MASTER LEDGER AND LOCAL HOST LOG EXTENSION DETECTION AND MITIGATION OF FORGED AUTHENTICATION  ATTACKS

    公开(公告)号:US20240022546A1

    公开(公告)日:2024-01-18

    申请号:US18361825

    申请日:2023-07-29

    申请人: QOMPLX, Inc.

    IPC分类号: H04L9/40 H04L9/32

    摘要: A system and method for implementation of zero trust computer network security combined with stateful authentication object tracking, authentication object manipulation and forgery detection, and assessment of authentication and identity attack surface. The methodology involves gathering all authentication objects issued by a network, storing the authentication objects in a master ledger for use in stateful deterministic authentication object tracking, and running detection functions that compare authentication objects presented for access to network resources with the master ledger. In an embodiment, an authentication object agent is installed at the domain controller level. In another embodiment, a log extension utility is installed at the local host computer level to provide additional log data for additional cyberattack detections.

    SYSTEM AND METHOD FOR CYBER EXPLOITATION PATH ANALYSIS AND RESPONSE USING FEDERATED NETWORKS

    公开(公告)号:US20230370491A1

    公开(公告)日:2023-11-16

    申请号:US18358005

    申请日:2023-07-24

    申请人: QOMPLX, Inc.

    IPC分类号: H04L9/40

    摘要: A system and method for cyber exploitation path analysis and response using federated networks to minimize network exposure and maximize network resilience, with the ability to simulate complex and large scale network traffic through the use of federated training networks, by gathering network entity information, establishing baseline behaviors for each entity, and monitoring each entity for behavioral anomalies that might indicate cybersecurity concerns. Further, the system and method involve incorporating network topology information into the analysis by generating a model of the network, annotating the model with risk and criticality information for each entity in the model and with a vulnerability level between entities, and using the model to evaluate cybersecurity risks to the network. Lastly, network attack path analysis and automated task planning for minimizing network exposure and maximizing resiliency is performed with machine learning, generative adversarial networks, hierarchical task networks, and Monte Carlo search trees.

    MULTITEMPORAL DATA ANALYSIS
    98.
    发明公开

    公开(公告)号:US20230368076A1

    公开(公告)日:2023-11-16

    申请号:US18349909

    申请日:2023-07-10

    申请人: QOMPLX, Inc.

    摘要: A system for multitemporal data analysis is provided, comprising a directed computation graph service module configured to receive input data from a plurality of sources, analyze the input data to determine a best course of action for analyzing the input data, and split the input data for queueing to a general transformer service module or a decomposable service module based at least in part by analysis of the input data; a general transformer service module configured to receive data from the directed computation graph service module, and perform analysis on the received data; and a general transformer service module configured to receive data from directed computational graph module, and perform analysis on the received data.