CN111316272A - Advanced cybersecurity threat mitigation using behavioral and deep analytics - Google Patents

Advanced cybersecurity threat mitigation using behavioral and deep analytics Download PDF

Info

Publication number
CN111316272A
CN111316272A CN201880059195.3A CN201880059195A CN111316272A CN 111316272 A CN111316272 A CN 111316272A CN 201880059195 A CN201880059195 A CN 201880059195A CN 111316272 A CN111316272 A CN 111316272A
Authority
CN
China
Prior art keywords
network
data
processor
analysis
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201880059195.3A
Other languages
Chinese (zh)
Inventor
杰森·克拉布特里
安德鲁·赛勒斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qomplx Inc
Original Assignee
Qomplx Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/655,113 external-priority patent/US10735456B2/en
Application filed by Qomplx Inc filed Critical Qomplx Inc
Publication of CN111316272A publication Critical patent/CN111316272A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A system for mitigating network attacks using an advanced network decision platform includes a time series data store, a directed computation graph module, an action result simulation module, and an observation and state evaluation module, wherein the state of the network is monitored and used to generate a network-physical graph representing network resources, generate and monitor simulated network events, and analyze the network events and their effects to generate security recommendations.

Description

使用行为和深度分析的先进网络安全威胁减缓Advanced cybersecurity threat mitigation using behavioral and deep analytics

与申请相关联的交叉引用Cross-references associated with the application

本申请是2017年7月20日提交的名为“使用行为和深度分析的先进网络安全威胁减缓(ADVANCED CYBERSECURITY THREAT MITIGATION USING BEHAVIORAL ANDDEEPANALYTICS)”的美国专利申请序列号15/655,113的PCT申请并要求其优先权,在此通过全文引用的方式将其全部说明书并入本文。This application is and claims PCT Application Serial No. 15/655,113, filed on July 20, 2017, entitled "ADVANCED CYBERSECURITY THREAT MITIGATION USING BEHAVIORAL ANDDEEPANALYTICS" Priority, the entire specification of which is hereby incorporated by reference in its entirety.

技术领域technical field

本公开涉及计算机管理领域,并更特别地涉及网络安全和威胁分析的领域。The present disclosure relates to the field of computer management, and more particularly to the fields of network security and threat analysis.

背景技术Background technique

在过去十年,针对多个公司以及美国政府部门和活动的信息技术资产的网络攻击(也即非法访问和修改)的频率和复杂性已经显著逐步上升,且IT基础结构脆弱点的发现和使用继续加速。网络非法闯入的速度可以说现在已经达到了依赖于仅从公开的先前攻击得到的保护方法以及来自它们的咨询结果仅提供中等水平保护的程度。进一步,网络安全信息和规程的绝对体量已经远远超过最需要使用以完全遵循或可靠使用其的那些人的能力,压倒了被控对于使得数千企业处于风险中负有网络安全责任的那些人。过去几年中,无法识别重要趋势或变得以及时方式知晓信息已经导致高度可见的、客户面对的安全故障诸如在TARGETTM,ANTHEMTM,DOW JONESTM和SAMSUNG ELECTRONICSTM处,仅列举制造了新闻的几个。传统的网络安全解决方案大多数可能在这些攻击要求太多有效配置、正在进行的管理员交互和支持的时刻使用,而同时提供了对于尖端对手的有限保护,尤其是当盗取或伪造了用户证书时。Over the past decade, the frequency and sophistication of cyberattacks (i.e., unauthorized access and modification) against information technology assets of multiple companies and U.S. government departments and activities has grown significantly, and the discovery and use of IT infrastructure vulnerabilities Continue to accelerate. The speed of network break-ins arguably has now reached a point where protection methods relying solely on published prior attacks and advisory results from them provide only a moderate level of protection. Further, the sheer volume of cybersecurity information and procedures has far outstripped the capabilities of those most needed to use it in full compliance or reliable use, overwhelming those charged with cybersecurity responsibilities for putting thousands of businesses at risk people. Over the past few years, the inability to identify important trends or become informed in a timely manner has resulted in highly visible, customer-facing security failures such as at TARGET TM , ANTHEM TM , DOW JONES TM and SAMSUNG ELECTRONICS TM , just to name a few making the news a few. Traditional network security solutions are mostly likely to be used at times when these attacks require too much effective configuration, ongoing administrator interaction and support, while providing limited protection against sophisticated adversaries, especially when users are stolen or forged certificate.

已经存在了以流水线化或自动化商业数据分析或商业决策处理为目的而已经出现的数个商业软件上的近来发展,其可以开发以帮助优化网络安全。PALANTIRTM提供了软件以分隔在大量数据中的模式,DATABRICKSTM提供定制分析服务,ANAPLANTM提供金融冲击计算服务。存在其他的软件源,其减缓了在隔离中商业数据关联性识别的一些特征方面,但是这些无法整体地寻址跨企业的网络安全脆弱点的整个范围。然而,数据和商业决策自动化的分析保留在它们范围之外。当前,这些方案均未处理多于整个任务的单个特征方面,无法形成预测分析数据变换,且因此在其中唯一方案是要求以上工具复杂集成的复杂过程的网络安全领域作用很小。There have been several recent developments in business software that have emerged for the purpose of streamlining or automating business data analysis or business decision processing, which can be developed to help optimize network security. PALANTIR TM provides software to separate patterns in large volumes of data, DATABRICKS TM provides custom analysis services, and ANAPLAN TM provides financial shock calculation services. There are other software sources that mitigate some of the characteristic aspects of business data correlation identification in isolation, but these cannot holistically address the full range of cybersecurity vulnerabilities across an enterprise. However, the analysis of data and business decision automation remains outside their scope. Currently, none of these approaches deal with more than a single feature aspect of the entire task, cannot form predictive analytics data transformations, and thus play little role in the field of cybersecurity where the only approach is a complex process that requires a complex integration of the above tools.

也已经大大增长了提供网络安全咨询信息的基于网络服务公司的使用。这仅用于增添上述信息的过载,并待优化使用,必须由声称提供可靠网络安全保护的商业信息管理系统小心分析。The use of web-based service companies that provide cybersecurity advisory information has also grown considerably. This is only used to add to the above information overload and is to be used optimally and must be carefully analyzed by business information management systems that claim to provide reliable cybersecurity protection.

需要的是从使用可缩放、明确可脚本编写、连接接口、识别并分析高容量数据、将其变换为有用格式的许多不等且相异的来源检索网络安全相关信息的完全集成系统。这必须随后使用与企业的基线网络使用特性图相一致的数据并超前知晓企业系统,尤其是隐匿了敏感信息的那些,以驱动集成的高度可缩放模拟引擎,其可以在模拟运行内利用系统动态、离散事件和基于经纪人的范例的组合以便获得最有用和精确的数据变换并存储以待人类分析员快速消化所展示的信息,易于领会任何预测或推荐并随后创造性地响应以减缓所报告的情形。该多方法信息安全信息捕捉、分析、变换、结果预测和展示系统形成了“商业操作系统”。What is needed is a fully integrated system for retrieving cybersecurity related information from many disparate and disparate sources using scalable, explicitly scriptable, connecting interfaces, identifying and analyzing high volume data, and transforming it into useful formats. This must then use data consistent with the enterprise's baseline network usage profile and advance knowledge of enterprise systems, especially those hiding sensitive information, to drive an integrated, highly scalable simulation engine that can exploit system dynamics within a simulation run A combination of , discrete events, and broker-based paradigms for the most useful and precise data transformations and storage for human analysts to quickly digest the presented information, easily comprehend any predictions or recommendations and then respond creatively to mitigate the reported situation. This multi-method information security information capture, analysis, transformation, result prediction and presentation system forms a "business operating system".

发明内容SUMMARY OF THE INVENTION

因此,本发明人已经研发了一种使用行为和深度分析的用于先进网络安全威胁减缓的系统。Accordingly, the present inventors have developed a system for advanced cybersecurity threat mitigation using behavioral and in-depth analysis.

根据一个特征方面,公开了一种采用先进网络决策平台检测并减缓网络攻击的系统,包括:时序数据存储,包括至少处理器、存储器、和存储在存储器中并运行在处理器上的多个编程指令,其中一旦运行软件指令,配置处理器以监控多个网络事件并产生时序数据,时序数据包括至少网络事件的记录以及事件发生的时刻;活动结果模拟模块,包括至少处理器、存储器和存储在存储器中并运行在处理器上的多个编程指令,其中一旦运行软件指令,配置处理器以产生模拟网络事件,并配置用以至少部分地基于由定向计算图模块所执行分析的结果而产生推荐;观测和状态评估模块,包括至少处理器、存储器、和存储在存储器中并运行在处理器上的多个编程指令,其中一旦运行软件指令,配置处理器以监控网络上的多个相连资源,并产生表示至少多个相连资源的一部分的网络-物理图;以及定向计算图模块,包括至少处理器、存储器、和存储在存储器中并运行在处理器上的多个编程指令,其中一旦运行软件指令,配置处理器以对时序数据的至少一部分执行多个分析和变换操作,并配置用于对网络-物理图的至少一部分执行多个分析和变换操作。According to one characteristic aspect, a system for detecting and mitigating network attacks using an advanced network decision-making platform is disclosed, comprising: a time series data store including at least a processor, a memory, and a plurality of programming stored in the memory and running on the processor instructions, wherein, upon running the software instructions, configure the processor to monitor a plurality of network events and generate time series data, the time series data including at least a record of the network event and the time at which the event occurred; an activity result simulation module including at least a processor, a memory and a a plurality of programming instructions in memory and running on the processor, wherein the software instructions, upon execution of the software instructions, configure the processor to generate simulated network events and to generate recommendations based at least in part on the results of the analysis performed by the directed computational graph module an observation and state assessment module comprising at least a processor, a memory, and a plurality of programming instructions stored in the memory and running on the processor, wherein upon execution of the software instructions, the processor is configured to monitor a plurality of connected resources on the network, and generating a network-physical graph representing a portion of at least a plurality of connected resources; and a directed computational graph module including at least a processor, a memory, and a plurality of programming instructions stored in the memory and executing on the processor, wherein once the software is executed Instructions that configure the processor to perform a plurality of analysis and transformation operations on at least a portion of the time series data, and are configured to perform a plurality of analysis and transformation operations on at least a portion of the network-physical graph.

根据另一特征方面,公开了一种用于采用先进网络决策平台减缓网络攻击的方法,包括步骤:a)使用观测和状态评估模块,产生表示了网络上多个相连资源的网络-物理图;b)使用定向计算图模块,分析网络-物理图的至少一部分;c)使用活动结果模拟模块,模拟多个网络事件;d)使用时序数据存储,监控多个网络事件的至少一部分;e)至少部分地基于网络事件产生时序数据;f)分析时序数据的至少一部分;以及g)至少部分地基于分析结果产生安全推荐。According to another characteristic aspect, a method for mitigating a network attack using an advanced network decision-making platform is disclosed, comprising the steps of: a) using an observation and state assessment module to generate a network-physical graph representing a plurality of connected resources on the network; b) use a directed computational graph module to analyze at least a portion of a network-physical graph; c) use an activity results simulation module to simulate a plurality of network events; d) use a time series data store to monitor at least a portion of a plurality of network events; e) at least generating time series data based in part on the network event; f) analyzing at least a portion of the time series data; and g) generating a security recommendation based at least in part on a result of the analysis.

附图说明Description of drawings

附图说明了数个特征方面,并与说明书一起用于解释根据特征方面的本发明的原理。本领域技术人员应该知晓,附图中示出的特定设置仅是示例,且不应视作以任何方式限制其中本发明或权利要求的范围。The drawings illustrate several characteristic aspects, and together with the description serve to explain the principles of the invention in accordance with the characteristic aspects. It should be appreciated by those skilled in the art that the specific arrangements shown in the figures are merely examples and should not be construed as limiting the scope of the invention or the claims therein in any way.

图1是根据一个特征方面的先进网络决策平台的示例性架构的图。1 is a diagram of an exemplary architecture of an advanced network decision platform according to one feature aspect.

图2是在导致和促进减缓正在进行网络攻击的预定因素的预测和减缓中商业操作系统的示例功能的流程图。2 is a flow diagram of example functionality of a business operating system in predicting and mitigating predetermined factors that cause and facilitate mitigation of ongoing cyber attacks.

图3是示出了用于减缓网络攻击的商业操作系统功能的进程图。3 is a process diagram illustrating commercial operating system functions for mitigating network attacks.

图4是用于将网络攻击信息分段至合适的公司团体的方法的进程流程图。4 is a process flow diagram of a method for segmenting cyber attack information to appropriate corporate groups.

图5是根据一个特征方面的用于使用施动者驱动的分布式计算图快速预测分析非常大量数据的系统的示例性架构图。5 is an exemplary architectural diagram of a system for rapid predictive analysis of very large amounts of data using an actor-driven distributed computational graph, according to one feature aspect.

图6是根据一个特征方面的用于使用施动者驱动的分布式计算图快速预测分析非常大量数据的系统的示例性架构图。6 is an exemplary architectural diagram of a system for rapid predictive analysis of very large amounts of data using an actor-driven distributed computational graph, according to one feature aspect.

图7是根据一个特征方面的用于使用施动者驱动的分布式计算图快速预测分析非常大量数据的系统的示例性架构图。7 is an exemplary architectural diagram of a system for rapid predictive analysis of very large amounts of data using an actor-driven distributed computational graph, according to one feature aspect.

图8是根据一个特征方面的用于网络安全行为分析的示例性方法的流程图。8 is a flowchart of an exemplary method for network security behavior analysis, according to one feature aspect.

图9是根据一个特征方面的用于度量网络安全攻击效果的示例性方法的流程图。9 is a flowchart of an exemplary method for measuring the effect of a network security attack, according to one feature aspect.

图10是根据一个特征方面的用于连续网络安全监控和勘探的示例性方法的流程图。10 is a flowchart of an exemplary method for continuous network security monitoring and exploration, according to one feature aspect.

