CA3184265A1 - Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia) - Google Patents
Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia)Info
- Publication number
- CA3184265A1 CA3184265A1 CA3184265A CA3184265A CA3184265A1 CA 3184265 A1 CA3184265 A1 CA 3184265A1 CA 3184265 A CA3184265 A CA 3184265A CA 3184265 A CA3184265 A CA 3184265A CA 3184265 A1 CA3184265 A1 CA 3184265A1
- Authority
- CA
- Canada
- Prior art keywords
- network
- module
- data
- traffic data
- endpoint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/046—Network management architectures or arrangements comprising network management agents or mobile agents therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/028—Capturing of monitoring data by filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/16—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/062—Generation of reports related to network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/20—Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
L'invention concerne des capteurs c d'agents de points d'extrémités qui peuvent être utilisés pour étendre la visibilité de réseau et renforcer des capacités de pistage pour un environnement de cybersécurité et de défense contre les menaces. Le capteur c peut comprend un module de réseau pour contrôler des informations de réseau entrant et sortant du dispositif informatique de point d'extrémité pour ingérer un premier ensemble de données de trafic provenant de connexions au réseau. Le capteur c peut également avoir un module de collation pour collecter le premier ensemble de données de trafic et obtenir des données d'entrée se rapportant à des événements de réseau observés. Un module d'analyseur peut recevoir les données d'entrée et utiliser un moteur DPI intelligent pour mettre en uvre des niveaux de DPI préétablis à partir de deux niveaux de DPI possibles ou plus sur les données d'entrée sur la base de paramètres de réseau. Le capteur c peut avoir un module de communication pour transmettre un deuxième ensemble de données de transmission à un appareil de cybersécurité sur la base du DPI spécifié mis en uvre. En outre, le capteur c peut avoir un module d'action autonome pour mettre en uvre une ou des actions autonomes en réponse à une ou des actions autonomes corrélées au deuxième ensemble de données de trafic reçu.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202063026446P | 2020-05-18 | 2020-05-18 | |
| US63/026,446 | 2020-05-18 | ||
| PCT/US2021/032995 WO2021236661A1 (fr) | 2020-05-18 | 2021-05-18 | Capteurs clients (capteurs c) d'agents de points d'extrémités et infrastructures associées destinées à étendre la visibilité de réseau dans un environnement de défense contre les menaces à intelligence artificielle (ia) |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CA3184265A1 true CA3184265A1 (fr) | 2021-11-25 |
Family
ID=78708907
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA3184265A Pending CA3184265A1 (fr) | 2020-05-18 | 2021-05-18 | Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia) |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP4154136A4 (fr) |
| CA (1) | CA3184265A1 (fr) |
| WO (1) | WO2021236661A1 (fr) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11438357B2 (en) | 2018-06-22 | 2022-09-06 | Senseon Tech Ltd | Endpoint network sensor and related cybersecurity infrastructure |
| GB2602254B (en) | 2020-12-15 | 2023-04-05 | Senseon Tech Ltd | Network traffic monitoring |
| GB201810294D0 (en) | 2018-06-22 | 2018-08-08 | Senseon Tech Ltd | Cybe defence system |
| GB201812171D0 (en) | 2018-07-26 | 2018-09-12 | Senseon Tech Ltd | Cyber defence system |
| US11902318B2 (en) | 2019-10-10 | 2024-02-13 | Alliance For Sustainable Energy, Llc | Network visualization, intrusion detection, and network healing |
| GB201915265D0 (en) | 2019-10-22 | 2019-12-04 | Senseon Tech Ltd | Anomaly detection |
| IL289845B2 (en) * | 2022-01-13 | 2025-05-01 | Chaim Yifrach Amichai | A system for detecting and preventing cyber attacks |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9088508B1 (en) * | 2014-04-11 | 2015-07-21 | Level 3 Communications, Llc | Incremental application of resources to network traffic flows based on heuristics and business policies |
| US11005814B2 (en) * | 2014-06-10 | 2021-05-11 | Hewlett Packard Enterprise Development Lp | Network security |
| WO2016073377A1 (fr) * | 2014-11-03 | 2016-05-12 | Seven Networks, Llc | Inspection approfondie de paquets (dpi) au niveau d'un point d'extrémité |
| US20160308898A1 (en) * | 2015-04-20 | 2016-10-20 | Phirelight Security Solutions Inc. | Systems and methods for tracking, analyzing and mitigating security threats in networks via a network traffic analysis platform |
| US20160381049A1 (en) * | 2015-06-26 | 2016-12-29 | Ss8 Networks, Inc. | Identifying network intrusions and analytical insight into the same |
| US10762201B2 (en) * | 2017-04-20 | 2020-09-01 | Level Effect LLC | Apparatus and method for conducting endpoint-network-monitoring |
-
2021
- 2021-05-18 CA CA3184265A patent/CA3184265A1/fr active Pending
- 2021-05-18 WO PCT/US2021/032995 patent/WO2021236661A1/fr not_active Ceased
- 2021-05-18 EP EP21808689.0A patent/EP4154136A4/fr active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| WO2021236661A1 (fr) | 2021-11-25 |
| EP4154136A1 (fr) | 2023-03-29 |
| EP4154136A4 (fr) | 2024-07-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12463985B2 (en) | Endpoint agent client sensors (cSENSORS) and associated infrastructures for extending network visibility in an artificial intelligence (AI) threat defense environment | |
| US20240333763A1 (en) | Artificial intelligence adversary red team | |
| US20230336581A1 (en) | Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures for network nodes | |
| US20230080471A1 (en) | Endpoint agent and system | |
| US12335293B2 (en) | Capturing importance in a network using graph theory | |
| US20240244073A1 (en) | Multi-stage anomaly detection for process chains in multi-host environments | |
| US20230095415A1 (en) | Helper agent and system | |
| US20220360597A1 (en) | Cyber security system utilizing interactions between detected and hypothesize cyber-incidents | |
| US20230011004A1 (en) | Cyber security sandbox environment | |
| US20230135660A1 (en) | Educational Tool for Business and Enterprise Risk Management | |
| US20210273973A1 (en) | SOFTWARE AS A SERVICE (SaaS) USER INTERFACE (UI) FOR DISPLAYING USER ACTIVITIES IN AN ARTIFICIAL INTELLIGENCE (AI)-BASED CYBER THREAT DEFENSE SYSTEM | |
| CA3184265A1 (fr) | Capteurs clients (capteurs c) d'agents de points d'extremites et infrastructures associees destinees a etendre la visibilite de reseau dans un environnement de defense contre les menaces a intelligence artificielle (ia) | |
| CA3226148A1 (fr) | Systeme de cybersecurite utilisant des interactions entre des cyber-incidents detectes et hypothetiques |