ENDPOINT-BASED MANAGING-TYPE DETECTION AND RESPONSE SYSTEM AND METHOD

Disclosed is an endpoint-based managing-type detection and response system. The system comprises: an enterprise network which comprises a plurality of endpoints and a plurality of network security solutions, the plurality of endpoints each having installed or not having installed thereon an endpoint...

Full description

Saved in:
Bibliographic Details
Main Authors KWON, Young Mok, LEE, Chan Yeong
Format Patent
LanguageEnglish
French
Korean
Published 10.06.2021
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Disclosed is an endpoint-based managing-type detection and response system. The system comprises: an enterprise network which comprises a plurality of endpoints and a plurality of network security solutions, the plurality of endpoints each having installed or not having installed thereon an endpoint agent for detecting and blocking malware through a machine learning algorithm, and the plurality of network security solutions each being for applying a predetermined security policy to the plurality of endpoints; a threat analysis server which generates an IOC by analyzing malware which has been detected and blocked in any one of the plurality of endpoints, establishes the security policy according to the generated IOC, and links same to a corresponding network security solution among the plurality of network security solutions; and a cloud server which connects the enterprise network with the threat analysis server. Il est divulgué un système de détection et de réponse de type gestion basée sur des points d'extrémité. Le système comprend : un réseau d'entreprise qui comprend une pluralité de points d'extrémité et une pluralité de solutions de sécurité de réseau, un agent de point d'extrémité pour la détection et le blocage de logiciels malveillants étant ou non installé sur la pluralité de points d'extrémité par l'intermédiaire d'un algorithme d'apprentissage automatique, et la pluralité de solutions de sécurité de réseau étant chacune destinée à appliquer une politique de sécurité prédéterminée à la pluralité de points d'extrémité ; un serveur d'analyse de menace qui génère un IOC (indicateur de compromis) en analysant un logiciel malveillant qui a été détecté et bloqué dans l'un quelconque de la pluralité de points d'extrémité, établit la politique de sécurité en fonction des IOC générés, et les relie à une solution de sécurité de réseau correspondante parmi la pluralité de solutions de sécurité de réseau ; et un serveur infonuagique qui connecte le réseau d'entreprise au serveur d'analyse de menace. 엔드포인트에 기반한 관리형 탐지 및 대응 시스템이 개시된다. 상기 시스템은 각각이 머싱러닝 알고리즘을 통해 멀웨어를 탐지 및 차단하기 위한 엔드포인트 에이전트가 설치되거나 설치되지 않은 복수의 엔드포인트들과 각각이 소정의 보안 정책을 상기 복수의 엔드포인트들에게 적용하기 위한 복수의 네트워크 보안 솔루션들을 포함하는 기업 네트워크와 상기 복수의 엔드포인트들 중 어느 하나에서 탐지 및 차단된 멀웨어를 분석하여 IOC를 생성하고, 상기 생성한 IOC에 따라 상기 보안 정책을 수립하여 상기 복수의 네트워크 보안 솔루션들 중 해당하는 네트워크 보안 솔루션에 연동하는 위협 분석 서버 및 상기 기업 네트워크와 상기 위협 분석 서버를 연결하는 클라우드 서버를 포함한다.
AbstractList Disclosed is an endpoint-based managing-type detection and response system. The system comprises: an enterprise network which comprises a plurality of endpoints and a plurality of network security solutions, the plurality of endpoints each having installed or not having installed thereon an endpoint agent for detecting and blocking malware through a machine learning algorithm, and the plurality of network security solutions each being for applying a predetermined security policy to the plurality of endpoints; a threat analysis server which generates an IOC by analyzing malware which has been detected and blocked in any one of the plurality of endpoints, establishes the security policy according to the generated IOC, and links same to a corresponding network security solution among the plurality of network security solutions; and a cloud server which connects the enterprise network with the threat analysis server. Il est divulgué un système de détection et de réponse de type gestion basée sur des points d'extrémité. Le système comprend : un réseau d'entreprise qui comprend une pluralité de points d'extrémité et une pluralité de solutions de sécurité de réseau, un