System and methods for automated detection, reasoning and recommendations for resilient cyber systems
Abstract
A method for securing an IT (information technology) system using a set of methods for knowledge extraction, event detection, risk estimation and explanation for ranking cyber-alerts which includes a method to explain the relationship (or an attack pathway) from an entity (user or host) and an event context to another entity (a high-value resource) and an event context (attack or service failure).
- Inventors:
- Issue Date:
- Research Org.:
- Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1771700
- Patent Number(s):
- 10855706
- Application Number:
- 15/730,028
- Assignee:
- Battelle Memorial Institute (Richland, WA)
- Patent Classifications (CPCs):
-
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
G - PHYSICS G06 - COMPUTING G06N - COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- DOE Contract Number:
- AC05-76RL01830
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 10/11/2017
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Choudhury, Sutanay, Agarwal, Khushbu, Chen, Pin-Yu, and Ray, Indrajit. System and methods for automated detection, reasoning and recommendations for resilient cyber systems. United States: N. p., 2020.
Web.
Choudhury, Sutanay, Agarwal, Khushbu, Chen, Pin-Yu, & Ray, Indrajit. System and methods for automated detection, reasoning and recommendations for resilient cyber systems. United States.
Choudhury, Sutanay, Agarwal, Khushbu, Chen, Pin-Yu, and Ray, Indrajit. Tue .
"System and methods for automated detection, reasoning and recommendations for resilient cyber systems". United States. https://www.osti.gov/servlets/purl/1771700.
@article{osti_1771700,
title = {System and methods for automated detection, reasoning and recommendations for resilient cyber systems},
author = {Choudhury, Sutanay and Agarwal, Khushbu and Chen, Pin-Yu and Ray, Indrajit},
abstractNote = {A method for securing an IT (information technology) system using a set of methods for knowledge extraction, event detection, risk estimation and explanation for ranking cyber-alerts which includes a method to explain the relationship (or an attack pathway) from an entity (user or host) and an event context to another entity (a high-value resource) and an event context (attack or service failure).},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Dec 01 00:00:00 EST 2020},
month = {Tue Dec 01 00:00:00 EST 2020}
}
Works referenced in this record:
Deep Learning for Semantic Parsing Including Semantic Utterance Classification
patent-application, October 2015
- Dauphin, Yann Nicolas; Hakkani-Tur, Dilek Z.; Tur, Gokhan
- US Patent Application 14/260419; 20150310862
System and Method for Visualizing and Analyzing Cyber-Attacks Using a Graph Model
patent-application, October 2017
- Noel, Steven; Harley, Eric; Tam, Kam Him
- US Patent Application 15/084153; 20170289187
Detection Mitigation and Remediation of Cyberattacks Employing an Advanced Cyber-decision Platform
patent-application, May 2017
- Crabtree, Jason; Sellers, Andrew
- US Patent Application 15/237625; 20170126712
Network security threat detection by user/user-entity behavioral analysis
patent, December 2016
- Muddu, Sudhakar; Tryfonas, Christos
- US Patent Document 9,516,053
Platform, System, Process for Distributed Graph Databases and Computing
patent-application, December 2017
- Zhang, Cheu; Wu, Jing
- US Patent Application 15/624246; 20170364534
System, Method, and Computer Program Product for Determining Whether Parameter Configurations Meet Predetermined Criteria
patent-application, January 2014
- Spitzer, John F.
- US Patent Application 13/543184; 20140013303
Detecting Anomalies in Behavioral Network With Contextual Side Information
patent-application, July 2014
- Wang, Xiang; Thiesson, Bo; Stokes, III, Jack Wilson
- US Patent Application 13/730078; 20140188895
Network Anomaly Detection
patent-application, November 2015
- Lefebvre, Michael L.; Carver, Matthew; Ellett, Eric
- US Patent Application 14/285487; 20150341379
Cognitive offense analysis using contextual data and knowledge graphs
patent-application, February 2018
- Bird, William Alexander; Deffeyes, Suzanne Carol; Jang, Jiyong
- US Patent Application 15/236575; 20180048661
Performance Anomaly Diagnosis
patent-application, May 2016
- Konig, Arnd Christian; Dvorkin, Igor; Kumar, Manish
- US Patent Application 14/687848; 20160147585
System and Method for Generating Material Compositions
patent-application, April 2017
- Chee, Yi-Min; Jagmohan, Ashish; Luna, Pamela N.
- US Patent Application 14/974595; 20170116517
Intrusion Detection Platform
patent-application, March 2016
- Srivastava, Ashok N.; Gao, Yong; Xu, Yian
- US Patent Application 14/472886; 20160065594
Modular model workflow in a distributed computation system
patent, October 2018
- Muddu, Sudhakar; Tryfonas, Christos; Kavacheri, Sathyanarayanan
- US Patent Document 10,110,617
Anomaly Detection in Groups of Network Addresses
patent-application, October 2015
- Bernstein, Ruth; Dulkin, Andrey; Weiss, Assaf
- US Patent Application 14/253945; 20150304349
Anomaly Detection System and Method
patent-application, October 2016
- Malhotra, Pankaj; Shroff, Gautam; Agarwal, Puneet
- US Patent Application 15/019681; 20160299938
Cognitive memory encoding networks for fast semantic indexing storage and retrieval
patent, October 2015
- Majumdar, Arun
- US Patent Document 9,158,847
System and Method for Authorizing Customized Content
patent-application, June 2016
- Toumayan, Samuel G.; McMullin, III, John L.; Lewis, Paul
- US Patent Application 15/062393; 20160189193