图11是根据一个特征方面的用于映射网络-物理系统图的示例性方法的流程图。11 is a flowchart of an exemplary method for mapping a network-physical system diagram, according to one feature aspect.

图12是根据一个特征方面的用于连续网络回弹计分的示例性方法的流程图。12 is a flowchart of an exemplary method for continuous network rebound scoring, according to one feature aspect.

图13是根据一个特征方面的用于网络安全特许监督的示例性方法的流程图。13 is a flow diagram of an exemplary method for cybersecurity privileged oversight in accordance with one feature aspect.

图14是根据一个特征方面的用于网络安全风险管理的示例性方法的流程图。14 is a flowchart of an exemplary method for cybersecurity risk management, according to one feature aspect.

图15是根据一个特征方面的用于减缓已泄密证书威胁的示例性方法的流程图。15 is a flowchart of an exemplary method for mitigating the threat of compromised credentials, according to one feature aspect.

图16是说明了计算装置的示例性硬件架构的方框图。16 is a block diagram illustrating an exemplary hardware architecture of a computing device.

图17是说明了用于客户端装置的示例性逻辑架构的方框图。17 is a block diagram illustrating an exemplary logical architecture for a client device.

图18是说明了客户端、服务器和外部服务的示例性架构布置的方框图。18 is a block diagram illustrating an exemplary architectural arrangement of clients, servers, and external services.

图19是说明了计算装置的示例性硬件架构的另一方框图。19 is another block diagram illustrating an exemplary hardware architecture of a computing device.

具体实施方式Detailed ways

发明人已经设想并付诸实践了一种使用行为和深度分析的先进网络安全威胁减缓。The inventors have envisioned and put into practice an advanced cybersecurity threat mitigation using behavioral and deep analytics.

可以在本申请中描述一个或多个不同特征方面。进一步,对于在此所述的一个或多个特征方面,可以描述数个备选布置;应该知晓,这些仅是为了说明性目的而展示,并非以任何方式限制在此所包含的特征方面或在此所展示的权利要求。布置的一个或多个可以广泛地适用于数个特征方面,如从说明书易于明显的。通常,以充足细节描述布置以使得本领域技术人员实践特征方面的一个或多个,且应该知晓可以利用其它布置,且可以做出结构、逻辑、软件、电气和其他改变而并未脱离特定特征方面的范围。在此所述的特征方面的一个或多个的特定特征可以参考形成了本公开一部分且借由说明的形式示出了特征方面的一个或多个的具体布置的一个或或多个特征方面或附图而描述。然而应该知晓,该特征不限于用于参考描述的一个或多个特定特征方面或附图。公开既并非一个或多个特征方面的所有布置的文字描述,又并非在所有布置中必须存在的一个或多个特征方面的特征列表。One or more different feature aspects may be described in this application. Further, several alternative arrangements may be described for one or more of the feature aspects described herein; it should be understood that these are shown for illustrative purposes only and are not intended to limit in any way the aspects of the features contained herein or in the claims presented here. One or more of the arrangements may be broadly applicable to several feature aspects, as is readily apparent from the description. Typically, arrangements are described in sufficient detail to enable those skilled in the art to practice one or more of the feature aspects, and it should be understood that other arrangements may be utilized and structural, logical, software, electrical, and other changes may be made without departing from the specific features range of aspects. Specific features of one or more of the feature aspects described herein may be made with reference to one or more of the feature aspects forming part of this disclosure and by way of illustration showing the specific arrangement of one or more of the feature aspects or described with the accompanying drawings. It should be understood, however, that this feature is not limited to one or more of the specific feature aspects or drawings used for reference in the description. The disclosure is neither a literal description of all arrangements of one or more feature aspects nor a feature listing of one or more feature aspects that must be present in all arrangements.

本专利申请中提供的段落标题和本专利申请的发明名称仅是为了方便,且不应视作以任何方式限制本公开。The paragraph headings and title of the invention in this patent application are provided in this patent application for convenience only and should not be construed as limiting the present disclosure in any way.

相互通信的装置无需连续相互通信,除非另外明确规定。此外,相互通信的装置可以直接地通信或者通过一个或多个逻辑或物理的通信装置或中间媒介而通信。Devices that communicate with each other need not continuously communicate with each other unless expressly specified otherwise. Furthermore, devices that are in communication with each other may communicate directly or through one or more logical or physical communication devices or intermediaries.

具有相互通信的数个部件的特征方面的描述并未暗示要求所有这种部件。相反,可以描述各种任选的部件以说明广泛各种可能特征方面,并以便于更完全地说明一个或多个特征方面。类似地,尽管可以按照顺序描述进程步骤、方法步骤、算法等等,通常可以配置该进程、方法和算法以备选的顺序工作,除非特殊地相反陈述。换言之,本专利申请中可以描述的任何步骤次序或顺序自身并未指示要求以该顺序执行步骤。所述进程的步骤可以实际上以任何顺序执行。进一步,可以同时地执行一些步骤,尽管描述或暗示为非同时地发生(例如,因为一个步骤描述在另一个步骤之后)。此外,由附图中其说明对于进程的说明并未暗示所示进程排除其他变形和修改,并未暗示所示的进程或其任何步骤对于一个或多个特征方面是必需的,也并未暗示所示进程是优选的。此外,通常每个特征方面描述步骤一次,但是这并非意味着它们必须发生一次,或者它们可以每次运行或执行进程、方法或算法时仅发生一次。在一些特征方面或一些事件中可以省略一些步骤,或者可以在给定的特征方面或事件中执行一些步骤多于一次。A description of a feature having several components in communication with each other does not imply that all such components are required. Rather, various optional components may be described to illustrate a wide variety of possible feature aspects, and in order to more fully describe one or more feature aspects. Similarly, although process steps, method steps, algorithms, etc. may be described in an order, the processes, methods, and algorithms may generally be configured to work in alternative orders, unless specifically stated to the contrary. In other words, any order or sequence of steps that may be described in this patent application does not by itself imply that the steps are required to be performed in that order. The steps of the process may be performed in virtually any order. Further, some steps may be performed concurrently, although described or implied as occurring non-concurrently (eg, because one step is described after another step). Furthermore, the description of a process by its description in the drawings does not imply that the illustrated process excludes other variations and modifications, nor does it imply that the illustrated process or any step thereof is required for one or more feature aspects, nor does it imply that The procedures shown are preferred. Furthermore, steps are typically described once per feature aspect, but this does not mean that they must occur once, or that they may occur only once per run or execution of a process, method or algorithm. Some steps may be omitted in some feature aspects or some events, or some steps may be performed more than once in a given feature aspect or event.

当在此描述单个装置或物品时,显而易见的是,可以替代单个装置或物品使用多于一个装置或物品。类似地,在此描述多于一个装置或物品时,显而易见的是,可以替代多于一个装置或物品而使用单个装置或物品。When a single device or item is described herein, it will be apparent that more than one device or item may be used in place of a single device or item. Similarly, where more than one device or item is described herein, it will be apparent that a single device or item may be used in place of more than one device or item.

装置的功能或特征可以备选地由并未明确描述为具有该功能或特征的一个或多个其他装置具体化。因此,其他特征方面无需包括该装置自身。A function or feature of a device may alternatively be embodied by one or more other devices not expressly described as having that function or feature. Therefore, other characteristic aspects need not include the device itself.

在此描述或参考的技术和机制将有时为了清楚以单数形式描述。然而,应该知晓,特定的特征方面可以包括技术的多次迭代或者机制的多次安装,除非另外规定。附图中进程描述或方框应该理解为表示了包括用于实施进程中特殊逻辑功能或步骤的一个或多个可执行指令的模块、代码段或代码部分。在各个特征方面的范围内包括备选实施方式,其中,例如,可以以所示或所述顺序之外的顺序执行功能,包括实质上同时或者以相反顺序,取决于所涉及的功能,如由本领域技术人员所理解。Techniques and mechanisms described or referenced herein will sometimes be described in the singular for clarity. It should be appreciated, however, that a particular feature aspect may include multiple iterations of a technique or multiple installations of a mechanism, unless otherwise specified. Process descriptions or blocks in the figures should be understood to represent modules, code segments, or portions of code that comprise one or more executable instructions for implementing a particular logical function or step in the process. Within the scope of the various feature aspects are included alternative implementations in which, for example, the functions may be performed out of the order shown or described, including substantially concurrently or in the reverse order, depending on the functionality involved, as described by the present understood by those skilled in the art.

定义definition

如在此所使用,“泳道”是在时序传感器数据接收和分派装置与设计用于保持所分派数据时序传感器数据的数据存储之间的通信信道。泳道能够在两个装置之间移动特殊的、有限量的数据。例如,单个泳道可以可靠地携带等价5秒内来自10个传感器的5秒数据价值的数据等价形式并已经将其包括至数据存储中,这是其性能。尝试使用一个泳道放置从6个传感器得到的5秒数据价值将导致数据丢失。As used herein, a "swim lane" is a communication channel between a sequential sensor data receiving and dispatching device and a data store designed to hold the dispatched data sequential sensor data. Swimlanes can move a specific, limited amount of data between two devices. For example, a single swimlane can reliably carry the equivalent of 5 seconds worth of data from 10 sensors in 5 seconds and already include it in the data store, which is its performance. Attempting to use one lane to place 5 seconds worth of data from 6 sensors will result in data loss.

如在此所使用,“元泳道”是对于请求进程透明的两个或更多真实泳道的运输容量的如所需要的逻辑组合。可以初始化其中预期每个单位时间接收的数据量在时间之上高度相异的传感器研究以使用元泳道。使用以上所述的示例,其中单个真实泳道可以传输并包括10个传感器的5秒价值数据,在5秒间隔期间突然从13个传感器接收到输入的传感器数据将使得系统创建两个泳道元泳道以在一个真实泳道中容纳标准的10个传感器数据,并在第二透明添加的真实泳道中容纳3个传感器数据覆盖,然而无需对数据接收逻辑的改变,因为数据接收和分派装置将添加额外的真实泳道透明性。,As used herein, a "meta-swimlane" is a logical combination as required of the transport capacity of two or more real lanes that is transparent to the requesting process. Sensor studies in which the amount of data received per unit time is expected to be highly disparate over time can be initialized to use meta lanes. Using the example described above, where a single real lane could transmit and include 5 seconds worth of data from 10 sensors, the sudden receipt of input sensor data from 13 sensors during a 5 second interval would cause the system to create two lane meta lanes to Accommodates standard 10 sensor data in one real lane and 3 sensor data overlays in a second transparently added real lane, however no changes to the data receiving logic are required as the data receiving and dispatching means will add additional real Swimlane transparency. ,

如在此所使用,“图形”表示信息和关系,其中信息的每个初级单元构成图形的“节点”或“顶点”且两个节点之间的关系构成图形的边缘。节点可以进一步由至该节点的一个或多个描述符的连接或“特性”而限定。例如,给定节点“James R”,对于人员的姓名信息,限定的特性可以是“183cm高”、“DOB 08/13/1965”和“说英语”。类似于使用特性以进一步描述节点中信息,构成边缘的两个节点之间关系可以使用“标签”限定。因此,给定第二节点“Thomas G”,“James R”和“Thomas G”之间指示了两人相互认识的边缘可以标注为“认识”。当图形理论符号(图=(顶点,边缘))适用于该情形时,节点的集合用作有序配对的一个参数V,且2个要素边缘端点的集合用作有序配对的第二参数E。当配对E内边缘端点的顺序不重要时,例如,边缘James R,Thomas G等价于Thomas G,James R,图形称作“无向”。在当关系沿一个方向从一个节点流至另一个时的情形下,例如,James R比Thomas G“较高”,端点的顺序是重要的。具有该边缘的图形称作“定向”。在分布式计算图形系统中,变换流水线内的变换表示为具有变换的定向图,每个变换包括节点以及在变换之间包括边缘的输出消息。分布式计算图形规定了非线性变换流水线的潜在使用,其被编程地线性化。该线性化可以导致资源消耗的指数增长。克服可能性的最敏感的方案是正如所需要的引入新的变换流水线,仅创建易于计算的那些。该方法导致当系统处理数据流时在尺寸和节点、边缘组合上高度可变化的变换图。本领域技术人员将认识到,变换图可以假定具有边缘关系的大量拓扑的许多形状和尺寸。仅为了说明目的而选择给定的示例,并展示少量最简单的可能性。这些示例不应用于限定预期作为本发明操作一部分的可能的图形。As used herein, "graph" refers to information and relationships, where each primary unit of information constitutes a "node" or "vertex" of the graph and the relationship between two nodes constitutes the edge of the graph. A node may be further defined by a connection or "property" to one or more descriptors of the node. For example, given a node "James R", for the person's name information, the qualifying properties may be "183cm tall", "DOB 08/13/1965", and "speaks English". Similar to using properties to further describe information in nodes, the relationship between two nodes that make up an edge can be defined using "labels". Therefore, given the second node "Thomas G", the edge between "James R" and "Thomas G" indicating that the two people know each other can be marked as "knowing". When the graph theory notation (graph=(vertices, edges)) applies to this situation, the set of nodes is used as one parameter V of the ordered pairing, and the set of 2 element edge endpoints is used as the second parameter E of the ordered pairing . When the order of edge endpoints within pair E is not important, eg edges James R, Thomas G is equivalent to Thomas G, James R, the graph is called "undirected". In situations when relationships flow from one node to another in one direction, eg James R is "higher" than Thomas G, the order of the endpoints is important. Graphics with this edge are called "orientation". In a distributed computing graphics system, transforms within a transform pipeline are represented as directed graphs with transforms, each transform including nodes and output messages including edges between transforms. Distributed computing graphs specify the potential use of nonlinear transformation pipelines, which are programmatically linearized. This linearization can lead to an exponential increase in resource consumption. The most sensitive approach to overcoming the possibility is to introduce a new transformation pipeline as needed, creating only those that are easy to compute. The method results in a transformation graph that is highly variable in size and combination of nodes and edges as the system processes the data stream. Those skilled in the art will recognize that transformation graphs can assume many shapes and sizes of a large number of topologies with edge relationships. The given examples are chosen for illustrative purposes only, and show a small number of the simplest possibilities. These examples should not be used to limit the possible graphics contemplated as part of the operation of the present invention.

