The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 16, 2020

Filed:

Dec. 20, 2017
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Jiyong Jang, White Plains, NY (US);

Dhilung Hang Kirat, White Plains, NY (US);

Youngja Park, Princeton, NJ (US);

Marc Philippe Stoecklin, White Plains, NY (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 16/2458 (2019.01); G06N 20/00 (2019.01);
U.S. Cl.
CPC ...
H04L 63/1441 (2013.01); G06F 16/2465 (2019.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01); G06F 2216/03 (2013.01); G06N 20/00 (2019.01); H04L 63/145 (2013.01);
Abstract

A cognitive security analytics platform is enhanced by providing a computationally- and storage-efficient data mining technique to improve the confidence and support for one or more hypotheses presented to a security analyst. The approach herein enables the security analyst to more readily validate a hypothesis and thereby corroborate threat assertions to identify the true causes of a security offense or alert. The data mining technique is entirely automated but involves an efficient search strategy that significantly reduces the number of data queries to be made against a data store of historical data. To this end, the algorithm makes use of maliciousness information attached to each hypothesis, and it uses a confidence schema to sequentially test indicators of a given hypothesis to generate a rank-ordered (by confidence) list of hypotheses to be presented for analysis and response by the security analyst.


Find Patent Forward Citations

Loading…