Attack situation visualization device, attack situation visualization method and recording medium

    公开(公告)号:US12126641B2

    公开(公告)日:2024-10-22

    申请号:US18107172

    申请日:2023-02-08

    申请人: NEC Corporation

    发明人: Masaru Kawakita

    IPC分类号: H04L9/40 H04L43/045

    摘要: An attack situation visualization device includes: a memory that stores instructions; and at least one processer configured to process the instructions to: analyze a log in which information about a cyberattack is recorded and specify at least either of a source of a communication related to the cyberattack and a destination of a communication related to the cyberattack; and generate display information allowing display of an image in which an image representing a map, a source image representing the source, and a destination image representing the destination are arranged on the map, wherein, the at least one processer configured to process the instructions to generate the display information including an attack situation image visualizing at least either of a traffic volume and a communication frequency of a communication related to the cyberattack between the source and the destination.

    Attack source tracing in SFC overlay network

    公开(公告)号:US11991186B2

    公开(公告)日:2024-05-21

    申请号:US17057571

    申请日:2018-05-22

    IPC分类号: G06F21/00 H04L9/40 H04L45/302

    摘要: Embodiments of the present disclosure relate to methods, devices and computer readable storage medium for tracing an attack source in a service function chain overlay network. In example embodiments, a request for tracing an attack source of an attacking data is sent at the attack tracer to a first service function chain domain of a plurality of service function chain domains through which the attacking data flow passes subsequently. The request includes flow characteristics of the attacking data flow. Then, the attack tracer receives a first set of results of flow matching based on the flow characteristics from the first service function chain domain. The attack tracer identifies the attack source in the plurality of service function chain domains at least in part based on the first set of results. In this way, the attack source may be traced efficiently in the service function chain overlay network.

    Systems and Methods for Tracking and Identifying Phishing Website Authors

    公开(公告)号:US20230208878A1

    公开(公告)日:2023-06-29

    申请号:US18145381

    申请日:2022-12-22

    摘要: A method of tracking phishing activity is disclosed. A request to download a webpage hosted as part of a legitimate website on a server is initiated. The request includes identification data pertaining to at least one user computing device. The identification data is extracted from the request. A unique identifier corresponding to the extracted identification data is generated.
    Fingerprint data is generated using at least a subset of the extracted identification data. The unique identifier, the extracted identification data and the fingerprint data is stored. The fingerprint data is encoded into a program and/or data associated with the webpage to generate a modified webpage. The modified webpage is transmitted from the server to the user computing device in response to the request.

    ATTACK SITUATION VISUALIZATION DEVICE, ATTACK SITUATION VISUALIZATION METHOD AND RECORDING MEDIUM

    公开(公告)号:US20230199013A1

    公开(公告)日:2023-06-22

    申请号:US18107172

    申请日:2023-02-08

    申请人: NEC Corporation

    发明人: Masaru KAWAKITA

    IPC分类号: H04L9/40 H04L43/045

    摘要: An attack situation visualization device includes: a memory that stores instructions; and at least one processer configured to process the instructions to: analyze a log in which information about a cyberattack is recorded and specify at least either of a source of a communication related to the cyberattack and a destination of a communication related to the cyberattack; and generate display information allowing display of an image in which an image representing a map, a source image representing the source, and a destination image representing the destination are arranged on the map, wherein, the at least one processer configured to process the instructions to generate the display information including an attack situation image visualizing at least either of a traffic volume and a communication frequency of a communication related to the cyberattack between the source and the destination.

    DETECTING SUSPICIOUS FILE ACTIVITY
    5.
    发明公开

    公开(公告)号:US20230164153A1

    公开(公告)日:2023-05-25

    申请号:US18095353

    申请日:2023-01-10

    IPC分类号: H04L9/40 G06N20/00

    摘要: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.

    Method for analyzing suspicious activity on an aircraft network

    公开(公告)号:US09774628B2

    公开(公告)日:2017-09-26

    申请号:US14829889

    申请日:2015-08-19

    IPC分类号: G06F21/55 H04L29/06

    摘要: An aircraft includes an aircraft network having nodes and links and a sandbox network in communication with the aircraft network. The sandbox network simulates the aircraft network and includes sandbox nodes corresponding to the nodes of the aircraft network, a first set of sandbox links corresponding to the links of the aircraft network, and a second set of sandbox links providing communication between sandbox nodes not in communication via the first set of sandbox links. Computer executable instructions, when executed, perform the steps of: generating network traffic over the sandbox network such that the sandbox network models a behavior of the aircraft network; identifying a suspicious activity on the aircraft network; routing the suspicious activity from the aircraft network to the sandbox network; and analyzing the suspicious activity as the suspicious activity traverses through the sandbox network.