如在此所使用,“变换”是对于输入数据的零或更多流执行的函数,其导致可以随后用作或不用作另一变换的输入的单个输出流。变换可以包括机器、人员或人机交互的任意组合,变换无需改变输入它们的数据,该变换类型的一个示例将是存储变换,其将接收输入并随后用作对于该数据的队列以用于后续变换。如以上所暗示,特殊的变换可以在缺乏输入数据时产生输出数据。时间戳用作示例。在本发明中,变换放置在流水线中以便一个变换的输出可以用作另一个的输入。这些流水线可以由两个或更多变换构成,变换的数目仅由系统的资源限制。历史上,变换流水线与流水线中从一个先例接收输入并向一个后续提供输出而没有分支或迭代的每个变换成线性关系。其他流水线配置是可能的。设计本发明以允许这些配置的数个,包括但不限于:线性,传入分支,传出分支,和循环。As used herein, a "transform" is a function performed on zero or more streams of input data that results in a single output stream that may or may not be subsequently used as input to another transform. Transforms can include any combination of machines, people, or human-computer interaction, transforms do not need to change the data that is input to them, an example of this type of transform would be a storage transform, which would receive input and then use it as a queue for that data for subsequent use transform. As alluded to above, special transformations can produce output data in the absence of input data. Timestamps are used as examples. In the present invention, transforms are placed in the pipeline so that the output of one transform can be used as the input of another. These pipelines can consist of two or more transforms, the number of which is limited only by the resources of the system. Historically, transformation pipelines have a linear relationship with each transformation in the pipeline that receives input from a precedent and provides output to a successor without branching or iteration. Other pipeline configurations are possible. The present invention is designed to allow several of these configurations, including but not limited to: linear, incoming branch, outgoing branch, and circular.

“数据库”或“数据存储子系统”(这些术语可以视作实质上同义)如在此所使用,是适用于长期存储、索引和检索数据的系统,检索通常是经由某种查询接口或语言。“数据库”可以用于涉及本领域已知的关系数据库管理系统,但是不应视为限定于该系统。本领域已经引入并实际上正在引入许多备选数据库或数据存储系统技术,包括但不限于分布式非关系数据存储系统诸如Hadoop、面向列的数据库、内存中数据库等等。尽管各个特征方面可以优选地采用本领域可应用(或未来可应用)的各种数据存储子系统的一个或另一个,本发明不应解释为如此限定,因为可以根据特征方面使用任何数据存储架构。类似地,尽管在一些情形中一个或多个特定数据存储需求描述为由分立部件(例如扩展私人资本市场数据库和配置数据库)满足,这些描述涉及数据存储系统的功能使用且并未涉及它们的物理架构。例如,在此涉及的数据库的数据存储系统的任何群组可以一起包括在运行在单个机器上的单个数据库管理系统中,或者它们可以包括在运行在机器集群上的单个数据库管理系统中,如本领域已知。类似地,任何单个数据库(诸如扩展私人资本市场数据库)可以实施在单个机器上,在使用集群技术的机器集合上,在由本领域已知的一个或多个消息收发系统连接的数个机器上,或者在本领域普通的主控/伺服配置中。这些示例应该阐明,根据本发明并未优选对于数据库管理的任何特定架构方案,且数据存储技术的选择任凭每个实施者自行处理,并未脱离如所请求保护的本发明的范围。A "database" or "data storage subsystem" (these terms may be considered substantially synonymous), as used herein, is a system suitable for long-term storage, indexing, and retrieval of data, usually via some query interface or language . "Database" may be used to refer to relational database management systems known in the art, but should not be considered limited to such systems. Numerous alternative database or data storage system technologies have been introduced and are actually being introduced in the art, including but not limited to distributed non-relational data storage systems such as Hadoop, column-oriented databases, in-memory databases, and the like. Although the various feature aspects may preferably employ one or the other of the various data storage subsystems available (or future applicable) in the art, the invention should not be construed as so limited as any data storage architecture may be used in accordance with the feature aspects . Similarly, although in some cases one or more specific data storage requirements are described as being met by discrete components (eg, the extended private capital markets database and the configuration database), these descriptions relate to the functional use of the data storage systems and do not address their physical Architecture. For example, any group of data storage systems for databases referred to herein may be included together in a single database management system running on a single machine, or they may be included in a single database management system running on a cluster of machines, as described herein known in the field. Similarly, any single database (such as the Extended Private Capital Markets database) can be implemented on a single machine, on a collection of machines using clustering techniques, on several machines connected by one or more messaging systems known in the art, Or in a master/servo configuration common in the art. These examples should illustrate that no particular architectural approach to database management is preferred in accordance with the present invention, and that the choice of data storage technology is at the discretion of each implementer without departing from the scope of the invention as claimed.

“数据上下文”如在此所使用,涉及识别了数据位置的自变量集合。其可以是Rabbit队列,基于云的存储中的.csv文件,或者除了单个事件或记录之外的任何其他该位置参考。活动可以相互传递事件或数据上下文用于处理。流水线的本质允许在活动之间直接信息传递,且数据位置或文件不必在流水线开始处预定。"Data context", as used herein, refers to a set of arguments that identifies the location of data. It can be a Rabbit queue, a .csv file in cloud-based storage, or any other reference to that location other than a single event or record. Activities can pass events or data contexts to each other for processing. The nature of the pipeline allows direct information transfer between activities, and data locations or files do not have to be predetermined at the beginning of the pipeline.

“流水线”,如在此所使用并可互换地称作“数据流水线”或“处理流水线”,涉及数据流发送活动和批处理活动的集合。流发送和批处理活动可以在流水线内无差别地连接。事件将以活性方式流过流发送活动施动者。在流发送活动至批处理活动的连接处,存在流发送批处理协议(StreamBatchProtocol)数据对象。该对象负责确定何时以及是否运行批处理。三个可能性的一个或多个可以用于处理触发:规则的定时间隔,每隔N个事件,或任选地外部触发。事件保持在队列中或类似的,直至处理。每个批处理活动可以包含“来源”数据上下文(如果上游活动在流发送,其可以是流发送上下文),以及“目的地”数据上下文(传递至下一个活动)。流发送活动可以是任选的“目的地”流发送数据上下文(任选的意味着:事件的高速缓存/持久,与短时间对比),尽管这不应是初始实施方式的一部分。A "pipeline," as used herein and interchangeably referred to as a "data pipeline" or "processing pipeline," refers to a collection of data streaming activities and batch processing activities. Streaming and batching activities can be connected indiscriminately within the pipeline. Events will flow through the stream sending activity actor in an active fashion. At the connection of the streaming activity to the batching activity, there is a StreamBatchProtocol data object. This object is responsible for determining when and whether to run the batch. One or more of three possibilities can be used to handle triggering: regular timed intervals, every N events, or optionally an external trigger. Events remain in a queue or similar until processed. Each batch activity can contain a "source" data context (which can be a streaming context if the upstream activity is streaming), and a "destination" data context (passed on to the next activity). The streaming activity may be an optional "destination" streaming data context (optional means: caching/persistence of events, as opposed to short durations), although this should not be part of the initial implementation.

概念性架构conceptual architecture

图1是根据一个特征方面的先进网络决策平台(ACDP)100的示例性架构图。用于特殊数据输入、系统控制和与系统输出交互诸如自动预测决策作出和规划以及备选路径模拟的系统105的客户端访问通过系统的分布式、可扩展高带宽云接口110发生,其使用多用途、健壮的网络应用驱动接口以用于经由网络107的面向客户端信息的输入和显示,并根据各种设置而操作数据存储112诸如但不限于MONGODBTM,COUCHDBTM,CASSANDRATM或REDISTM。由系统分析的来自客户端商业范围内的来源、以及来自基于云的来源的大多数商业数据也通过云接口110输入系统,数据传至连接器模块135,其可以拥有接受并转换外来数据并随后将归一化信息传递至系统的其他分析和变换部件所需的API例行程序135a,定向计算图模块155,高容量网络爬虫模块115,多维时序数据库120,以及图形堆栈服务145。定向计算图模块155从多个来源检索一个或多个数据流,其包括但并非限定于多个物理传感器,网络服务提供者,基于网络的问卷和调查,电子基础结构的监控,人群纯源化活动,以及人类输入装置信息。在定向计算图模块155内,数据可以划分为专用预编程数据流水线155a中两个等同流,其中一个子流可以发送用于批处理并存储,而另一个子流可以重新格式化用于变换流水线分析。数据随后传输至用于作为分析的一部分的线性数据变换的通用变换器服务模块160,或者用于作为分析的一部分的批处理或迭代变换的可拆解变换器服务模块150。定向计算图模块155代表所有数据作为定向图,其中变换是节点且在图的变换边缘之间消息收发结果。高容量网络爬虫模块115使用多个服务器主控预编程网络蜘蛛,当自主地配置时在SCRAPYTM作为示例的网络挖掘框架115a内采用,以从并未由传统网络爬虫技术所标记的基于网络的来源识别并检索感兴趣数据。多维时序数据存储模块120可以从可以是数种不同类型的大量多个传感器接收流数据。多维时序数据存储模块也可以存储由系统遭遇的任何时序数据诸如但不限于企业网络使用数据,部件和系统日志,执行数据,网络服务信息捕捉诸如但不限于新闻和金融供料,以及销售和服务相关的客户数据。设计模块以通过动态地分配网络带宽和服务器处理信道而适应不规则和高容量涌流以处理输入数据。包括对于是但不限于C++,PERL,PYTHON,和ERLANGTM的语言示例的编程包装允许添加复杂编程逻辑至多维时序数据库120的默认功能而并未详尽认知核心编程,极大扩展了功能的宽度。由多维时序数据库120和高容量网络爬虫模块115检索的数据可以由定向计算图155和相关联的通用变换器服务150和可拆解变换器服务160模块进一步分析并变换为任务优化的结果。备选地,来自多维时序数据库和高容量网络爬虫模块的数据可以发送至图形堆栈服务模块145,通常具有确定了重要顶点145a的脚本编写提示信息,图形堆栈服务模块采用标准化协议用于将信息流转换为该数据的图形表示,例如开放图互联网技术,尽管本发明不依赖于任何一个标准。通过步骤,图形堆栈服务模块145以由任何预定的脚本编写修改例145a所影响的图形形式表示数据,并将其存储在基于图形的数据存储145b诸如GIRAPHTM中,或密钥值配对类型的数据存储REDISTM或RIAKTM中,在其他之中,所有这些适用于存储基于图形的信息。1 is an exemplary architectural diagram of an Advanced Network Decision Platform (ACDP) 100 according to one feature aspect. Client access to the system 105 for ad hoc data input, system control, and interaction with system outputs such as automated predictive decision making and planning, and alternative path simulation occurs through the system's distributed, scalable, high-bandwidth cloud interface 110, which uses multiple A versatile, robust web application drives an interface for client-oriented information entry and display via the network 107 and operates a data store 112 according to various settings such as, but not limited to, MONGODB , COUCHDB , CASSANDRA or REDIS . Most business data from client business-wide sources, as well as from cloud-based sources, analyzed by the system is also entered into the system through the cloud interface 110, and the data is passed to the connector module 135, which may have the ability to accept and transform the incoming data and subsequently The API routines 135a required to pass the normalization information to the other analysis and transformation components of the system, the directed computational graph module 155, the high volume web crawler module 115, the multidimensional time series database 120, and the graph stack service 145. The directed computational graph module 155 retrieves one or more data streams from multiple sources including, but not limited to, multiple physical sensors, web service providers, web-based questionnaires and surveys, monitoring of electronic infrastructure, crowd sourcing activity, and human input device information. Within the directed computational graph module 155, the data can be divided into two equivalent streams in a dedicated pre-programmed data pipeline 155a, one of which can be sent for batch processing and storage, and the other can be reformatted for the transform pipeline analyze. The data is then passed to the general transformer service module 160 for linear data transformation as part of the analysis, or the disassembled transformer service module 150 for batch or iterative transformation as part of the analysis. The directed computational graph module 155 represents all data as a directed graph, where transforms are nodes and results are messaged between transform edges of the graph. The high-volume web crawler module 115 hosts pre-programmed web spiders using multiple servers, employed within the SCRAPY exemplified web mining framework 115a when autonomously configured, to avoid web-based Source identification and retrieval of data of interest. The multidimensional time series data storage module 120 may receive streaming data from a large number of sensors, which may be of several different types. The multidimensional time series data storage module can also store any time series data encountered by the system such as but not limited to enterprise network usage data, component and system logs, execution data, network service information capture such as but not limited to news and financial feeds, and sales and service relevant customer data. Modules are designed to accommodate irregular and high volume influx by dynamically allocating network bandwidth and server processing channels to process incoming data. Programming wrappers including examples for languages such as but not limited to C++, PERL, PYTHON, and ERLANG allow adding complex programming logic to the default functionality of the multidimensional time series database 120 without exhaustive knowledge of core programming, greatly expanding the breadth of functionality . Data retrieved by the multidimensional time series database 120 and the high volume web crawler module 115 may be further analyzed and transformed into task-optimized results by the directed computation graph 155 and associated generic transformer service 150 and disassembled transformer service 160 modules. Alternatively, data from multi-dimensional time series databases and high-volume web crawler modules can be sent to the graphics stack service module 145, typically with scripting hints that identify important vertices 145a, and the graphics stack service module uses standardized protocols for streamlining information. Converted to a graphical representation of this data, such as Open Graph Internet technology, although the present invention does not rely on any one standard. Through the steps, the graphics stack service module 145 represents the data in the graphical form affected by any predetermined scripting modification 145a and stores it in a graphics based data store 145b such as GIRAPH , or key value pair type data Storing REDIS TM or RIAK TM , among others, all of which are suitable for storing graph-based information.

