METHOD AND DEVICE FOR MANAGING SECURITY IN A COMPUTER NETWORK
First Claim
1. A computer security system processing a security event comprising:
- (a) a behavior module that comprises a plurality of sub-algorithms, wherein each sub-algorithm corresponds to a predetermined category, which is related to a predetermined security issue; and
(b) a combination module that provides a security analysis based on the output of the behavior module.
0 Assignments
0 Petitions
Accused Products
Abstract
Method and device for managing security in a computer network include algorithms of iterative intelligence growth, iterative evolution, and evolution pathways; sub-algorithms of information type identifier, conspiracy detection, media scanner, privilege isolation analysis, user risk management and foreign entities management; and modules of security behavior, creativity, artificial threat, automated growth guidance, response/generic parser, security review module and monitoring interaction system. Applications include malware predictive tracking, clandestine machine intelligence retribution through covert operations in cyberspace, logically inferred zero-database a-priori realtime defense, critical infrastructure protection & retribution through cloud & tiered information security, and critical thinking memory & perception.
181 Citations
69 Claims
-
1. A computer security system processing a security event comprising:
-
(a) a behavior module that comprises a plurality of sub-algorithms, wherein each sub-algorithm corresponds to a predetermined category, which is related to a predetermined security issue; and (b) a combination module that provides a security analysis based on the output of the behavior module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A cyber security system comprising:
-
(i) a conspiracy detection sub-algorithm, which checks background for multiple security events, and determines patterns and correlations between the security events; and (ii) an Information type identifier sub-algorithm, which determines type of unknown data, and declares its confidence in the data type that it has chosen, and returns a failure flag if the confidence is lower than a predetermined level. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A method for iterative intelligence growth comprising steps of:
-
a) receiving input of an initial ruleset; b) receiving input of a plurality of personality trait, wherein the personal trait defines reactionary characteristics that should be exercised upon security events; c) choosing a personal trait and assigning the personal trait to an evolution pathway; d) repeating step c) for other evolution pathways for all of the personality traits; and e) executing the evolution pathways, wherein each of the evolution pathways evolves a plurality of generations according to its given personality trait; wherein the operation of each of the evolution pathways is virtually isolated from the operation of the other evolution pathways. - View Dependent Claims (48, 49, 50, 51, 52)
-
-
53. A cyber threat intelligence identification, integration and analysis system comprising:
-
a) an intelligent selector that receives two parent forms, wherein the parent forms represent abstract constructs of data, and merges the two parent forms into a hybrid form; b) a mode module that defines the type of an algorithm in which the system is being used, wherein the intelligent selector decides parts to merge based on the type of the algorithm; and c) a static criteria module that receives input of customization data for how forms should be merged. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
Specification