platform 110 may use a clustering algorithm to cluster the numerical representations output by the one or more neural networks. For example, the campaign identification platform 110 may cluster the numerical representations to produce clusters of forensics data and/or message metadata corresponding to groups of related threats and/or potential campaigns. Additionally or alternatively, the campaign identification platform 110 may cluster the numerical representations related to a particular attachment or URL together. In some instances, the campaign identification platform 110 may use a clustering algorithm such as connectivity based clustering, centroid based clustering, distribution based clustering, density based clustering, grid based clustering, and/or other clustering techniques.

權(quán)利要求

1
微信群二維碼
意見反饋