变换分析进程的结果可以随后与进一步客户端指令、与分析相关的额外商业规则和实践以及在自动计划服务模块130中已经可应用数据之外的形势信息组合,自动计划服务模块130也运行了基于强大信息理论130a的预测统计函数和机器学习算法以允许基于当前系统得到结果快速地预测未来趋势和结果,并选择多个可能商业决策的每一个。使用所有可应用数据,自动计划服务模块130可以提出结果最可能是具有可用地高可信度的最有利商业结果的商业决策。在系统得到结果与终端用户商业决策作出辅助下可能的外部提供的额外信息结合使用中与自动计划服务模块紧密相关,具有与面向终端用户的观察和状态评估服务140耦合的其离散事件模拟器编程模块125a的活动结果模拟模块125允许商业决策制定者调查基于当前可应用数据的分析而在另一个之上选择一个未决活动历程的可能结果,面向终端用户的观察和状态评估服务140如情况要求是高度可脚本编写的140b,且具有游戏引擎140a以更实际地考虑商业决策的阶段性可能结果。The results of the transformation analysis process can then be combined with further client instructions, additional business rules and practices related to the analysis, and situational information beyond the already applicable data in the automatic planning service module 130, which also operates based on Predictive statistical functions and machine learning algorithms of powerful information theory 130a to allow rapid prediction of future trends and outcomes based on results obtained from current systems and selection of each of a number of possible business decisions. Using all applicable data, the automatic planning service module 130 can make business decisions that are most likely to result in the most favorable business outcomes with the high confidence available. Closely related to the automatic planning service module in the use of the system's results in conjunction with possible externally provided additional information to aid end user business decision making, with its discrete event simulator programming coupled with end user oriented observation and state assessment services 140 The campaign outcome simulation module 125 of module 125a allows business decision makers to investigate the possible outcomes of selecting one pending campaign course over another based on analysis of currently applicable data, end-user-oriented observation and state assessment services 140 as the situation requires is highly scriptable 140b and has a game engine 140a to more realistically consider the staged possible outcomes of business decisions.

例如,由系统100通知信息保险部门,委托人X在使用此前从未由其所使用以访问服务Y的证书K(Kerberos委托人秘钥)。服务Y利用这些相同的证书以访问数据存储Z上的安全数据。当可疑行迹稍后通过网络时这正确地产生警报并将由编程用以处理该数据120a的多维时序数据存储120基于连续基线网络通信监控而推荐X和Y隔离以及K的挂起,由定向计算图155采用其下层通用变换器服务模块160和可拆解变换器服务模块150结合自动计划服务模块130的AI和主要机器学习性能130a而严格分析网络基线,也已经通过连接器模块135的多源连接APIs接收并公然同化了从多个来源可应用的自动计划服务模块130。这些通信模式的特设模拟由活动结果模拟模块125及其离散事件模拟器125a针对基线运行,离散事件模拟器125a在此用于确定合法的可能性的概率空间。基于其数据和分析,系统100能够检测并推荐网络攻击的减缓,网络攻击向所有商业操作展现已存在的威胁,在攻击时刻通过使用观察和状态评估服务140以减缓和校正努力的多个层级向人类分析师展现可活动计划最需要的信息,观察和状态评估服务140也已经特殊地预编程以处理网络安全事件140b。For example, the information insurance department is notified by the system 100 that the principal X is using a certificate K (Kerberos principal key) that has never been used by it before to access the service Y. Service Y utilizes these same credentials to access secure data on data store Z. This correctly generates an alert when the suspicious track later passes through the network and will recommend X and Y isolation and K suspension based on continuous baseline network traffic monitoring by the multi-dimensional time series data store 120 programmed to process this data 120a, by the directed computational graph 155 uses its underlying Universal Transformer Service Module 160 and Detachable Transformer Service Module 150 to rigorously analyze network baselines in conjunction with the AI and primary machine learning capabilities 130a of the Auto-Planning Service Module 130, also through the multi-source connection of the Connector Module 135 The APIs receive and explicitly assimilate the auto-planning service modules 130 that are applicable from multiple sources. Ad hoc simulations of these communication modes are run against the baseline by the activity outcome simulation module 125 and its discrete event simulator 125a, which is used here to determine a probability space of legitimate possibilities. Based on its data and analysis, the system 100 is able to detect and recommend mitigation of cyber-attacks that present a pre-existing threat to all business operations, at the moment of the attack through the use of observation and status assessment services 140 to mitigate and correct multiple levels of efforts to Human analysts present the information most needed for active planning, and the observation and status assessment service 140 has also been specifically pre-programmed to handle cybersecurity events 140b.

根据一个特征方面,先进网络决策平台尤其是商业操作系统的编程使用连续地监控客户企业的正常网络活动的行为,诸如但不限于网络上正常用户,由每个用户访问的资源,每个用户的访问许可,网络上机器对机器通信量,对核心网络的批准外部访问以及对网络的识别和访问管理服务器的管理员访问,结合网络攻击方法学的实时分析告知认知。系统随后使用该信息为了两个目的:首先,使用系统的先进计算分析和模拟性能以在网络周缘并在企业的信息变换器和信任结构内提供可能数字访问点的直接公开,并对于网络变化给出应该在攻击之前或期间作出以使其强化的推荐。其次,先进网络决策平台连续地实时监控网络的通信类型,并通过技术诸如深度数据包检查用于预定地分析用户通信的有效偏差以指示已知的网络攻击向量诸如但不限于ACTIVE DIRECTORYTM/Kerberos忽略票攻击,ACTIVE DIRECTORYTM/Kerberos忽略散列攻击和相关的ACTIVE DIRECTORYTM/Kerberos越过散列攻击,ACTIVE DIRECTORYTM/Kerberos万能钥匙,ACTIVE DIRECTORYTM/Kerberos金银票攻击,特权升级攻击,已泄密用户证书,以及勒索软件盘攻击。当确定了可疑活动在表征了攻击的水平(例如包括但不限于万能钥匙攻击,忽略散列攻击,或经由已泄密用户证书的攻击)时,系统发送聚焦活动的警报信息至所有预设的团体,尤其是它们的角色适合攻击减缓或补救并格式化以基于历史、当前和上下文攻击进展分析提供预测性攻击建模以便人类决策者可以以他们负责层级在尽可能少采用分散数据的最可活动信息的命令下快速表述活动的最有效过程。系统随后以最可活动形式发送防御性措施以可能最少损害和泄密而终结攻击。永久地存储所有攻击数据用于稍后法庭分析。According to one characteristic aspect, the programming use of advanced network decision-making platforms, especially commercial operating systems, continuously monitors the behavior of the client enterprise's normal network activities, such as, but not limited to, normal users on the network, resources accessed by each user, each user's Access permissions, machine-to-machine traffic on the network, approved external access to the core network, and administrator access to the network identification and access management servers, combined with real-time analysis of network attack methodologies inform cognition. The system then uses this information for two purposes: first, using the system's advanced computational analysis and simulation capabilities to provide direct disclosure of possible digital access points at the network perimeter and within the enterprise's information transformers and trust structures, and to provide feedback on network changes. Make recommendations that should be made before or during an attack to reinforce it. Second, the Advanced Network Decision Platform continuously monitors the traffic types of the network in real-time, and uses techniques such as deep packet inspection for pre-determined analysis of valid deviations in user communications to indicate known network attack vectors such as but not limited to ACTIVE DIRECTORY TM /Kerberos Ignore Ticket Attack, ACTIVE DIRECTORY TM /Kerberos Ignore Hash Attack and Related ACTIVE DIRECTORY TM /Kerberos Skip Hash Attack, ACTIVE DIRECTORY TM /Kerberos Master Key, ACTIVE DIRECTORY TM /Kerberos Gold Ticket Attack, Privilege Escalation Attack, Compromised User credentials, and ransomware disk attacks. When suspicious activity is determined to be at a level indicative of an attack (eg, including but not limited to master key attacks, ignore hash attacks, or attacks via compromised user credentials), the system sends activity-focused alerts to all predefined groups , in particular their roles are suitable for attack mitigation or remediation and are formatted to provide predictive attack modeling based on historical, current and contextual attack progression analysis so that human decision makers can use the most actionable activities at the level of their responsibility with as little fragmented data as possible The most efficient process for quickly expressing activities under the command of information. The system then sends defensive measures in the most active form to end the attack with the least possible damage and compromise. Permanently store all attack data for later forensic analysis.

图2是在导致并步入减缓正在进行网络攻击200的预定因素的检测和减缓中商业操作系统的示例性功能的流程图。系统连续地检索网络通信数据201,其可以由多维时序数据存储120及其编程包装120a存储并预处理。随后分析所有捕捉的数据以预测网络节点的正常使用模式,诸如内部用户,网络连接系统和设备,以及企业边界外的批准用户例如场外雇员、合约工和卖主,仅列举几个可能的参与者。自然,正常的其他网络通信也可以对于本领域技术人员是已知的,给出的列表并非意味着是排他性的,且其他可能性将不落在本发明设计之外。网络通信的分析可以包括参数的图形分析,诸如对于使用图形堆栈服务145、145a中特殊开发程序的网络使用的网络项,对由每个网络项使用的分析可以由与定向计算图模块155、通用变换器服务模块160和可拆解服务模块150相关联的特殊预开发算法完成,取决于单个使用简档201的复杂性。随后可以在自动计划服务模块130内结合额外数据进一步分析这些使用模式分析,额外数据是关于企业的网络拓扑,网关防火墙编程,内部防火墙配置,名录服务协议和配置,以及对于用户和至敏感信息访问的许可简档,仅列举几个非排他性示例,其中可以采用包括但不限于信息理论统计130a的机器学习技术,且可以应用专用于基于当前数据125a的结果预测模拟的起诉结果模拟模块125以制订当前、最新且连续演进的基线网络使用简档202。该相同数据可以与最新已知网络攻击方法报告组合,其可能通过使用多应用编程接口知晓连接器模块135而从数个发散且外来源检索以向企业决策制定者展示对于基于物理和配置的网络基础结构改变的预防性推荐以成本有效地减小网络攻击的概率并显著且最成本有效地减缓攻击203、204事件中数据泄密和损失。FIG. 2 is a flow diagram of exemplary functionality of a business operating system in causing and stepping into the detection and mitigation of predetermined factors that mitigate an ongoing cyber attack 200 . The system continuously retrieves network communication data 201, which may be stored and preprocessed by the multidimensional time series data store 120 and its programming wrapper 120a. All captured data is then analyzed to predict normal usage patterns of network nodes, such as internal users, network-connected systems and equipment, and approved users outside corporate boundaries such as off-site employees, contractors and vendors, to name just a few possible actors . Naturally, normal other network communications may also be known to those skilled in the art, the given list is not meant to be exclusive, and other possibilities will not fall outside the design of the present invention. Analysis of network communications may include graphical analysis of parameters, such as network items used for networks using specially developed programs in the graphics stack service 145, 145a, analysis of use by each network item may be performed by a directed computational graph module 155, general Depending on the complexity of the individual usage profile 201, specific pre-developed algorithms associated with the changer service module 160 and the detachable service module 150 are implemented. These usage pattern analyses can then be further analyzed within the automated scheduling services module 130 in conjunction with additional data regarding the enterprise's network topology, gateway firewall programming, internal firewall configuration, directory service protocols and configurations, and access to user and sensitive information Permission profile for, to name but a few non-exclusive examples, in which machine learning techniques including, but not limited to, information-theoretical statistics 130a may be employed, and the prosecution outcome simulation module 125 dedicated to outcome prediction simulations based on current data 125a may be applied to formulate A current, up-to-date and continuously evolving baseline network usage profile 202 . This same data can be combined with the latest known network attack method reports, possibly retrieved from several divergent and external sources by using the multi-application programming interface-aware connector module 135 to show enterprise decision makers the importance of physical and configuration-based networks Preventive recommendations for infrastructure changes to cost-effectively reduce the probability of cyber-attacks and significantly and most cost-effectively mitigate data breaches and losses in the event of attacks 203, 204.

尽管这些选项的一些可以已经在过去部分地可用作逐段解决方案,我们相信正在基于智能地集成来自多个源的大容量数据随后基于该当前数据对结果预测模拟和分析以便可以展示可活动、商业惯例高效推荐的能力在本领域是创新且必需的。While some of these options may have been partially available in the past as segment-by-segment solutions, we believe that modeling and analysis of outcomes based on intelligently integrating large volumes of data from multiple sources and then predicting outcomes based on this current data can be demonstrated so that actionable , The ability to efficiently recommend business practices is innovative and necessary in the field.

