白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Using neural networks to process forensics and generate threat intelligence information

專利號(hào)
US11888895B2
公開日期
2024-01-30
申請(qǐng)人
Proofpoint, Inc.(US CA Sunnyvale)
發(fā)明人
Zachary Mitchell Abzug; Kevin Patrick Blissett; Brian Sanford Jones
IPC分類
G06F7/04; H04L9/40; G06N3/08; G06N3/045
技術(shù)領(lǐng)域
campaign,platform,neural,or,may,forensics,threat,compromise,networks,threats
地域: CA CA Sunnyvale

摘要

Aspects of the disclosure relate to generating threat intelligence information. A computing platform may receive forensics information corresponding to message attachments. For each message attachment, the computing platform may generate a feature representation. The computing platform may input the feature representations into a neural network, which may result in a numeric representation for each message attachments. The computing platform may apply a clustering algorithm to cluster each message attachments based on the numeric representations, which may result in clustering information. The computing platform may extract, from the clustering information, one or more indicators of compromise indicating that one or more attachments corresponds to a threat campaign. The computing platform may send, to an enterprise user device, user interface information comprising the one or more indicators of compromise, which may cause the enterprise user device to display a user interface identifying the one or more indicators of compromise.

說明書

As a particular example, the campaign identification platform 110 may identify that, for a particular attachment based cluster, a URL is known to host malicious content. Additionally or alternatively, the campaign identification platform 110 may identify that a sender, IP address, organization, country, and/or combination thereof is known to be a source of malicious content. Identifying these indicators of compromise may be useful (e.g., to a threat research or other cybersecurity analyst) in further researching a threat corresponding to this particular cluster. As an additional example, the campaign identification platform 110 may identify information about messages used to deliver threats, and may cluster the information and/or message metadata accordingly (e.g., based on a sender, IP address, organization name, country, and/or other data).

At step 215, the campaign identification platform 110 may send indicators of compromise information to the enterprise user device 140 (e.g., based on the indicators of compromise identified at step 214). In some instances, the campaign identification platform 110 may also send one or more commands directing the enterprise user device 140 to display an indicators of compromise interface based on the indicators of compromise, which may cause the enterprise user device 140 to generate and/or display an indicators of compromise interface based on the indicators of compromise information.

權(quán)利要求

1
微信群二維碼
意見反饋