Network interface device

SL Pope, DJ Riddoch, D Roberts - US Patent 10,868,893, 2020 - Google Patents
(57) ABSTRACT A network interface device has in input. The input receives packets in
accordance with a protocol and has at least one protocol header. The network interface has …

Automated lifecycle system operations for threat mitigation

R Krebs - US Patent 10,637,888, 2020 - Google Patents
Techniques are described for automatically performing lifecycle operations to mitigate
identified threats via an intrusion detection (IDS) system and a lifecycle operations manager …

Network security enhancement through effective log analysis using ELK

IYM Al-Mahbashi, MB Potdar… - 2017 International …, 2017 - ieeexplore.ieee.org
The main aim for any organization is to provide protection for their critical assets because
they are face to face with many external threats that may cause interruption on providing …

Real-time push API for log events in enterprise threat detection

F Chrosziel, T Kunz, K Nos, M Rodeck - US Patent 10,630,705, 2020 - Google Patents
(57) ABSTRACT A log entry is received at a streaming component of an enterprise threat
detection (ETD) system from a real-time push application programming interface (API) …

Pattern creation in enterprise threat detection

E Pritzkau, JP Bohn, D Kartmann, WG Peng… - US Patent …, 2020 - Google Patents
Search results are received from an initiated free text search of log data from one or more
logs, where the free text is performed using search terms entered into a free text search …

Snapshot of a forensic investigation for enterprise threat detection

F Chrosziel, J Hassforther, T Kunz, H Mehta… - US Patent …, 2020 - Google Patents
An enterprise threat detection (ETD) forensic workspace is established according to a
particular timeframe and permitting defining a selection of data types from available log data …

System and Method For Assessing Network Security Risks

O Sage - US Patent App. 15/153,894, 2018 - Google Patents
A method for the assessment of an entities vulnerability to a cyber attack is disclosed that
includes the steps of creating a current profile for the entity based upon preselected selected …

Transition architecture from monolithic systems to microservice-based systems

S Koenig, A Jahr - US Patent 10,637,952, 2020 - Google Patents
Methods, systems, and computer-readable storage media for providing a transition service
broker, the transition service broker including a service registry proxy, and a service registry …

Intrusion detection system enrichment based on system lifecycle

R Krebs - US Patent 11,316,877, 2022 - Google Patents
Techniques are described for automatically incorporating lifecycle information for a secured
environment (SE) into an intrusion detection system monitoring the secured environment's …

Using frequency analysis in enterprise threat detection to detect intrusions in a computer system

K Nos, V Guzman, M Klose - US Patent 10,530,792, 2020 - Google Patents
The present disclosure describes methods, systems, and computer program products for
performing a frequency domain analysis of activity data for a computer system. One …