一旦已经使用所有可应用网络通信数据而公式表述了网络使用的综合基线简档,专用任务的商业操作系统连续地向如由预设计边界205所确定的基线对于活动异常而轮询输入通信数据。异常活动的示例可以包括用户尝试以快速演替访问数个工作站或服务器,或者用户尝试使用随机用户IDs或另一用户的用户名和密码获得对于服务器的具有敏感信息的域服务器访问,或者由任何用户尝试暴力破解特许用户的密码,或者重演近期发布的ACTIVE DIRECTORYTM/Kerberos票授权票,或者任何已知的正在开发的网络的存在或者将已知恶意软件引入网络,仅列举对于本领域技术人员已知的网络攻击简档的非常少的样本。预测以及知晓已知开发的本发明设计用于分析任何异常网络行为,公式表述行为的可能结果,并随后发送任何所需的警报,不论攻击是否遵循已公开的开发规范或者展现对于正常网络实践的创新特性偏差。一旦检测到可能的网络攻击,随后设计系统以获得所需信息至责任方206,可能的话,其对于减缓攻击和由其导致的损害207的每个角色定制。这可以包括在警报和更新中所包括的信息的精确子集,且所展示的格式可以是通过企业现有的安全信息和事件管理系统。随后,网络管理员可以接收信息,诸如但不限于,网络上攻击是否确信具有发源,相信当前什么系统受影响,关于攻击可以进展何处的预测信息,什么企业信息有风险,以及关于击退入侵并减缓损害的可动作推荐,而主信息安全官可以接收的警报包括但不限于网络攻击的时间线,相信已泄密的服务和信息,如果有的话已经采取了什么动作以减缓攻击,关于攻击可以如何展开的预测,以及对于控制并击退攻击207给出的建议,尽管所有当事人可以在任何时刻访问任何网络和他们已经授权访问的网络攻击信息,除非怀疑泄密。可以由系统206、207发布其他特殊定制的更新。Once a comprehensive baseline profile of network usage has been formulated using all applicable network communication data, the task-specific commercial operating system continuously polls incoming communication data for activity anomalies against the baseline as determined by pre-designed boundaries 205 . Examples of unusual activity can include user attempts to access several workstations or servers in rapid succession, or user attempts to gain domain server access with sensitive information to the server using random user IDs or another user's username and password, or by any user Attempts to brute force passwords of privileged users, or replays of recently issued ACTIVE DIRECTORY TM /Kerberos ticket authorization tickets, or the existence of any known network under development or the introduction of known malware into the network, to name only those skilled in the art have Very few samples of known cyber attack profiles. The present invention, which predicts and knows known developments, is designed to analyze any abnormal network behavior, formulate the likely consequences of the behavior, and then send any required alerts, regardless of whether the attack follows a published development specification or exhibits an indication of normal network practice. Innovation characteristic deviation. Once a possible cyber attack is detected, the system is then designed to obtain the required information to the responsible party 206, possibly customized for each role in mitigating the attack and the damage 207 caused by it. This can include a precise subset of the information included in alerts and updates, and the format presented can be through the enterprise's existing security information and event management systems. The network administrator can then receive information such as, but not limited to, whether the attack on the network is believed to have originated, what systems are believed to be currently affected, predictive information about where the attack can progress, what enterprise information is at risk, and information about repelling the intrusion and actionable recommendations to mitigate damage, and alerts that CISOs can receive include, but are not limited to, the timeline of the cyber-attack, services and information believed to have been compromised, what actions, if any, have been taken to mitigate the attack, information about the attack Predictions of how this can unfold, and advice given to contain and repel an attack 207, although all parties have access to any network and cyber attack information to which they have authorized access at any time, unless a breach is suspected. Other specially tailored updates may be issued by the systems 206, 207.

图3是示出了用于减缓网络攻击的商业操作系统功能的通常流程300的流程图。可以将输入网络数据传入315商业操作系统310以用于作为其网络安全功能的一部分的分析,输入网络数据可以包括网络流模式321、可度量网络通信的每个片段的来源和目的地322、来自网络上服务器和工作站的系统日志323、端点数据323a、来自服务器或可应用安全信息和事件(SIEM)系统的任何安全事件日志数据324、外部威胁智能馈送324a、识别或评估上下文325、外部网络健康或网络安全馈送326、Kerbero域控制器或ACTIVE DIRECTORYTM服务器日志或仪表327,以及商业单元性能相关数据328,在本发明设计用以分析和集成的许多其他可能数据类型之中。可以使用在网络安全系统的角色中商业操作系统的专用网络安全、风险评估或公共功能的至少一个变换来自多个来源的这些多个类型数据以用于分析311、312,网络安全系统诸如但不限于网络和系统用户优先监督331、网络和系统用户行为分析332、攻击者和防御者动作时间线333、SIEM集成和分析334、动态基准测试335、以及意外事件识别和分辨性能分析336,在其他可能的网络安全功能之中;担风险价值(VAR)建模和模拟341,不同类型数据违背的预期与反应成本评估以建立优先级342,工作因素分析343,以及网络事件发现率344,作为系统风险分析性能的一部分;以及格式化并交付定制报告和仪表板351、执行通用、尤其是按需数据分析352、连续地监控、对于微小变化处理并探索输入数据或扩散信息威胁353、以及产生网络-物理系统图表354作为商业操作系统的公共性能一部分的能力。输出317可以用于配置网络网关安全应用361,帮助防止通过对于基础结构推荐362的预言变化而网络入侵,在攻击周期中早期警告企业正在进行的网络攻击,可能阻扰但是至少减缓损害362,记录对于标准化指南或SLA需求的顺应,连续地探测现有网络基础结构并对于可以使得违背更可能的任何改变发出警报364,对于检测到的任何域控制器检票弱点提出解决方案365,检测恶意软件的存在366,以及取决于客户端指令一次或连续地执行脆弱性扫描367。自然,这些示例仅是系统的可能用途的子集,它们本质上是示例性的且并未反映本发明性能的任何边界。FIG. 3 is a flow diagram illustrating a general process 300 of commercial operating system functionality for mitigating network attacks. Incoming network data may be passed 315 to the business operating system 310 for analysis as part of its network security functions, the incoming network data may include network flow patterns 321, the source and destination of each segment of the measurable network communication 322, System logs 323 from servers and workstations on the network, endpoint data 323a, any security event log data 324 from servers or applicable security information and event (SIEM) systems, external threat intelligence feeds 324a, identifying or assessing context 325, external networks Health or network security feeds 326, Kerbero Domain Controller or ACTIVE DIRECTORY server logs or meters 327, and business unit performance related data 328, among many other possible data types that the present invention is designed to analyze and integrate. These multiple types of data from multiple sources can be transformed for analysis 311, 312 using at least one of the dedicated cybersecurity, risk assessment or public functions of the commercial operating system in the role of a cybersecurity system such as but not Limited to Network and System User Priority Oversight 331, Network and System User Behavior Analysis 332, Attacker and Defender Action Timeline 333, SIEM Integration and Analysis 334, Dynamic Benchmarking 335, and Incident Identification and Resolution Performance Analysis 336, among others Among the possible cybersecurity functions; value-at-risk (VAR) modeling and simulation 341, anticipation and response cost assessment of different types of data breaches to establish prioritization 342, job factor analysis 343, and cyber incident detection rates 344, as a system part of risk analysis capabilities; as well as formatting and delivering customized reports and dashboards 351, performing general, especially on-demand data analysis 352, continuously monitoring, processing and exploring incoming data for minor changes or proliferating information threats 353, and generating network - The ability of the physical system graph 354 to be part of the common capabilities of commercial operating systems. Output 317 can be used to configure network gateway security applications 361, help prevent network intrusions through oracle changes to infrastructure recommendations 362, warn enterprises of ongoing network attacks early in the attack cycle, may prevent but at least mitigate damage 362, record For compliance with standardized guidelines or SLA requirements, continuously probe existing network infrastructure and alert 364 for any changes that may make violations more likely, propose solutions 365 for any domain controller ticketing weaknesses detected, detect malware's There is 366, and vulnerability scans 367 are performed once or continuously depending on client instructions. Naturally, these examples are only a subset of the possible uses of the system, they are exemplary in nature and do not reflect any boundaries of the capabilities of the invention.

图4是用于将网络攻击信息分段至合适的公司团体的方法400的流程图。如之前所公开的,先进网络决策平台的强度之一200、351能够为特殊听众精确地定制报告和仪表板,同时地是合适的。该定制由于商业操作系统的一部分致力于特殊地编程以输出展示而是可能的,其模块包括具有其游戏引擎140a和脚本解释器140b的观察和状态评估服务140。在网络安全的设置中,专用警报、更新和报告的发布可以极大地帮助以最及时方式完成正确的减缓动作,而同时保持以预设的合适的粒度而通知所有参与者。一旦由系统401检测到网络攻击,分析与正在进行的攻击和现有网络安全知识相关的所有可应用信息,包括通过近似实时预测模拟402以开发当前事件的最精确鉴定和关于攻击可以进展何处以及可以如何减缓其的可动作推荐。总体产生的信息通常比执行它们减缓任务所需的任何一个群组更多。在这点上,在网络攻击期间,提供单个扩张且总括的警报、仪表板图像、或报告可以使得由每个参与者对决定性信息的识别和动作更困难,因此聚焦网络安全的设置可以创建多重目标信息流,每个在攻击期间遍及企业同时地设计以产生最快速和有效的动作,并发布具有可以导致以后长期改变的信息的跟踪报告和推荐。可以接收专用信息流的群组的示例包括但不限于在攻击期间的前线应答者404,在攻击期间和之后的事件法庭支持405,主信息安全官406,以及主风险官407,信息发送至聚焦的两后者以评估总损害并在攻击之后实施减缓策略和防御性改变。前线应答者可以使用网络决策平台的特殊发送至它们的已分析、已变换和已校正信息404a以探测攻击的范围,隔离该事物如:预测攻击者至企业网络上的进入点,涉及的系统或攻击的预测最终目标,且可以使用系统的模拟性能以调查以最高效方式成功地结束攻击并击退攻击者的调查备选方法,尽管对于本领域技术人员已知的许多其他查询也可由本发明答复。模拟运行也可以包括任何攻击减缓动作对于企业的IT系统和公司用户的正常和临界工作的预测性效果。类似地,主信息安全官可以使用网络决策平台以预测地分析406a什么公司信息已经被泄密,预测地模拟已经或尚未泄密的攻击的最终信息目标以及攻击现在和近期未来可以实现的总影响以保护该信息。进一步,在攻击的追溯法庭检查期间,法庭应答者可以使用网络决策平台405a以清晰并完整地通过预测模拟和大容量数据分析映射网络基础结构的范围。法庭分析者也可以使用平台的性能以采用渗透企业的子网和服务器所用的方法执行攻击进展的时序和基础结构空间分析。此外,主风险官将执行什么信息407a被盗的分析并预测模拟随着时间进展盗窃者对于企业意味着什么。额外地,可以利用系统的预测性能以帮助创建改变IT基础结构的计划,这可以使得在公司现场有限的企业预算约束之下对于网络安全风险矫正最佳以便于最大化金融结果。4 is a flowchart of a method 400 for segmenting cyber attack information to appropriate corporate groups. As previously disclosed, one of the strengths of the Advanced Web Decision Platform 200, 351 is capable of precisely customizing reports and dashboards for specific audiences, while being appropriate. This customization is possible because a portion of the commercial operating system is dedicated to being specially programmed to output the presentation, the modules of which include the observation and state evaluation service 140 with its game engine 140a and script interpreter 140b. In a cybersecurity setting, the publication of dedicated alerts, updates, and reports can greatly assist in accomplishing the right mitigation actions in the most timely manner, while keeping all participants informed at a preset appropriate granularity. Once a cyber attack is detected by the system 401, analyze all applicable information related to the ongoing attack and existing cyber security knowledge, including through near real-time predictive simulation 402 to develop the most accurate identification of current events and where the attack can progress And actionable recommendations on how you can slow it down. The aggregates generally produce more information than any one group needs to perform their mitigation tasks. In this regard, during a cyber-attack, providing a single augmented and aggregated alert, dashboard image, or report can make identification and action on decisive information more difficult by each actor, so a cybersecurity-focused setting can create multiple Targeted information flows, each designed simultaneously throughout the enterprise during an attack to produce the most rapid and effective action, and to publish tracking reports and recommendations with information that can lead to long-term changes later. Examples of groups that may receive a dedicated stream of information include, but are not limited to, Frontline Responders 404 during an attack, Incident Court Support 405 during and after an attack, Primary Information Security Officer 406, and Primary Risk Officer 407, information sent to Spotlight of both the latter to assess total damage and implement mitigation strategies and defensive changes following an attack. Front responders can use the special analyzed, transformed and corrected information 404a sent to them by the network decision platform to detect the scope of the attack, isolate such things as: predict the attacker's entry point on the enterprise network, the systems involved or The predicted ultimate goal of the attack, and the simulated performance of the system can be used to investigate alternative methods of investigation to successfully end the attack and repel the attacker in the most efficient manner, although many other queries known to those skilled in the art may be used by the present invention reply. The simulation run may also include the predictive effect of any attack mitigation actions on the normal and critical work of the enterprise's IT systems and the company's users. Similarly, CISOs can use the Cyber Decision Platform to predictively analyze 406a what company information has been compromised, predictively model the ultimate information goals of attacks that have or have not been compromised, and the total impact of attacks that can be achieved now and in the near future to protect the information. Further, during retrospective forensic examination of an attack, forensic responders can use the network decision platform 405a to map the scope of the network infrastructure through predictive simulations and high-volume data analysis with clarity and integrity. Forensic analysts can also use the platform's capabilities to perform time-series and infrastructure-space analysis of attack progression in the same way that it was used to infiltrate an enterprise's subnets and servers. In addition, the master risk officer will perform an analysis of what information 407a is stolen and predict what the thief will mean to the business over time. Additionally, the predictive performance of the system can be leveraged to help create plans to change the IT infrastructure, which can optimize cybersecurity risk remediation within the limited corporate budget constraints of the corporate site in order to maximize financial outcomes.

图5是根据一个特征方面用于使用施动者驱动分布式计算图500快速预测分析非常大数据集的系统的示例性架构图。根据特征方面,DCG 500可以包括流水线编排器501,可以用于对处理流水线内数据执行广泛各种数据变换函数,且可以用于消息收发系统510,其使能采用任意数目各种服务和协议而通信,中继消息并如需要的话为了与外部系统互用性将它们变换为协议专用API系统调用(而不是要求将特定协议或服务集成至DCG 500中)。5 is an exemplary architectural diagram of a system for rapid predictive analysis of very large data sets using an actor-driven distributed computing graph 500, according to one feature aspect. According to feature aspects, DCG 500 can include a pipeline orchestrator 501 that can be used to perform a wide variety of data transformation functions on data within a processing pipeline, and can be used in a messaging system 510 that enables use of any number of various services and protocols. Communicate, relay messages and convert them to protocol specific API system calls if needed for interoperability with external systems (rather than requiring specific protocols or services to be integrated into DCG 500).

