×

Automated internet threat detection and mitigation system and associated methods

  • US 9,258,321 B2
  • Filed: 08/22/2013
  • Issued: 02/09/2016
  • Est. Priority Date: 08/23/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented system for automated internet threat detection and mitigation, the system comprising:

  • a centralized database;

    a customer database operable with the centralized database;

    a threat Intelligence subsystem for receiving intelligence data from a plurality of external intelligence sources;

    an analytics subsystem communicating with the threat intelligence subsystem for tracking accuracy and relevance of the intelligence data, wherein suspicious patterns are transmitted to the centralized database for use by automatic query security tools in a customer network environment;

    a data gathering subsystem for gathering public data from a plurality of website sources sufficient for providing context for the analytics subsystem;

    a portal subsystem comprising at least one of an analyst portal and a customer portal, wherein;

    the analyst portal allows analysts to query the customer database and incidents detected resulting from patterns from the threat intelligence segment, the analyst portal further tracks various metrics of analyst performance and provides feedback to the system; and

    the customer portal operable for allowing the customer to view the analyst performance metrics as well as customize threat intelligence feeds, local security tools, and descriptions of the customer environment and customer assets, and wherein the customer portal provides information feedback for the system; and

    a Honeytrap subsystem deployed within the customer network environment, wherein the Honeytrap subsystem monitors scams and cyber-attacks and analyzes suspicious activity, feeding resulting analysis data to the analytics subsystem, wherein the Honeytrap subsystem is operable for monitoring files used by adversaries on compromised computers so as to form a basis of an early alerting system, and wherein the Honeytrap subsystem is customized to particular locations, and automatically incorporating and quarantining infected computers.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×