Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_8d7ded7695c394148a2d02d016b9ccf6 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L41-0816 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1408 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L41-0886 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-564 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-53 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1433 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1425 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L41-145 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L43-062 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1491 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L51-212 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1441 |
classificationIPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-53 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L12-24 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06 |
filingDate |
2017-01-12^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_67ad25f4744243f90790ae29ab1365b8 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_beb4faa6fe0a1a442f95738995292deb |
publicationDate |
2017-08-03^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
WO-2017131963-A1 |
titleOfInvention |
Using high-interaction networks for targeted threat intelligence |
abstract |
Provided are methods, network devices, and computer-program products for targeted threat intelligence using a high-interaction network. In some implementations, a network device in a network may receive suspect network traffic. The suspect network traffic may include network traffic identified as potentially causing harm to the network. The network device may determine that the suspect traffic is associated with an unknown threat. The network device may further analyze the suspect network traffic using a high-interaction network. In various implementations, the high-interaction network may be configured to emulate at least a part of the network. In various implementations, analyzing the suspect network traffic may include determining a behavior of the suspect network traffic in the high-interaction network. The network device may further generate indicators, where the indicators may describe the suspect network traffic. In various implementations, the indicators facilitate analysis of a network's susceptibility to the unknown threat. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10362057-B1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10270789-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11374972-B2 |
priorityDate |
2016-01-29^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |