×

Cybersecurity system with differentiated capacity to deal with complex cyber attacks

  • US 10,148,678 B2
  • Filed: 10/01/2015
  • Issued: 12/04/2018
  • Est. Priority Date: 10/01/2015
  • Status: Active Grant
First Claim
Patent Images

1. An aviation cyber security system comprising:

  • a reactive sublayer that monitors and tracks cybersecurity sublayer data for forensic analysis, the cybersecurity sublayer data comprising data from across an aviation ecosystem that is selected from the group consisting of viruses, malware, domain name servers (DNS), denial of service (DOS) attacks, and Internet Protocol (IP) addresses and domains;

    a resilient overlayer that monitors, tracks, and measures cybersecurity overlayer data across a plurality of cyber environments comprising an aviation cyber environment, the cybersecurity overlayer data comprising events and news data relating to the cyber security system'"'"'s global goals, wherein the overlayer is disjoint from the sublayer;

    an anticipatory layer that monitors and tracks cybersecurity anticipatory layer data generated from an industry ecosystem for analysis, the anticipatory layer data being selected from the group consisting of viruses, malware, domain name servers (DNS), denial of service (DOS) attacks, and Internet Protocol (IP) addresses and domains, wherein the anticipatory layer is disjoint from the overlayer and from the reactive sublayer;

    a complex adaptive system (CAS) algorithm that is used to learn, predict, and take action based on the cybersecurity sublayer data, the cybersecurity overlayer data, and the cybersecurity anticipatory layer data, to feed information to a machine learning module, and to identify probable developing threat regions based at least in part of the cybersecurity overlayer data; and

    at least one bi-directional connection module that facilitates a feedback loop throughout the system, wherein the feedback loop comprises the machine learning module, wherein the overlayer and the sublayer exchange cybersecurity data via the at least one bi-directional connection module, and the exchanged cybersecurity data is correlated.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×