流水线编排器501可以分散多个子流水线群集502a-b,其可以用作用于流水线并行处理的专用工作者。在一些设置中,整个数据处理流水线可以传至子群集502a用于处理,与单个处理任务不同,使得每个子群集502a-b以专用方式处理整个数据流水线以使用不同的群集节点502a-b维持不同流水线的隔离处理。流水线编排器501可以提供用于开始、停止、提交或保存流水线的软件API。当开始流水线时,流水线编排器501可以发送流水线信息至可应用的工作者节点502a-b,例如使用AKKATM群集。对于由流水线编排器501初始化的每个流水线,可以维持具有状态信息的报告对象。流活动可以报告处理事件的最后时间,以及所处理事件的数目。批处理活动可以当它们出现时报告状态消息。流水线编排器501可以使用例如IGFSTM高速缓存文件系统执行批处理高速缓存。这允许流水线502a-b内的活动512ad相互传递数据上下文,采用任何必需的参数配置。The pipeline orchestrator 501 can scatter multiple sub-pipeline clusters 502a-b, which can serve as dedicated workers for pipeline parallel processing. In some arrangements, the entire data processing pipeline may be passed to sub-cluster 502a for processing, as opposed to a single processing task, such that each sub-cluster 502a-b processes the entire data pipeline in a dedicated manner to maintain differences using different cluster nodes 502a-b Pipeline isolation processing. The pipeline orchestrator 501 may provide software APIs for starting, stopping, committing, or saving pipelines. When starting a pipeline, the pipeline orchestrator 501 may send pipeline information to applicable worker nodes 502a-b, eg, using an AKKA cluster. For each pipeline initialized by the pipeline scheduler 501, a report object with status information may be maintained. Stream activities can report the last time an event was processed, as well as the number of events processed. Batch activities can report status messages as they occur. The pipeline scheduler 501 may perform batch caching using, for example, the IGFS cache file system. This allows activities 512ad within pipelines 502a-b to communicate data contexts to each other, with any necessary parameter configurations.

流水线管理器511a-b可以对于每个新运行的流水线分散,且可以用于发送活动、状态、寿命、和事件计数信息至流水线编排器501。在特定流水线内,可以由流水线管理器511a-b创建多个活动施动者512a-d以处理单个任务,并提供输出至数据服务522a-d。在给定流水线中使用的数据模型可以由特殊流水线和活动确定,如由流水线管理器511a-b所指引。每个流水线管理器511a-b控制并指引由其所分散的任何活动施动者512a-d的操作。流水线进程可以需要在任务之间协调流发送数据。为此,流水线管理器511a-b可以分散服务连接器以动态地创建活动实例512a-d之间的TCP连接。可以对于每个单独活动512a-d维持数据上下文,且可以高速缓存以如需要的话提供至其他活动512a-d。数据上下文限定了活动如何访问信息,且活动512a-d可以处理数据或简单地将其转发至下一步骤。在流水线步骤之间转发数据可以通过流发送上下文或批处理上下文而路由发送数据。The pipeline managers 511a-b can be distributed for each newly running pipeline and can be used to send activity, status, age, and event count information to the pipeline orchestrator 501 . Within a particular pipeline, multiple activity actors 512a-d may be created by pipeline managers 511a-b to process a single task and provide output to data services 522a-d. The data model used in a given pipeline may be determined by a particular pipeline and activity, as directed by the pipeline managers 511a-b. Each pipeline manager 511a-b controls and directs the operation of any activity actors 512a-d distributed by it. A pipelined process may need to coordinate streaming data between tasks. To this end, the pipeline managers 511a-b may distribute service connectors to dynamically create TCP connections between active instances 512a-d. A data context may be maintained for each individual activity 512a-d and may be cached to provide to other activities 512a-d as needed. The data context defines how activities can access information, and activities 512a-d can process the data or simply forward it to the next step. Forwarding data between pipeline steps can route data through a streaming context or a batching context.

客户端服务群集530可以操作多个服务施动者521a-d以服务活动施动者512a-d的请求,理想地维持足够服务施动者521a-d以支持每个服务类型的每个活动。这些也可以设置在服务群集520a-d内,以类似于数据流水线中群集502a-b内活动施动者512a-d的逻辑组织类似的方式。可以使用录入服务530以在操作期间录入并采样DCG请求和消息,而可以使用通知服务540以在操作期间接收警报和其他通知(例如报警错误,其可以随后通过浏览来自录入服务530的记录而诊断),并通过外部连接至消息收发系统510,可以在操作期间不影响DCG500而添加、移除或修改录入和通知服务。可以使用多个DCG协议550a-b以在DCG 500和消息收发系统510之间提供结构化消息收发,或使得消息收发系统510如所示跨服务群集520a-d而分布DCG消息。可以使用服务协议560以限定服务交互以便可以修改DCG 500而并未影响服务实施方式。以该方式,可以知晓的是,使用施动者驱动的DCG 500的系统的总体结构以模块化方式工作,使能各个部件的修改和替换而并未影响其他操作或要求额外重新配置。The client service cluster 530 can operate multiple service actors 521a-d to service the requests of the activity actors 512a-d, ideally maintaining enough service actors 521a-d to support each activity of each service type. These may also be arranged within service clusters 520a-d, in a similar manner to the logical organization of activity actors 512a-d within clusters 502a-b in a data pipeline. The logging service 530 can be used to log and sample DCG requests and messages during operation, while the notification service 540 can be used to receive alerts and other notifications during operation (eg, alarm errors, which can then be diagnosed by browsing the logs from the logging service 530 ). ), and through an external connection to the messaging system 510, entry and notification services can be added, removed or modified during operation without affecting the DCG 500. Multiple DCG protocols 550a-b may be used to provide structured messaging between DCG 500 and messaging system 510, or to enable messaging system 510 to distribute DCG messages across service clusters 520a-d as shown. The service protocol 560 can be used to define service interactions so that the DCG 500 can be modified without affecting the service implementation. In this manner, it can be seen that the overall structure of the system using the actor-driven DCG 500 works in a modular fashion, enabling modification and replacement of individual components without affecting other operations or requiring additional reconfiguration.

图6是根据一个特征方面的使用施动者驱动的分布式计算图500用于快速预测分析非常大数据集合的系统的示例性架构图。根据特征方面,变形消息收发设置可以利用消息收发系统510作为消息收发经纪人,其使用流发送协议610,立即使用消息收发系统510作为消息经纪人发送和接收消息以如需要的话在服务施动者521a-b之间桥接通信。备选地,单个服务522a-b可以使用数据上下文服务630作为经纪人在批处理上下文620中直接地通信以批处理并在服务522a-b之间中继消息。6 is an exemplary architectural diagram of a system for rapid predictive analysis of very large data sets using an actor-driven distributed computing graph 500, according to one feature aspect. According to feature aspects, a variant messaging setup may utilize the messaging system 510 as a messaging broker, which uses the streaming protocol 610, to immediately use the messaging system 510 as a messaging broker to send and receive messages to service actors as needed Bridge communication between 521a-b. Alternatively, individual services 522a-b may communicate directly in batch context 620 using data context service 630 as a broker to batch and relay messages between services 522a-b.

图7是根据一个特征方面的使用施动者驱动的分布式计算图500用于快速预测分析非常大数据集合的系统的示例性架构图。根据特征方面,变形的消息收发设置可以利用服务连接器710作为多个服务施动者521a-b之间的中央消息经纪人,在流发送上下文610中桥接消息,而数据上下文服务630继续在批处理上下文620中的单个服务522a-b之间提供直接的点对点消息收发。7 is an exemplary architectural diagram of a system for rapid predictive analysis of very large data sets using an actor-driven distributed computing graph 500 according to one feature aspect. According to feature aspects, a variant messaging setup may utilize service connector 710 as a central message broker between multiple service actors 521a-b, bridging messages in streaming context 610, while data context service 630 continues in batches Direct peer-to-peer messaging between individual services 522a-b in processing context 620 is provided.

应该知晓,上述系统变形例的各种组合和设置(参照图1-7)可以是可能的,例如使用一个特定消息收发设置用于由流水线管理器511a-b指引的一个数据流水线,而另一流水线可以利用不同的消息收发设置(或者可以根本不利用消息收发)。以该方式,单个DCG 500和流水线编排器501可以以最适合它们特定需求的方式操作单个流水线,通过如上图5中所述设计模块化而使得动态设置可能。It should be appreciated that various combinations and arrangements of the above-described system variants (referring to Figures 1-7) may be possible, such as using a particular messaging arrangement for one data pipeline directed by pipeline managers 511a-b, while another Pipelines may utilize different messaging settings (or may not utilize messaging at all). In this way, a single DCG 500 and pipeline orchestrator 501 can operate a single pipeline in a way that best suits their specific needs, making dynamic settings possible by designing modularity as described in Figure 5 above.

示例性特征方面的详细说明DETAILED DESCRIPTION OF EXEMPLARY FEATURES

图8是根据一个特征方面的用于网络安全行为分析的示例性方法800的流程图。根据特征方面,行为分析可以利用来自多个现有端点的被动信息馈送(例如包括但不限于网络上用户活动、网络性能或装置行为)以产生安全解决方案。在初始步骤801中,网络爬虫115可以被动地收集活动信息,其可以随后使用DCG 155处理802以分析行为模式。基于该初始分析,可以识别803异常行为(例如基于从已建立模式或趋势的变化阈值)诸如高风险用户或恶意软件操作者诸如机器人。随后可以使用804这些异常行为以分析潜在攻击角度并随后基于该第二级分析和由动作结果模拟模块125产生的预测而产生805安全建议以确定改变的可能效果。建议的行为可以随后如果需要的话自动地实施806。被动监控801可以继续,在实施806了新安全解决方案之后收集信息,使得机器学习随着时间改进操作,当安全之间关系改变且观察并分析了观察到的行为和威胁时。8 is a flow diagram of an exemplary method 800 for network security behavior analysis, according to one feature aspect. According to feature aspects, behavioral analysis can leverage passive information feeds from multiple existing endpoints (eg, including, but not limited to, user activity on the network, network performance, or device behavior) to produce security solutions. In an initial step 801, the web crawler 115 can passively collect activity information, which can then be processed 802 using the DCG 155 to analyze behavioral patterns. Based on this initial analysis, abnormal behavior such as high risk users or malware operators such as bots can be identified 803 (eg, based on changing thresholds from established patterns or trends). These anomalous behaviors can then be used 804 to analyze potential attack angles and then based on this second level analysis and the predictions produced by the action result simulation module 125 to generate 805 security recommendations to determine the likely effects of the changes. The suggested action can then be automatically implemented 806 if desired. Passive monitoring 801 may continue, collecting information after a new security solution is implemented 806, allowing machine learning to improve operations over time, as relationships between security change and observed behaviors and threats are observed and analyzed.

该用于行为分析的方法800使能针对各种网络攻击威胁的前摄和高速反应防御能力,各种网络攻击威胁包括异常人类行为以及非人类“做坏事者”诸如可以探测并随后利用已有脆弱点的自动软件机器人。以该方式使用自动行为学习提供了比人工干预远远更响应性的解决方案,使能对于威胁快速响应以减缓任何潜在影响。利用机器学习行为进一步增强该方案,提供了在仅当威胁发生时对它们做出反应的简单自动方案中不可能的额外前摄行为。The method 800 for behavioral analysis enables proactive and high-speed reactive defense capabilities against a variety of cyberattack threats, including anomalous human behavior as well as non-human "bad actors" such as those who can detect and then exploit existing Vulnerable automated software bots. Using automated behavioral learning in this manner provides a far more responsive solution than human intervention, enabling rapid responses to threats to mitigate any potential impact. The scheme is further enhanced with machine-learned behaviors, providing additional proactive behaviors not possible in a simple automatic scheme that only reacts to threats when they occur.

图9是根据一个特征方面的用于度量网络安全攻击的效果的示例性方法900的流程图。根据特征方面,可以使用DCG 155度量攻击的影响评估以分析用户账号并识别其访问能力901(例如账号可以访问什么文件、名录、装置或域)。这可以随后用于产生902对于账号的影响评估得分,表示了账号被泄密的潜在风险。在事故的事件中,可以使用对于任何泄密账号的影响评估得分以产生“冲击波半径”计算903,精确地识别了作为入侵的结果什么资源处于风险以及安保人员应该聚焦关注于何处。为了通过模拟模块125提供前摄安全推荐,可以运行904模拟的入侵以对于各种攻击识别潜在冲击波半径计算并确定905高风险账号或资源以便可以在那些关键领域改进安全性而不是聚焦于反应解决方案。9 is a flowchart of an exemplary method 900 for measuring the effect of a network security attack, according to one feature aspect. In terms of features, the impact assessment of an attack can be measured using the DCG 155 to analyze user accounts and identify their access capabilities 901 (eg, what files, directories, devices, or domains the account can access). This can then be used to generate 902 an impact assessment score for the account, representing the potential risk of the account being compromised. In the event of an incident, the impact assessment score for any compromised accounts can be used to generate a "shock radius" calculation 903, identifying precisely what resources are at risk as a result of the intrusion and where security personnel should focus their attention. In order to provide proactive security recommendations through the simulation module 125, simulated intrusions can be run 904 to identify potential shock radius calculations for various attacks and determine 905 high risk accounts or resources so that security can be improved in those critical areas rather than focusing on reactive resolution Program.

