首页>
外国专利>
Method and system for modeling all operations and executions of an attack and malicious process entry
Method and system for modeling all operations and executions of an attack and malicious process entry
展开▼
机译:用于建模攻击和恶意进程条目的所有操作和执行的方法和系统
展开▼
页面导航
摘要
著录项
相似文献
摘要
Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.
展开▼