白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Using neural networks to process forensics and generate threat intelligence information

專利號
US11888895B2
公開日期
2024-01-30
申請人
Proofpoint, Inc.(US CA Sunnyvale)
發(fā)明人
Zachary Mitchell Abzug; Kevin Patrick Blissett; Brian Sanford Jones
IPC分類
G06F7/04; H04L9/40; G06N3/08; G06N3/045
技術領域
campaign,platform,neural,or,may,forensics,threat,compromise,networks,threats
地域: CA CA Sunnyvale

摘要

Aspects of the disclosure relate to generating threat intelligence information. A computing platform may receive forensics information corresponding to message attachments. For each message attachment, the computing platform may generate a feature representation. The computing platform may input the feature representations into a neural network, which may result in a numeric representation for each message attachments. The computing platform may apply a clustering algorithm to cluster each message attachments based on the numeric representations, which may result in clustering information. The computing platform may extract, from the clustering information, one or more indicators of compromise indicating that one or more attachments corresponds to a threat campaign. The computing platform may send, to an enterprise user device, user interface information comprising the one or more indicators of compromise, which may cause the enterprise user device to display a user interface identifying the one or more indicators of compromise.

說明書

Data source system 120 may be and/or include one or more computing devices that may be configured to store forensics data corresponding to files, attachments, URLs, and/or other data. For example, the data source system 120 may be configured to store one of more JavaScript Object Notation (JSON) documents that include one or more sets of forensics data for each attachment, file, URL, and/or other data. In one or more instances, the data source system 120 may be configured to communicate with the campaign identification platform 110 to share stored forensics data (which may, e.g., be used to train neural networks to generate intelligence information).

Electronic messaging server 130 may be and/or include one or more computing devices that may be configured to store and/or route electronic messages (e.g., emails, text messages, chat messages, and/or other message) between various user accounts and/or devices. In some instances, the electronic messaging server 130 may be configured to extract or otherwise identify metadata corresponding to the electronic messages. In these instances, the electronic messaging server 130 may be configured to communicate with the campaign identification platform 110 to share the identified metadata (e.g., which may be used to train neural networks to generate intelligence information).

Enterprise user device 140 may be configured to be used by a first user (who may e.g., be an employee of an enterprise organization). In some instances, enterprise user device 140 may be configured to present one or more user interfaces associated with identified intelligence information, receive forensics data and/or message metadata, and/or otherwise facilitate participation in generation and/or identification of threat intelligence information.

權利要求

1
微信群二維碼
意見反饋