System and method for generating and refining cyber threat intelligence data
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-011/00
G06F-012/14
G06F-012/16
G08B-023/00
H04L-029/06
출원번호
US-0192152
(2011-07-27)
등록번호
US-9118702
(2015-08-25)
발명자
/ 주소
MaCaulay, Tyson
출원인 / 주소
BCE Inc.
대리인 / 주소
Gowling Lafleur Henderson LLP
인용정보
피인용 횟수 :
18인용 특허 :
5
초록▼
A method of refining cyber threat intelligence data, comprising: sending a first version of a threat list to a first cyber threat intelligence source and to a second cyber threat intelligence source; obtaining original first cyber threat intelligence data from the first source; obtaining original se
A method of refining cyber threat intelligence data, comprising: sending a first version of a threat list to a first cyber threat intelligence source and to a second cyber threat intelligence source; obtaining original first cyber threat intelligence data from the first source; obtaining original second cyber threat intelligence data from the second source; creating a second version of the threat list based on at least the original first cyber threat intelligence data and the original second cyber threat intelligence data; sending the second version of the threat list to the first source and to the second source; obtaining new first cyber threat intelligence data from the first source; obtaining new second cyber threat intelligence data from the second source; and creating a third version of the threat list based on at least the new first cyber threat intelligence data and the new second cyber threat intelligence data.
대표청구항▼
1. A method of refining cyber threat intelligence data, performed by network equipment in a carrier network controlled by a carrier network operator, comprising: sending a first version of a threat list to a first cyber threat intelligence source and to a second cyber threat intelligence source;obta
1. A method of refining cyber threat intelligence data, performed by network equipment in a carrier network controlled by a carrier network operator, comprising: sending a first version of a threat list to a first cyber threat intelligence source and to a second cyber threat intelligence source;obtaining original first cyber threat intelligence data from the first cyber threat intelligence source, the original first cyber threat intelligence data being issued by the first cyber threat intelligence source based on the first version of the threat list, wherein the original first cyber threat intelligence data includes an original first set of instances of traffic attributes deemed by the first cyber threat intelligence source to be suspicious and an original first event log relating to communications characterized by the original first set of instances of traffic attributes deemed by the first cyber threat intelligence source to be suspicious;obtaining original second cyber threat intelligence data from the second cyber threat intelligence source, the original second cyber threat intelligence data being issued by the second cyber threat intelligence source also based on the first version of the threat list, wherein the original second cyber threat intelligence data includes an original second set of instances of traffic attributes deemed by the second cyber threat intelligence source to be suspicious and an original second event log relating to communications characterized by the original second set of instances of traffic attributes deemed by the second cyber threat intelligence source to be suspicious;determining (i) an original plurality of instances of traffic attributes from the original first and second sets of instances of traffic attributes and (ii) a reputation score for each instance in the original plurality of instances of traffic attributes, the reputation score for each instance in the original plurality of instances of traffic attributes being determined based on factors including at least: the instances of traffic attributes in the original first and second sets of instances of traffic attributes;the communications logged in the original first and second event logs;an origin of the original first cyber threat intelligence data which originates either internal or external to the carrier network and an origin of the original second cyber threat intelligence data which originates either internal or external to the carrier network:creating a second version of the threat list including at least the traffic attributes from the original plurality of instances of traffic attributes with a reputation score below a predetermined threshold reputation score;sending the second version of the threat list to the first cyber threat intelligence source and to the second cyber threat intelligence source;obtaining new first cyber threat intelligence data from the first cyber threat intelligence source, the new first cyber threat intelligence data being issued by the first cyber threat intelligence source based on the second version of the threat list, wherein the new first cyber threat intelligence data includes a new first set of instances of traffic attributes deemed by the first cyber threat intelligence source to be suspicious and a new first event log relating to communications characterized by the new set of instances of traffic attributes deemed by the first cyber threat intelligence source to be suspicious;obtaining new second cyber threat intelligence data from the second cyber threat intelligence source, the new second cyber threat intelligence data being issued by the second cyber threat intelligence source also based on the second version of the threat list, wherein the new second cyber threat intelligence data includes a new second set of instances of traffic attributes deemed by the