Security intelligence automation platform using flows

作者: Saurabh Kumar

DOI:

关键词: Ranking (information retrieval)AutomationComputer networkEvent dataInterface (computing)Computer science

摘要: A system for security intelligence automation using flows is disclosed. In various embodiments, a includes communications interface configured to receive events. The processor select event data associated with the events, where computer network environment. may be further segment along plurality of dimensions, score and generate ranking each events based at least in part on scoring data.

参考文章(20)
Nitin Kumar Hardeniya, R. Mathangi Sri, Vaibhav Srivastava, Ravi Vijayaraghavan, Categorization of user interactions into predefined hierarchical categories ,(2014)
Michael Paul Bringle, Mark Remington, Paul Pyryemybida, Jorge Monasterio, Systems and Methods for Vulnerability Detection and Scoring with Threat Assessment ,(2007)
Matthew Johnson, Jeffrey M. Bradshaw, Marco M. Carvalho, Thomas C. Eskridge, Paul J. Feltovich, Lawrence K. Bunch, Event data visualization tool ,(2012)
David A. Selby, Gary F. Anderson, Stephen J. Todd, Mark S. Ramsey, Rank-based evaluation ,(2008)
Yolanta Beresnevichiene, Fotios Tsifountidis, Network security risk assessment ,(2011)
Christopher D. Coleman, Allan Thomson, John Joseph Helmsen, Christopher Paul Pinney Wood, Cyber threat monitor and control apparatuses, methods and systems ,(2015)