[go: up one dir, main page]

CA3184265A1 - Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia) - Google Patents

Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia)

Info

Publication number
CA3184265A1
CA3184265A1 CA3184265A CA3184265A CA3184265A1 CA 3184265 A1 CA3184265 A1 CA 3184265A1 CA 3184265 A CA3184265 A CA 3184265A CA 3184265 A CA3184265 A CA 3184265A CA 3184265 A1 CA3184265 A1 CA 3184265A1
Authority
CA
Canada
Prior art keywords
network
module
data
traffic data
endpoint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA3184265A
Other languages
English (en)
Inventor
Simon David Lincoln FELLOWS
Jack Benjamin STOCKDALE
Thoams Alexander Chesney JENKINSON
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Darktrace Holdings Ltd
Original Assignee
Darktrace Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Darktrace Holdings Ltd filed Critical Darktrace Holdings Ltd
Publication of CA3184265A1 publication Critical patent/CA3184265A1/fr
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/028Capturing of monitoring data by filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/16Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/20Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

L'invention concerne des capteurs c d'agents de points d'extrémités qui peuvent être utilisés pour étendre la visibilité de réseau et renforcer des capacités de pistage pour un environnement de cybersécurité et de défense contre les menaces. Le capteur c peut comprend un module de réseau pour contrôler des informations de réseau entrant et sortant du dispositif informatique de point d'extrémité pour ingérer un premier ensemble de données de trafic provenant de connexions au réseau. Le capteur c peut également avoir un module de collation pour collecter le premier ensemble de données de trafic et obtenir des données d'entrée se rapportant à des événements de réseau observés. Un module d'analyseur peut recevoir les données d'entrée et utiliser un moteur DPI intelligent pour mettre en uvre des niveaux de DPI préétablis à partir de deux niveaux de DPI possibles ou plus sur les données d'entrée sur la base de paramètres de réseau. Le capteur c peut avoir un module de communication pour transmettre un deuxième ensemble de données de transmission à un appareil de cybersécurité sur la base du DPI spécifié mis en uvre. En outre, le capteur c peut avoir un module d'action autonome pour mettre en uvre une ou des actions autonomes en réponse à une ou des actions autonomes corrélées au deuxième ensemble de données de trafic reçu.
CA3184265A 2020-05-18 2021-05-18 Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia) Pending CA3184265A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US202063026446P 2020-05-18 2020-05-18
US63/026,446 2020-05-18
PCT/US2021/032995 WO2021236661A1 (fr) 2020-05-18 2021-05-18 Capteurs clients (capteurs c) d'agents de points d'extrémités et infrastructures associées destinées à étendre la visibilité de réseau dans un environnement de défense contre les menaces à intelligence artificielle (ia)

Publications (1)

Publication Number Publication Date
CA3184265A1 true CA3184265A1 (fr) 2021-11-25

Family

ID=78708907

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3184265A Pending CA3184265A1 (fr) 2020-05-18 2021-05-18 Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia)

Country Status (3)

Country Link
EP (1) EP4154136A4 (fr)
CA (1) CA3184265A1 (fr)
WO (1) WO2021236661A1 (fr)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11438357B2 (en) 2018-06-22 2022-09-06 Senseon Tech Ltd Endpoint network sensor and related cybersecurity infrastructure
GB2602254B (en) 2020-12-15 2023-04-05 Senseon Tech Ltd Network traffic monitoring
GB201810294D0 (en) 2018-06-22 2018-08-08 Senseon Tech Ltd Cybe defence system
GB201812171D0 (en) 2018-07-26 2018-09-12 Senseon Tech Ltd Cyber defence system
US11902318B2 (en) 2019-10-10 2024-02-13 Alliance For Sustainable Energy, Llc Network visualization, intrusion detection, and network healing
GB201915265D0 (en) 2019-10-22 2019-12-04 Senseon Tech Ltd Anomaly detection
IL289845B2 (en) * 2022-01-13 2025-05-01 Chaim Yifrach Amichai A system for detecting and preventing cyber attacks

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9088508B1 (en) * 2014-04-11 2015-07-21 Level 3 Communications, Llc Incremental application of resources to network traffic flows based on heuristics and business policies
US11005814B2 (en) * 2014-06-10 2021-05-11 Hewlett Packard Enterprise Development Lp Network security
WO2016073377A1 (fr) * 2014-11-03 2016-05-12 Seven Networks, Llc Inspection approfondie de paquets (dpi) au niveau d'un point d'extrémité
US20160308898A1 (en) * 2015-04-20 2016-10-20 Phirelight Security Solutions Inc. Systems and methods for tracking, analyzing and mitigating security threats in networks via a network traffic analysis platform
US20160381049A1 (en) * 2015-06-26 2016-12-29 Ss8 Networks, Inc. Identifying network intrusions and analytical insight into the same
US10762201B2 (en) * 2017-04-20 2020-09-01 Level Effect LLC Apparatus and method for conducting endpoint-network-monitoring

Also Published As

Publication number Publication date
WO2021236661A1 (fr) 2021-11-25
EP4154136A1 (fr) 2023-03-29
EP4154136A4 (fr) 2024-07-17

Similar Documents

Publication Publication Date Title
US12463985B2 (en) Endpoint agent client sensors (cSENSORS) and associated infrastructures for extending network visibility in an artificial intelligence (AI) threat defense environment
US20240333763A1 (en) Artificial intelligence adversary red team
US20230336581A1 (en) Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures for network nodes
US20230080471A1 (en) Endpoint agent and system
US12335293B2 (en) Capturing importance in a network using graph theory
US20240244073A1 (en) Multi-stage anomaly detection for process chains in multi-host environments
US20230095415A1 (en) Helper agent and system
US20220360597A1 (en) Cyber security system utilizing interactions between detected and hypothesize cyber-incidents
US20230011004A1 (en) Cyber security sandbox environment
US20230135660A1 (en) Educational Tool for Business and Enterprise Risk Management
US20210273973A1 (en) SOFTWARE AS A SERVICE (SaaS) USER INTERFACE (UI) FOR DISPLAYING USER ACTIVITIES IN AN ARTIFICIAL INTELLIGENCE (AI)-BASED CYBER THREAT DEFENSE SYSTEM
CA3184265A1 (fr) Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia)
CA3226148A1 (fr) Systeme de cybersecurite utilisant des interactions entre des cyber-incidents detectes et hypothetiques