second cyber threat intelligence source to be suspicious and a new second event log relating to communications characterized by the new set of instances of traffic attributes deemed by the second cyber threat intelligence source to be suspicious;determining (i) a new plurality of instances of traffic attributes from the new first and second sets of instances of traffic attributes and (ii) a reputation score for each instance in the new plurality of instances of traffic attributes, the reputation score for each instance in the new plurality of instances of traffic attributes being determined based on factors including at least: the instances of traffic attributes in the new first and second sets of instances of traffic attributes;the communications logged in the new first and second event logs;an origin of the new first cyber threat intelligence data which originates either internal or external to the carrier network and an origin of the new second cyber threat intelligence data which originates either internal or external to the carrier network;creating a third version of the threat list including at least the traffic attributes from the new plurality of instances of traffic attributes with a reputation score below a predetermined threshold reputation score. 2. The method defined in claim 1, wherein the third version of the threat list differs from the second version of the threat list. 3. The method defined in claim 1, wherein each version of the threat list includes a set of instances of traffic attributes. 4. The method defined in claim 3, wherein the third version of the threat list includes at least one instance of a traffic attribute that is absent from the second version of the threat list. 5. The method defined in claim 3, wherein the second version of the threat list includes at least one instance of a traffic attribute that is absent from the third version of the threat list. 6. The method defined in claim 5, wherein the third version of the threat list includes at least one instance of a traffic attribute that is absent from the second version of the threat list. 7. The method defined in claim 1, wherein the first and second cyber threat intelligence sources comprise network elements of a communications network equipped with traffic activity monitoring capabilities. 8. The method defined in claim 7, wherein the traffic activity monitoring capabilities include one or more of traffic flow monitoring, domain name server (DNS) query monitoring, message monitoring and peer-to-peer (P2P) session monitoring. 9. A system for refining cyber threat intelligence data, comprising: network equipment in a carrier network controlled by a carrier network operator, configured to:send a first version of a threat list to a first cyber threat intelligence source and to a second cyber threat intelligence source;obtain original first cyber threat intelligence data from the first cyber threat intelligence source, the original first cyber threat intelligence data being issued by the first cyber threat intelligence source based on the first version of the threat list, the original first cyber threat intelligence data including an original first set of instances of traffic attributes deemed by the first cyber threat intelligence source to be suspicious and an original first event log relating to communications characterized by the original first set of instances of traffic attributes deemed by the first cyber threat intelligence source to be suspicious;obtain original second cyber threat intelligence data from the second cyber threat intelligence source, the original second cyber threat intelligence data being issued by the second cyber threat intelligence source also based on the first version of the threat list, the original second cyber threat intelligence data including an original second set of instances of traffic attributes deemed by the second cyber threat intelligence source to be suspicious and an original second event log relating to communications characterized by the original second set of instances of traffic attributes deemed by the second cyber threat intelligence source to be suspicious;determine (i) an original plurality of instances of traffic attributes from the original first and second sets of instances of traffic attributes and (ii) a reputation score for each instance in the original plurality of instances of traffic attributes, the reputation score for each instance in the original plurality of instances of traffic attributes being determined based on factors including at least: the instances of traffic attributes in the original first and second set of instances of traffic attributes;the communications logged in the original first and second event logs; andan origin of the original first cyber threat intelligence data which originates either internal or external to the carrier network and an origin of the original second cyber threat intelligence data which originates either internal or external to the carrier network;create a second version of the threat list a including at least the traffic attributes from the original plurality of instances of traffic attributes with a reputation score below a predetermined threshold reputation score;send the second version of the thread list the first cyber threat intelligence source and to the second cyber threat intelligence source;obtain new first cyber threat intelligence data from the first cyber threat intelligence source, the new first cyber threat intelligence data being issued by the first cyber threat intelligence source based on the second version of the threat list, the new first cyber threat intelligence data including a new first set of instances of traffic attributes deemed by the first cyber