http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2017131963-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_8d7ded7695c394148a2d02d016b9ccf6
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L41-0816
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1408
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L41-0886
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-564
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-53
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1433
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1425
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L41-145
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L43-062
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1491
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L51-212
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1441
classificationIPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-53
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L12-24
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
filingDate 2017-01-12^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_67ad25f4744243f90790ae29ab1365b8
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_beb4faa6fe0a1a442f95738995292deb
publicationDate 2017-08-03^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2017131963-A1
titleOfInvention Using high-interaction networks for targeted threat intelligence
abstract Provided are methods, network devices, and computer-program products for targeted threat intelligence using a high-interaction network. In some implementations, a network device in a network may receive suspect network traffic. The suspect network traffic may include network traffic identified as potentially causing harm to the network. The network device may determine that the suspect traffic is associated with an unknown threat. The network device may further analyze the suspect network traffic using a high-interaction network. In various implementations, the high-interaction network may be configured to emulate at least a part of the network. In various implementations, analyzing the suspect network traffic may include determining a behavior of the suspect network traffic in the high-interaction network. The network device may further generate indicators, where the indicators may describe the suspect network traffic. In various implementations, the indicators facilitate analysis of a network's susceptibility to the unknown threat.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10362057-B1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10270789-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11374972-B2
priorityDate 2016-01-29^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID2162
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID34819
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID398259
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419534378
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID34819
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID398259

Showing number of triples: 1 to 36 of 36.