agent de point d'extrémité pour la détection et le blocage de logiciels malveillants étant ou non installé sur la pluralité de points d'extrémité par l'intermédiaire d'un algorithme d'apprentissage automatique, et la pluralité de solutions de sécurité de réseau étant chacune destinée à appliquer une politique de sécurité prédéterminée à la pluralité de points d'extrémité ; un serveur d'analyse de menace qui génère un IOC (indicateur de compromis) en analysant un logiciel malveillant qui a été détecté et bloqué dans l'un quelconque de la pluralité de points d'extrémité, établit la politique de sécurité en fonction des IOC générés, et les relie à une solution de sécurité de réseau correspondante parmi la pluralité de solutions de sécurité de réseau ; et un serveur infonuagique qui connecte le réseau d'entreprise au serveur d'analyse de menace. 엔드포인트에 기반한 관리형 탐지 및 대응 시스템이 개시된다. 상기 시스템은 각각이 머싱러닝 알고리즘을 통해 멀웨어를 탐지 및 차단하기 위한 엔드포인트 에이전트가 설치되거나 설치되지 않은 복수의 엔드포인트들과 각각이 소정의 보안 정책을 상기 복수의 엔드포인트들에게 적용하기 위한 복수의 네트워크 보안 솔루션들을 포함하는 기업 네트워크와 상기 복수의 엔드포인트들 중 어느 하나에서 탐지 및 차단된 멀웨어를 분석하여 IOC를 생성하고, 상기 생성한 IOC에 따라 상기 보안 정책을 수립하여 상기 복수의 네트워크 보안 솔루션들 중 해당하는 네트워크 보안 솔루션에 연동하는 위협 분석 서버 및 상기 기업 네트워크와 상기 위협 분석 서버를 연결하는 클라우드 서버를 포함한다.
Author KWON, Young Mok
LEE, Chan Yeong
Author_xml – fullname: KWON, Young Mok
– fullname: LEE, Chan Yeong
BookMark eNrjYmDJy89L5WRwdfVzCfD39AvRdXIMdnVR8HX0c3T39HPXDYkMcFVwcQ1xdQ7x9PdTcPRzUQhyDQ7w9wt2VQiODA5x9QWL-bqGePi78DCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-HB_IwMjQ0NDIxNLE0dDY-JUAQBVQC6m
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
DocumentTitleAlternate SYSTÈME ET PROCÉDÉ DE DÉTECTION ET DE RÉPONSE DE TYPE GESTION BASÉE SUR DES POINTS D'EXTRÉMITÉ
엔드포인트에 기반한 관리형 탐지 및 대응 시스템과 방법
ExternalDocumentID WO2021112494A1
GroupedDBID EVB
ID FETCH-epo_espacenet_WO2021112494A13
IEDL.DBID EVB
IngestDate Fri Jul 19 14:42:16 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
French
Korean
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_WO2021112494A13
Notes Application Number: WO2020KR17010
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210610&DB=EPODOC&CC=WO&NR=2021112494A1
ParticipantIDs epo_espacenet_WO2021112494A1
PublicationCentury 2000
PublicationDate 20210610
PublicationDateYYYYMMDD 2021-06-10
PublicationDate_xml – month: 06
  year: 2021
  text: 20210610
  day: 10
PublicationDecade 2020
PublicationYear 2021
RelatedCompanies PAGO NETWORKS, INC
RelatedCompanies_xml – name: PAGO NETWORKS, INC
Score 3.31669
Snippet Disclosed is an endpoint-based managing-type detection and response system. The system comprises: an enterprise network which comprises a plurality of...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
Title ENDPOINT-BASED MANAGING-TYPE DETECTION AND RESPONSE SYSTEM AND METHOD
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210610&DB=EPODOC&locale=&CC=WO&NR=2021112494A1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_G_HzTqfgxJaD0LbhqnevDkLbJ3IQmxUbdnka7tSDKOmzFf99L2HRPe8wFjuTgvpK73wFcoTW0czvPqXbXVHdSUXfacmg6TZPUdRM3Mx1yoWj3X5yn4d2wBp_LXhiDE_pjwBFRoyao75Wx1_P_RyxmaivL6_QdScVDT3WZtciOb3SC07KY3-WRZDKwggDzNks8mz1bD1p2PMyVNnQgrZH2-auv-1Lmq06ltwebEfKbVftQ-ygasBMsZ681YDtcfHk3YMvUaE5KJC70sDwAzgWL5EAo6nsxZ8Tg8g_EI1WjiBPGFTe1IcQTjKCIIyliTuJRrHhoaCFXfckO4bLHVdCneLLxnyDGb3L1GrdHUJ8Vs-wYyP0k67iZhmrH6MCZOglGaTo0yzuJ7ebt5ASa6zidrt8-g1291AVSdqsJ9errOztHV1ylF0aCv-7thNM
link.rule.ids 230,309,786,891,25594,76904
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT8IwEL8Q_MA3nRo_UJdo9tbIdAJ7IAbW4lDWLa4qPC0bbInRDCIz_vtem6E88XqXNO0l9_Fr734FuMJoaGZmlhGZromcpCL2tGGRZJrEiW3Hdqom5DzedF-sx9HdqAKfy1kYxRP6o8gR0aMm6O-Fitfz_0ssqnorF9fJO4pm933RoUaJjm8kwGkYtNdhgU99x3AcxG0Gf1Y6U360bHURK220EBRKpn322pNzKfPVpNLfhc0A18uLPah8zDSoOcu_1zTY9sonbw22VI_mZIHC0g8X-8AYp4E_4IL0uiGjuuLlH_AHIsYB0ykTTPWG6F1OdTRx4POQ6eE4FMxTMo8J16cHcNlnwnEJ7iz6M0T05q8e4_YQqvksT49Ab03Stp1KqnasDqypFWOVJkuzrB2bdtaMj6G-bqWT9eoLqLnCG0bDAX86hR2pks1SZqMO1eLrOz3DtFwk58qav0ubh74
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=ENDPOINT-BASED+MANAGING-TYPE+DETECTION+AND+RESPONSE+SYSTEM+AND+METHOD&rft.inventor=KWON%2C+Young+Mok&rft.inventor=LEE%2C+Chan+Yeong&rft.date=2021-06-10&rft.externalDBID=A1&rft.externalDocID=WO2021112494A1