×

Enhanced network security

  • US 8,904,526 B2
  • Filed: 11/20/2012
  • Issued: 12/02/2014
  • Est. Priority Date: 11/20/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving a plurality of security threats;

    categorizing, by a processor, each security threat in the plurality of security threats into a security threat category of a plurality of security threat categories;

    determining, by the processor, based at least in part upon a first past occurrence of a first security threat category of the plurality of security threat categories and disregarding a second past occurrence of the first security threat category, that a number of occurrences of the first security threat category has increased;

    in response to the determination that the number of occurrences of the first security threat category has increased, determining, by the processor, based at least in part upon an instance of a second security threat category of the plurality of security threat categories and based at least in part upon a date associated with a past occurrence of the first security threat category, that the number of occurrences of the first security threat category will continue to increase;

    in response to the determination that the number of occurrences of the first security threat category will continue to increase, determining, by the processor, based at least in part upon a threshold, that the first security threat category is an emerging threat, wherein the threshold is based at least in part upon the first past occurrence of the first security threat category;

    determining, by the processor, a management priority for the first security threat category;

    determining, by the processor, based at least in part upon a past occurrence of the second security threat category, that a number of occurrences of the second security threat category has plateaued;

    in response to the determination that the number of occurrences of the second security threat category has plateaued, determining, by the processor, that the number of occurrences of the second security threat category will decrease; and

    determining, by the processor, based at least in part upon a past occurrence of a third security threat category of the plurality of security threat categories, that an instance of a fourth security threat category will occur.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×