首页> 外国专利> Method and system for modeling all operations and executions of an attack and malicious process entry

Method and system for modeling all operations and executions of an attack and malicious process entry

机译:用于建模攻击和恶意进程条目的所有操作和执行的方法和系统

摘要

Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.
机译:计算机化方法和系统确定端点攻击的入口点或源,例如机器,例如计算机,网络的节点,系统等。这些计算机化方法和系统利用攻击执行/攻击或启动根,构建攻击树,该攻击树显示终点和攻击造成的攻击,因为它通过机器,网络,系统或者喜欢。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号