图10是根据一个特征方面的用于连续网络安全监控和探勘的示例性方法1000的流程图。根据特征方面,状态观察服务140可以从各种相连系统1001诸如(例如包括但不限于)服务器、域、数据库或用户词典接收数据。可以连续地接收该信息,被动地收集事件并监控随时间变化的活动,同时将收集到的信息馈送1002至图形服务145中以用于产生状态的时序图1003并随时间变化。该调整的时序数据可以随后用于产生随时间变化的可视化1004,将收集到的数据量化为有意义且可理解的格式。当记录新事件时,诸如改变用户角色或许可,修改服务器或数据结构,或者安全基础架构内其他变化,自动地将这些事件包括至时序数据中并因此更新可视化,以高亮凸显有意义数据而并未由于待检查数据点数量而丢失细节的方式提供了信息健康的实况监控。10 is a flow diagram of an exemplary method 1000 for continuous network security monitoring and exploration, according to one feature aspect. According to feature aspects, the state observation service 140 may receive data from various connected systems 1001 such as, for example, including but not limited to, servers, domains, databases, or user dictionaries. This information can be received continuously, events are passively collected and activity monitored over time, while the collected information is fed 1002 into the graphics service 145 for use in generating a timing diagram 1003 of states and changes over time. This adjusted time series data can then be used to generate a visualization 1004 over time, quantifying the collected data into a meaningful and understandable format. When new events are recorded, such as changing user roles or permissions, modifying servers or data structures, or other changes within the security infrastructure, automatically include these events in the time series data and update the visualization accordingly to highlight meaningful data while Live monitoring of information health is provided in a way that does not lose detail due to the number of data points to be examined.

图11是根据一个特征方面的用于绘制网络-物理系统图(CPG)的示例性方法1100的流程图。根据特征方面,网络-物理系统图可以包括在安全基础结构中装置和资源之间层级和关系的可视化,将安全信息置于易于由安保人员和用户可理解的物理装置关系的上下文中。在初始步骤1101中,可以在图形服务145处接收行为分析信息(如之前参照图8所述)用于包括在CPG中。在下一个步骤1102中,可以接收影响评估得分(如之前参照图9所述)并包括在CPG信息中,将风险评估上下文添加至行为信息。在下一个步骤1103中,可以接收并包括时序信息(如之前参照图10所述),当出现变化且录入事件时更新CPG信息。可以随后使用该信息以产生1104将物理关系(诸如用户的个人计算机或智能电话,或服务器之间物理连接)与逻辑关系(诸如访问特权或数据库连接)相关联的用户、服务器、装置和其他资源的可视化,以产生反映了基础结构中存在的内部关系的当前状态的安全基础结构的有意义且上下文化的可视化。11 is a flowchart of an exemplary method 1100 for drawing a cyber-physical system diagram (CPG) according to one feature aspect. According to feature aspects, a cyber-physical system diagram may include a visualization of hierarchies and relationships between devices and resources within a security infrastructure, placing security information in the context of physical device relationships readily understandable by security personnel and users. In an initial step 1101, behavioral analysis information (as previously described with reference to FIG. 8) may be received at the graphics service 145 for inclusion in the CPG. In the next step 1102, the impact assessment score (as previously described with reference to FIG. 9) may be received and included in the CPG information, adding the risk assessment context to the behavior information. In the next step 1103, timing information may be received and included (as previously described with reference to Figure 10), and CPG information updated when changes occur and events are entered. This information can then be used to generate 1104 users, servers, devices and other resources that associate physical relationships (such as a user's personal computer or smartphone, or physical connection between servers) with logical relationships (such as access privileges or database connections) to produce meaningful and contextual visualizations of the security infrastructure that reflect the current state of the internal relationships that exist in the infrastructure.

图12是根据一个特征方面的用于连续网络回弹计分的示例性方法1200的流程图。根据特征方面,可以使用基线得分以度量对于网络基础结构的整体风险水平,且可以通过诸如使用互联网或公共脆弱点和开发(CVE)进程而首先收集1201关于对公众公开的脆弱点的信息从而编译。该信息可以随后包括1201至如前图11中所述CPG中,且可以随后分析1203CPG和已知脆弱点的组合数据以识别在已知脆弱点与由基础结构部件所暴露风险之间的关系。这产生了组合的CPF 1204,包括了网络资源、用户账号和装置的内部风险水平,以及基于已知脆弱点和安全风险的分析的实际风险水平。12 is a flowchart of an exemplary method 1200 for continuous network rebound scoring, according to one feature aspect. In terms of characteristics, a baseline score can be used to measure the overall level of risk to the network infrastructure, and can be compiled by first gathering 1201 information on vulnerabilities exposed to the public, such as using the Internet or a public vulnerability and exploitation (CVE) process . This information may then be included 1201 into the CPG as previously described in Figure 11, and the combined data of the CPG and known vulnerabilities may then be analyzed 1203 to identify relationships between known vulnerabilities and risks exposed by infrastructure components. This produces a combined CPF 1204 that includes internal risk levels for network resources, user accounts and devices, and actual risk levels based on an analysis of known vulnerabilities and security risks.

图13是根据一个特征方面的用于网络安全特权监督的示例性方法1300的流程图。根据特征方面,可以对于用户账号、证书、名录和其他基于用户的特权和访问信息而收集1301时序数据(如以上参照图10所述)。随后可以分析1302该数据以识别可以影响安全性的随时间的变化,诸如修改用户访问特权或添加新用户。可以针对CPG检查1303分析的结果(如之前图11中所述),以比较并将用户名录变化与真实基础结构状态相关联。该比较可以用于执行精确且上下文增强的用户名录审计1304,这不仅识别当前用户证书和其他用户专用信息,而且也识别了该信息随时间的变化以及用户信息如何与真实基础结构相关(例如,准许访问装置的证书,且可以因此由于并非从用户名录单独明显可见的装置关系而隐含地准许额外访问)。13 is a flowchart of an exemplary method 1300 for network security privilege supervision, according to one feature aspect. According to feature aspects, time series data (as described above with reference to FIG. 10 ) may be collected 1301 for user accounts, credentials, directories, and other user-based privilege and access information. This data can then be analyzed 1302 to identify changes over time that can affect security, such as modifying user access privileges or adding new users. The results of the 1303 analysis (as previously described in Figure 11) can be examined against the CPG to compare and correlate the user directory changes with the real infrastructure state. This comparison can be used to perform an accurate and context-enhanced user directory audit 1304 that not only identifies current user credentials and other user-specific information, but also how this information has changed over time and how user information relates to the real infrastructure (eg, Credentials granting access to the device, and may thus implicitly grant additional access due to device relationships not individually apparent from the user directory).

图14是根据一个特征方面的用于网络安全风险管理的示例性方法1400的流程图。根据特征方面,可以组合之前所述的多个方法以当它们出现时提供攻击的实况评估,通过首先接收1401用于基础结构(如前图10中所述)以提供网络事件实况监控的时序数据。随后采用CPG(如以上图11中所述)增强1402该数据以将事件与真实基础结构要素诸如服务器或账号相关联。当事件(例如针对脆弱系统或资源的尝试攻击)发生1403时,在时序数据中录入1404事件,并针对CPG比较1405以确定影响。这随着包括对于任何受影响资源的影响评估信息1406而增强,且随后针对基线得分检查攻击1407以确定攻击的影响全部范围以及对基础结构或策略的任何必需修改。14 is a flowchart of an exemplary method 1400 for cybersecurity risk management, according to one feature aspect. According to feature aspects, the various methods described earlier can be combined to provide a live assessment of attacks as they occur, by first receiving 1401 time series data for the infrastructure (as previously described in Figure 10) to provide live monitoring of network events . This data is then augmented 1402 using CPG (as described above in Figure 11) to correlate events with real infrastructure elements such as servers or accounts. When an event (eg, an attempted attack on a vulnerable system or resource) occurs 1403, the event is entered 1404 in the time series data and compared 1405 against the CPG to determine impact. This is augmented by including impact assessment information 1406 for any affected resources, and then examining the attack 1407 against the baseline score to determine the full extent of the attack's impact and any necessary modifications to infrastructure or policies.

图15是根据一个特征方面的用于减缓泄密证书威胁的示例性方法1500的流程图。根据特征方面,可以对于名录中用户账号收集1501影响评估得分(如前参照图9所述),以便在真实攻击事件之前已知了任何给定证书攻击的潜在影响。该信息可以与如前图11中所述CPG组合1502,将影响评估得分置于在基础结构内的上下文中(例如,以便其可以预测什么系统或资源对于任何给定证书攻击可以处于风险)。随后可以执行1503模拟攻击以使用机器学习以改进安全性而无需等待真实攻击触发反应响应。冲击波半径评估(如上图9中所述)可以用于响应1504以确定模拟攻击的效果并识别弱点,以及产生用于针对未来攻击改进并强化基础结构的推荐报告1505。15 is a flowchart of an exemplary method 1500 for mitigating the threat of compromised credentials, according to one feature aspect. According to feature aspects, impact assessment scores can be collected 1501 for user accounts in the directory (as previously described with reference to Figure 9) so that the potential impact of any given credential attack is known prior to the actual attack event. This information can be combined 1502 with the CPG as previously described in Figure 11 to place the impact assessment score in context within the infrastructure (eg, so that it can predict what systems or resources may be at risk for any given credential attack). A simulated attack can then be performed 1503 to use machine learning to improve security without waiting for a real attack to trigger a reactive response. Shockwave radius assessments (described above in FIG. 9 ) can be used to respond 1504 to determine the effectiveness of a simulated attack and identify weaknesses, as well as to generate a recommended report 1505 for improving and hardening the infrastructure for future attacks.

硬件架构hardware architecture

通常,在此公开的技术可以实施在硬件或者软件与硬件的组合上。例如,它们可以实施在操作系统内核中,在分立用户进程中,在绑定至网络应用中的库数据包中,在特殊构造的机器上,在专用集成电路(ASIC)上,或者在网络接口卡上。Generally, the techniques disclosed herein may be implemented in hardware or a combination of software and hardware. For example, they can be implemented in the operating system kernel, in a discrete user process, in a library package bound to a network application, on a specially constructed machine, on an application specific integrated circuit (ASIC), or on a network interface on the card.

在此所公开特征方面的至少一些的软件/硬件混合实施方式可以实施在由存储在存储器中的计算机程序选择性激活或重新配置的可编程网络驻留机器(应该理解为包括间歇连接的知悉网络的机器)上。该网络装置可以具有可以配置或设计用以利用不同类型网络通信协议的多个网络接口。可以在此描述对于这些机器的一些的通用架构以便于说明由此可以实施给定功能单元的一个或多个示例性机制。根据具体特征方面,在此所公开各个特征方面的特征或功能的至少一些可以实施在于一个或多个网络相关联的一个或多个通用计算机上,诸如例如终端用户计算机系统、客户端计算机、网络服务器或其他服务器系统、移动计算装置(例如平板计算装置、移动电话、智能电话、膝上型计算机、或其他合适的计算装置)、消费者电子装置、音乐播放器、或任何其他合适的电子装置、路由器、交换机、或其他合适的装置、或其任意组合。在至少一些特征方面中,在此所公开各个特征方面的特征或功能的至少一些可以实施在一个或多个虚拟化计算环境(例如网络计算云,驻留在一个或多个物理计算机器上的虚拟机,或其他合适的虚拟环境)中。Hybrid software/hardware implementations of at least some of the aspects of the features disclosed herein may be implemented on a programmable network-resident machine selectively activated or reconfigured by a computer program stored in memory (should be understood to include intermittently connected network-aware machine). The network device may have multiple network interfaces that may be configured or designed to utilize different types of network communication protocols. A general architecture for some of these machines may be described herein to facilitate illustration of one or more exemplary mechanisms by which a given functional unit may be implemented. Depending on the particular feature aspect, at least some of the features or functions of the various feature aspects disclosed herein may be implemented on one or more general-purpose computers associated with one or more networks, such as, for example, end-user computer systems, client computers, network Server or other server system, mobile computing device (eg, tablet computing device, mobile phone, smartphone, laptop, or other suitable computing device), consumer electronics device, music player, or any other suitable electronic device , routers, switches, or other suitable devices, or any combination thereof. In at least some feature aspects, at least some of the features or functions of the various feature aspects disclosed herein may be implemented in one or more virtualized computing environments (eg, network computing clouds, hosted on one or more physical computing machines) virtual machine, or other suitable virtual environment).

现在参照图16,示出了方框图,其描绘了适用于实施在此所公开特征或功能的至少一部分的示例性计算装置10。计算装置10可以例如是在之前图表中列出的计算机器的任意一个,或者实际上是能够根据存储在存储器中的一个或多个程序执行基于软件或硬件的指令的任何其他电子装置。可以配置计算装置10以使用对于该连接的已知协议与多个其他计算装置诸如客户端或服务器在通信网络之上通信,通信网络诸如广域网、城域网、局域网、无线网络、互联网、或任何其他网络,不论有线或无线。Referring now to FIG. 16, a block diagram depicting an exemplary computing device 10 suitable for implementing at least a portion of the features or functions disclosed herein is shown. Computing device 10 may be, for example, any of the computing machines listed in the preceding figures, or indeed any other electronic device capable of executing software or hardware based instructions according to one or more programs stored in memory. Computing device 10 may be configured to communicate with a number of other computing devices such as clients or servers over a communication network such as a wide area network, metropolitan area network, local area network, wireless network, the Internet, or any Other networks, whether wired or wireless.

在一个特征方面中,计算装置10包括一个或多个中央处理单元(CPU)12,一个或多个接口15,以及一个或多个总线14(诸如外围部件互联(PCI)总线)。当在合适的软件或固件的控制下动作时,CPU 12可以负责实施与特殊配置的计算装置或机器的功能相关联的特殊功能。例如,在至少一个特征方面中,可以配置或设计计算装置10以用作利用了CPU 12、本地存储器11和/或远程存储器16、以及接口15的服务器系统。在至少一个特征方面中,可以使得CPU 12在软件模块或部件的控制之下执行不同类型功能和/或操作的一个或多个,软件模块或部件例如可以包括操作系统以及任何合适的硬件软件、驱动器等等。In one characteristic aspect, computing device 10 includes one or more central processing units (CPUs) 12, one or more interfaces 15, and one or more buses 14 (such as a peripheral component interconnect (PCI) bus). When acting under the control of suitable software or firmware, CPU 12 may be responsible for implementing special functions associated with the functions of a specially configured computing device or machine. For example, in at least one feature aspect, computing device 10 may be configured or designed to function as a server system utilizing CPU 12 , local memory 11 and/or remote memory 16 , and interface 15 . In at least one feature aspect, CPU 12 may be caused to perform one or more of different types of functions and/or operations under the control of software modules or components, which may include, for example, an operating system and any suitable hardware software, drives, etc.

