白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Using neural networks to process forensics and generate threat intelligence information

專利號(hào)
US11888895B2
公開日期
2024-01-30
申請人
Proofpoint, Inc.(US CA Sunnyvale)
發(fā)明人
Zachary Mitchell Abzug; Kevin Patrick Blissett; Brian Sanford Jones
IPC分類
G06F7/04; H04L9/40; G06N3/08; G06N3/045
技術(shù)領(lǐng)域
campaign,platform,neural,or,may,forensics,threat,compromise,networks,threats
地域: CA CA Sunnyvale

摘要

Aspects of the disclosure relate to generating threat intelligence information. A computing platform may receive forensics information corresponding to message attachments. For each message attachment, the computing platform may generate a feature representation. The computing platform may input the feature representations into a neural network, which may result in a numeric representation for each message attachments. The computing platform may apply a clustering algorithm to cluster each message attachments based on the numeric representations, which may result in clustering information. The computing platform may extract, from the clustering information, one or more indicators of compromise indicating that one or more attachments corresponds to a threat campaign. The computing platform may send, to an enterprise user device, user interface information comprising the one or more indicators of compromise, which may cause the enterprise user device to display a user interface identifying the one or more indicators of compromise.

說明書

FIG. 3 depicts an illustrative method for using neural networks to process forensics and generate intelligence information in accordance with one or more example embodiments. Referring to FIG. 3, at step 305, a computing platform having at least one processor, a communication interface, and memory may receive information and/or message metadata that may be used to train one or more neural networks for threat identification. At step 310, the computing platform may extract one or more features from the information and/or message metadata. At step 315, the computing platform may aggregate the features by threat. At step 320, the computing platform may train the one or more neural networks to identify indicators of compromise using the information and/or message metadata. At step 325, the computing platform may receive new information and/or message metadata. At step 330, the computing platform may input the new information and/or message metadata into the one or more neural networks, which may result in numerical representations of the new information and/or message metadata. At step 335, the computing platform may cluster the numerical representations generated at 330. At step 340, the computing platform may apply heuristics to the clusters to identify indicators of compromise. At step 345, the computing platform may send indicators of compromise information to an enterprise user device. At step 350, the computing platform may identify whether any feedback was received in response to the indicators of compromise information. If feedback was not received, the method may end. If feedback was received, the computing platform may proceed to step 355. At step 355, the computing platform may retrain and/or otherwise update the neural network based on the feedback.

權(quán)利要求

1
微信群二維碼
意見反饋