DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: System and methods for automated detection, reasoning and recommendations for resilient cyber systems

Abstract

A method for securing an IT (information technology) system using a set of methods for knowledge extraction, event detection, risk estimation and explanation for ranking cyber-alerts which includes a method to explain the relationship (or an attack pathway) from an entity (user or host) and an event context to another entity (a high-value resource) and an event context (attack or service failure).

Inventors:
; ; ;
Issue Date:
Research Org.:
Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1771700
Patent Number(s):
10855706
Application Number:
15/730,028
Assignee:
Battelle Memorial Institute (Richland, WA)
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
G - PHYSICS G06 - COMPUTING G06N - COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
DOE Contract Number:  
AC05-76RL01830
Resource Type:
Patent
Resource Relation:
Patent File Date: 10/11/2017
Country of Publication:
United States
Language:
English

Citation Formats

Choudhury, Sutanay, Agarwal, Khushbu, Chen, Pin-Yu, and Ray, Indrajit. System and methods for automated detection, reasoning and recommendations for resilient cyber systems. United States: N. p., 2020. Web.
Choudhury, Sutanay, Agarwal, Khushbu, Chen, Pin-Yu, & Ray, Indrajit. System and methods for automated detection, reasoning and recommendations for resilient cyber systems. United States.
Choudhury, Sutanay, Agarwal, Khushbu, Chen, Pin-Yu, and Ray, Indrajit. Tue . "System and methods for automated detection, reasoning and recommendations for resilient cyber systems". United States. https://www.osti.gov/servlets/purl/1771700.
@article{osti_1771700,
title = {System and methods for automated detection, reasoning and recommendations for resilient cyber systems},
author = {Choudhury, Sutanay and Agarwal, Khushbu and Chen, Pin-Yu and Ray, Indrajit},
abstractNote = {A method for securing an IT (information technology) system using a set of methods for knowledge extraction, event detection, risk estimation and explanation for ranking cyber-alerts which includes a method to explain the relationship (or an attack pathway) from an entity (user or host) and an event context to another entity (a high-value resource) and an event context (attack or service failure).},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Dec 01 00:00:00 EST 2020},
month = {Tue Dec 01 00:00:00 EST 2020}
}

Works referenced in this record:

Deep Learning for Semantic Parsing Including Semantic Utterance Classification
patent-application, October 2015


System and Method for Visualizing and Analyzing Cyber-Attacks Using a Graph Model
patent-application, October 2017


Detection Mitigation and Remediation of Cyberattacks Employing an Advanced Cyber-decision Platform
patent-application, May 2017


Platform, System, Process for Distributed Graph Databases and Computing
patent-application, December 2017


Detecting Anomalies in Behavioral Network With Contextual Side Information
patent-application, July 2014


Network Anomaly Detection
patent-application, November 2015


Cognitive offense analysis using contextual data and knowledge graphs
patent-application, February 2018


Performance Anomaly Diagnosis
patent-application, May 2016


System and Method for Generating Material Compositions
patent-application, April 2017


Intrusion Detection Platform
patent-application, March 2016


Modular model workflow in a distributed computation system
patent, October 2018


Anomaly Detection in Groups of Network Addresses
patent-application, October 2015


Anomaly Detection System and Method
patent-application, October 2016


System and Method for Authorizing Customized Content
patent-application, June 2016