Managing security actions in a computing environment based on communication activity of a security threat
First Claim
1. A method of improving security actions in a computing environment, wherein the computing environment comprises a plurality of computing assets, the method comprising:
- identifying a security threat within the computing environment;
obtaining state information for the security threat within the computing environment from computing assets of the plurality of computing assets in the computing environment, wherein the state information comprises at least communication activity related to the security threat, wherein the communication activity comprises at least a quantity of connections associated with the security threat and a quantity of exchanged data associated with the security threat;
determining a current state for the security threat within the computing environment based on the state information;
obtaining enrichment information for the security threat; and
determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
61 Citations
20 Claims
-
1. A method of improving security actions in a computing environment, wherein the computing environment comprises a plurality of computing assets, the method comprising:
-
identifying a security threat within the computing environment; obtaining state information for the security threat within the computing environment from computing assets of the plurality of computing assets in the computing environment, wherein the state information comprises at least communication activity related to the security threat, wherein the communication activity comprises at least a quantity of connections associated with the security threat and a quantity of exchanged data associated with the security threat; determining a current state for the security threat within the computing environment based on the state information; obtaining enrichment information for the security threat; and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus to improve security actions for a computing environment, wherein the computing environment comprises a plurality of computing assets, the apparatus comprising:
-
one or more non-transitory computer readable storage media; and processing instructions stored on the one or more computer readable media that, when executed by a processing system, direct the processing system to; identify a security threat within the computing environment; obtain state information for the security threat within the computing environment from computing assets of the plurality of computing assets in the computing environment, wherein the state information comprises at least communication activity related to the security threat, wherein the communication activity comprises at least a quantity of connections associated with the security threat and a quantity of exchanged data associated with the security threat; determine a current state for the security threat within the computing environment based on the state information; obtain enrichment information for the security threat; and determine one or more security actions for the security threat based on the enrichment information and the current state for the security threat. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An advisement system to improve security actions for a computing environment comprising a plurality of computing assets, the advisement system comprising:
-
a communication interface configured to receive a notification of a security threat within the computing environment; and a processing system, communicatively coupled to the communication interface, configured to; obtain state information for the security threat within the computing environment from computing assets of the plurality of computing assets in the computing environment, wherein the state information comprises at least communication activity related to the security threat, wherein the communication activity comprises at least a quantity of connections associated with the security threat and a quantity of exchanged data associated with the security threat; determine a current state for the security threat within the computing environment based on the state information; obtain enrichment information for the security threat; and determine one or more security actions for the security threat based on the enrichment information and the current state for the security threat. - View Dependent Claims (20)
-
Specification