threat intelligence source to be suspicious and a new first event log relating to communications characterized by the new set of instances of traffic attributes deemed by the first cyber threat intelligence source to be suspicious;obtain new second threat intelligence data from the second cyber threat intelligence source, the new second cyber threat intelligence data being issued by the second cyber threat intelligence source also based on the second version of the threat list, the new second cyber threat intelligence data including a new second set of instances of traffic attributes deemed by the second cyber threat intelligence source to be suspicious and a new second event log relating to communications characterized by the new set of instances of traffic attributes deemed by the second cyber threat intelligence source to be suspicious;determine (i) a new plurality of instances of traffic attributes from the new first and second sets of instances of traffic attributes and (ii) a reputation score for each instance in the new plurality of instances of traffic attributes, the reputation score for each instance in the new plurality of instances of traffic attributes being determined based on factors including at least: the instances of traffic attributes in the new first and second set of instances of traffic attributes;the communications logged in the new first and second event logs:an origin of the new first cyber threat intelligence data which originates either internal or external to the carrier network and an origin of the new second cyber threat intelligence data which originates either internal or external to the carrier network;create a third version of the threat list including at least the traffic attributes from the new plurality of instances of traffic attributes with a reputation score below a determined threshold reputation score. 10. The system defined in claim 9, wherein the cyber threat intelligence report includes the reputation scores for the respective instances of traffic attributes included in the cyber threat intelligence report. 11. The system defined in claim 10, wherein the cyber threat intelligence report further includes logged event data from the first and second event logs pertaining to the instances of traffic attributes included in the cyber threat intelligence report. 12. The system defined in claim 11, wherein at least one of the first cyber threat intelligence source and the second cyber threat intelligence source is a gateway to a customer network having a plurality of users, and wherein the gateway correlates the logged event data with historical data to identify among the users, those that are potentially compromised. 13. The system defined in claim 9, wherein the second cyber threat intelligence source is controlled by an operator of a customer network having a plurality of users, the customer network being other than the carrier network. 14. The system defined in claim 9, wherein at least one of a first cyber threat intelligence source and to a second cyber threat intelligence source is a network element within a customer network having a plurality of users, the customer network being other than the carrier network. 15. The system defined in claim 14, wherein the carrier network provides Internet access to the customer network. 16. The system defined in claim 9, wherein the factors on which is based the reputation score for each instance in the plurality of instances of traffic attributes further includes: a count of how many of cyber threat intelligence sources that have revealed a particular instance of the plurality of instances of traffic attributes. 17. The system defined in claim 9, wherein the factors on which is based on the reputation score for each instance in the plurality of instances of traffic attributes further includes: a count of how many of logged events in the first and second event logs pertaining to a particular instance of the plurality of instances of traffic attributes.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (5)
Stute, Michael, Adaptive behavioral intrusion detection systems and methods.
Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
Wescoe, Kurt; Campbell, John T.; Ferrara, Joseph A.; Hawthorn, Trevor T.; Himler, Alan; Sadeh-Koniecpol, Norman, Advanced processing of electronic messages with attachments in a cybersecurity system.
Wescoe, Kurt; Campbell, John T.; Ferrara, Joseph A.; Hawthorn, Trevor T.; Himler, Alan; Sadeh-Koniecpol, Norman, Advanced processing of electronic messages with attachments in a cybersecurity system.
Doctor, Brad Bernay; Bingham, Skyler Jameson; Berg, Keshava; Reynolds, II, John Sherwood; Mohr, Justin George, Apparatus, system and method for identifying and mitigating malicious network threats.
Thomson, Allan; Coleman, Christopher D., Apparatuses, methods and systems for a cyber threat confidence rating visualization and editing user interface.
Himler, Alan; Campbell, John T.; Ferrara, Joseph A.; Hawthorn, Trevor T.; Sadeh-Koniecpol, Norman; Wescoe, Kurt, Method and system for assessing and classifying reported potentially malicious messages in a cybersecurity system.
Himler, Alan; Campbell, John T.; Ferrara, Joseph A.; Hawthorn, Trevor T.; Sadeh-Koniecpol, Norman; Wescoe, Kurt, Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system.
Himler, Alan; Campbell, John T.; Ferrara, Joseph A.; Hawthorn, Trevor T.; Sadeh-Koniecpol, Norman; Wescoe, Kurt, Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system.
Angelov, Plamen; Bruncak, Radovan; Hutchison, David; Simpson, Steven; Smith, Paul, System for identifying illegitimate communications between computers by comparing evolution of data flows.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.