首页> 外国专利> Probing and Responding to Computer Network Security Breaches

Probing and Responding to Computer Network Security Breaches

机译:探索和应对计算机网络安全漏洞

摘要

A method of probing and responding to a security breach in a computer network security system includes defining first and second rules and defining a model to output a probability that a security breach has occurred based on an input and to generate commands. Data is collected at first nodes according to the first rules and a first portion of the collected data is selected and sent from the first nodes to a second node. The selected first portion is input into the model to obtain an output probability that a security breach has occurred and the following steps are performed: determining signs of a security breach, generating a first command with the model to cause a second portion of the collected data to be selected, and generating a second command with the model to cause a change in settings at one or more of the first nodes.
机译:一种在计算机网络安全系统中探测和响应安全漏洞的方法,包括定义第一和第二规则以及定义模型以基于输入来输出发生安全漏洞的可能性并生成命令。根据第一规则在第一节点处收集数据,并选择收集的数据的第一部分并将其从第一节点发送到第二节点。将所选的第一部分输入到模型中以获得发生安全漏洞的输出概率,然后执行以下步骤:确定安全漏洞的迹象,使用模型生成第一条命令以导致收集到的数据的第二部分选择要使用的模型,并使用该模型生成第二条命令以更改一个或多个第一节点上的设置。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号