CPU 12可以包括一个或多个处理器13,诸如例如来自Intel、ARM、Qualcomm和AMD微处理器系列之一的处理器。在一些特征方面中,处理器13可以包括用于控制计算装置10工作的特殊设计硬件诸如专用集成电路(ASICs)、电可擦除可编程只读存储器(EEPROMs)、现场可编程门阵列(FPGAs)等等。在特定的特征方面中,本地存储器11(诸如非易失性随机访问存储器(RAM)和/或只读存储器(ROM),包括例如一级或多级高速缓存)也可以形成CPU12的一部分。然而,存在存储器可以耦合至系统10的许多不同方式。存储器11可以用于各种目的,诸如例如高速缓存和/或存储数据、编程指令等等。应该进一步知晓,CPU 12可以是各种芯片上系统(SOC)型硬件之一,其可以包括额外的硬件诸如存储器或图形处理芯片,诸如本领域变得越来越普通的QUALCOMM SNAPDRAGONTM或SAMSUNG EXYNOSTMCPU,诸如用于移动装置或集成装置中。The CPU 12 may include one or more processors 13, such as, for example, processors from one of the Intel, ARM, Qualcomm and AMD microprocessor families. In some feature aspects, processor 13 may include specially designed hardware such as application specific integrated circuits (ASICs), electrically erasable programmable read only memories (EEPROMs), field programmable gate arrays (FPGAs) for controlling the operation of computing device 10 )and many more. In certain feature aspects, local memory 11 , such as non-volatile random access memory (RAM) and/or read only memory (ROM), including, for example, one or more levels of cache memory, may also form part of CPU 12 . However, there are many different ways in which memory may be coupled to system 10 . The memory 11 may be used for various purposes, such as, for example, caching and/or storing data, programming instructions, and the like. It should be further appreciated that the CPU 12 may be one of various system-on-chip (SOC) type hardware, which may include additional hardware such as memory or graphics processing chips, such as the QUALCOMM SNAPDRAGON or SAMSUNG EXYNOS that are becoming more common in the art TM CPU, such as used in mobile devices or integrated devices.

如在此所使用,术语“处理器”不仅限于现有技术中称作处理器、移动处理器或微处理器的那些集成电路,而是广义地涉及微控制器、微计算机、可编程逻辑控制器、专用集成电路、以及任何其他可编程电路。As used herein, the term "processor" is not limited to those integrated circuits known in the art as processors, mobile processors, or microprocessors, but broadly refers to microcontrollers, microcomputers, programmable logic control devices, application-specific integrated circuits, and any other programmable circuits.

在一个特征方面中,提供接口15作为网络接口卡(NICs)。通常,NICs控制在计算机网络之上发送和接收数据包;其他类型接口15可以例如支持计算装置10所使用的其他外围装置。在可以提供的接口之中是以太网接口、帧中继接口、电缆接口、DSL接口、令牌环接口、图形接口等等。此外,可以提供各种类型接口,诸如例如,通用串行总线(USB)、串行、以太网、FIREWIRETM、THUNDERBOLTTM、PCI、并行、射频(RF)、BLUETOOTHTM、近场通信(例如使用近场磁体)、802.11(WiFi)、帧中继、TCP/IP、ISDN、快速以太网接口、吉比特以太网接口、串行ATA(SATA)或外部SATA(ESATA)接口、高清多媒介接口(HDMI)、数字视觉接口(DVI)、模拟或数字音频接口、异步传输模式(ATM)接口、高速串行接口(HSSI)接口、销售点(POS)接口、光纤数据分布接口(FDDIs)等等。通常,该接口15可以包括适用于与合适的媒介通信的物理端口。在一些情形中,它们也可以包括独立处理器(诸如专用音频或视频处理器,如在本领域中对于高保真A/V硬件接口普通的),且在一些情形中可以是易失性和/或非易失性存储器(例如RAM)。In one characteristic aspect, interfaces 15 are provided as network interface cards (NICs). Typically, NICs control the sending and receiving of data packets over a computer network; other types of interfaces 15 may, for example, support other peripherals used by computing device 10 . Among the interfaces that can be provided are Ethernet interfaces, Frame Relay interfaces, cable interfaces, DSL interfaces, Token Ring interfaces, graphics interfaces, and the like. Additionally, various types of interfaces may be provided, such as, for example, Universal Serial Bus (USB), Serial, Ethernet, FIREWIRE , THUNDERBOLT , PCI, Parallel, Radio Frequency (RF), BLUETOOTH , Near Field Communication (eg using Near Field Magnet), 802.11 (WiFi), Frame Relay, TCP/IP, ISDN, Fast Ethernet, Gigabit Ethernet, Serial ATA (SATA) or External SATA (ESATA), High Definition Multimedia ( HDMI), digital visual interface (DVI), analog or digital audio interface, asynchronous transfer mode (ATM) interface, high-speed serial interface (HSSI) interface, point-of-sale (POS) interface, fiber optic data distribution interfaces (FDDIs), and more. Typically, the interface 15 may include a physical port suitable for communicating with a suitable medium. In some cases, they may also include independent processors (such as dedicated audio or video processors, as is common in the art for high-fidelity A/V hardware interfaces), and in some cases may be volatile and/or or non-volatile memory such as RAM.

尽管图16中示出的系统说明了用于实施在此所述一个或多个特征方面的计算装置10的一个特殊架构,其绝非仅是可以在其上实施在此所述特征和技术的至少一部分的装置架构。例如,可以使用具有一个或任意数目处理器13的架构,且该处理器13可以存在于单个装置中,或分布在任意数目装置之中。在一个特征方面中,单个处理器13处理通信以及例行计算,而在其他特征方面中可以提供分立的专用通信处理器。在各个特征方面中,可以在根据特征方面的系统中实施不同类型特征或功能,系统包括客户端装置(诸如运行了客户端软件的平板装置或智能电话)和服务器系统(诸如以下更详述的服务器系统)。Although the system shown in FIG. 16 illustrates one particular architecture of computing device 10 for implementing one or more of the features described herein, it is by no means the only one on which the features and techniques described herein may be implemented. at least a portion of the device architecture. For example, an architecture with one or any number of processors 13 may be used, and the processors 13 may be present in a single device, or distributed among any number of devices. In one feature aspect, a single processor 13 handles communications as well as routine computations, while in other feature aspects separate dedicated communications processors may be provided. In various feature aspects, different types of features or functions may be implemented in systems according to the feature aspects, including client devices (such as tablet devices or smartphones running client software) and server systems (such as described in more detail below) server system).

不论网络装置配置,特征方面的系统可以利用一个或多个存储器或存储器模块(诸如例如远程存储器区块16和本地存储器11),其配置用于存储数据、用于通用网络操作的编程指令、或关于在此所述特征方面的功能的其他信息(或以上的任意自合)。编程指令可以控制操作系统和/或一个或多个应用的执行或者包括其。存储器16或者存储器11、16可以配置以存储数据结构、配置数据、加密数据、历史系统操作信息、或在此所述任何其他特殊或普通的非程序信息。Regardless of network device configuration, the systems of the feature aspects may utilize one or more memories or memory modules (such as, for example, remote memory banks 16 and local memory 11 ) configured to store data, programming instructions for general network operations, or Additional information (or any combination of the above) regarding the functionality of the features described herein. Programming instructions may control or include the execution of an operating system and/or one or more applications. Memory 16 or memories 11, 16 may be configured to store data structures, configuration data, encrypted data, historical system operating information, or any other special or general non-program information described herein.

因为可以利用该信息和编程指令以实施在此所述一个或多个系统或犯法,至少一些网络装置特征方面可以包括非临时机器可读存储媒介,其例如可以配置或设计用以存储用于执行在此所述各个操作的编程指令、状态信息等等。该非临时机器可读存储媒介的示例包括但不限于,磁性媒介诸如硬盘、软件和磁带;光学媒介诸如CD-ROM盘;磁-光媒介诸如光盘,以及特殊配置用以存储并执行编程指令的硬件装置,诸如只读存储器(ROM)、闪存(在移动装置和集成系统中普通)、固态驱动(SSD)以及可以在单个硬件装置(如相对于个人计算机而在本领域变得越来越普通)、忆阻器存储器、随机访问存储器(ROM)等等中组合固态状态和硬盘驱动的任何逻辑部件。应该知晓,该存储机制可以是集成且不可移除的(诸如可以焊接至母板上或另外集成至电子装置中的RAM硬件模块),或者它们可以是可移除的诸如可插拔闪存模块(诸如“拇指驱动”或设计用于快速交换物理存储装置的其他可移除媒介)、“可热插拔”硬盘驱动或固态驱动、可移除光学存储盘、或其他这种可移除媒介,并且可以可互换地利用这些集成和可移除存储媒介。编程指令的示例包括对象代码,诸如可以由编译器、机器代码产生,诸如可以由汇编器或链接器、字节代码产生,诸如可以由例如JAVATM编译器产生,且可以使用Java虚拟机或等价形式执行,或者包含了可以由计算机使用解释器而执行的更先进代码的文件(例如以Python,Perl,Ruby,Groovy或任何其他脚本语言编写的脚本)。Because this information and programming instructions may be utilized to implement one or more of the systems or offenses described herein, at least some aspects of the network device may include a non-transitory machine-readable storage medium, which, for example, may be configured or designed to store storage for execution Programming instructions, status information, etc. for the various operations described herein. Examples of such non-transitory machine-readable storage media include, but are not limited to, magnetic media such as hard disks, software, and magnetic tapes; optical media such as CD-ROM disks; magneto-optical media such as optical disks, and devices specially configured to store and execute programming instructions. Hardware devices, such as read only memory (ROM), flash memory (common in mobile devices and integrated systems), solid state drives (SSD), and may be increasingly common in the art in a single hardware device (as with respect to personal computers) ), memristor memory, random access memory (ROM), and the like, any logic component that combines a solid state state and a hard drive. It should be appreciated that the storage mechanisms may be integrated and non-removable (such as RAM hardware modules that may be soldered to a motherboard or otherwise integrated into the electronic device), or they may be removable such as pluggable flash memory modules ( such as "thumb drives" or other removable media designed to quickly swap physical storage devices), "hot-swappable" hard disk drives or solid-state drives, removable optical storage disks, or other such removable media, And these integrated and removable storage media can be utilized interchangeably. Examples of programming instructions include object code, such as may be generated by a compiler, machine code, such as may be generated by an assembler or linker, byte code, such as may be generated by, for example, a JAVA compiler, and may use a Java virtual machine or the like , or a file containing more advanced code that can be executed by a computer using an interpreter (such as a script written in Python, Perl, Ruby, Groovy, or any other scripting language).

在一些特征方面中,系统可以实施在独立的计算系统上。现在参照图17,示出了方框图,其描绘了在独立计算系统上的一个或多个特征方面或其部件的典型示例性架构。计算装置20包括处理器21,其可以运行执行了特征方面的一个或多个功能或应用诸如例如客户端应用24的软件。处理器21可以在操作系统22的控制之下执行计算指令,操作系统诸如例如MICROSOFT WINDOWSTM操作系统、APPLE macOSTM或iOSTM的操作系统等等的版本,Linux操作系统、ANDROIDTM操作系统的一些变型等等。在许多情形中,一个或多个共用服务23可以在系统20中可操作,且可以帮助用于向客户端应用24提供公共服务。服务23可以例如是WINDOWSTM服务,在Linux环境中的用户空间公共服务,或者操作系统21使用的任何其他类型公共服务架构。输入装置28可以是适用于接收用户输入的任何类型,包括例如键盘、触摸屏、话筒(例如用于语音输入)、鼠标、触摸垫、轨迹球、或其任意组合。输出装置27可以是适用于提供输出至一个或多个用户的任何类型,不论对于系统20是远程或本地,且可以包括例如用于视觉输出的一个或多个屏幕、扬声器、打印机、或其任意组合。存储器25可以是随机访问存储器,其具有本领域已知的任何结构和架构,由处理器21使用例如以运行软件。存储装置26可以是用于以数字形式存储数据的任何磁性、光学、机器、忆阻器、或电存储装置(诸如以上所述的那些,参照图10)。存储装置25的示例包括闪存、磁性硬盘驱动、CD-ROM和/或等等。In some feature aspects, the system may be implemented on a separate computing system. Referring now to FIG. 17, a block diagram depicting a typical exemplary architecture for one or more features, or components thereof, on a stand-alone computing system is shown. Computing device 20 includes a processor 21 that may execute software that performs one or more functions or applications of the feature aspects, such as, for example, client application 24 . The processor 21 may execute computational instructions under the control of an operating system 22, such as versions of, for example, the MICROSOFT WINDOWS (TM) operating system, APPLE macOS (TM) or iOS (TM ), or the like, some of the Linux operating system, the ANDROID (TM) operating system variants, etc. In many cases, one or more common services 23 may be operable in system 20 and may assist in providing common services to client applications 24 . The service 23 may be, for example, a WINDOWS service, a user space common service in a Linux environment, or any other type of common service architecture used by the operating system 21 . Input device 28 may be of any type suitable for receiving user input, including, for example, a keyboard, touch screen, microphone (eg, for voice input), mouse, touch pad, trackball, or any combination thereof. Output device 27 may be of any type suitable for providing output to one or more users, whether remote or local to system 20, and may include, for example, one or more screens, speakers, printers, or any of these for visual output. combination. Memory 25 may be random access memory of any structure and architecture known in the art, used by processor 21, for example, to run software. Storage device 26 may be any magnetic, optical, machine, memristor, or electrical storage device (such as those described above, with reference to FIG. 10 ) for storing data in digital form. Examples of storage device 25 include flash memory, magnetic hard drives, CD-ROMs, and/or the like.

在一些特征方面中,系统可以实施在分布式计算网络上,诸如可以具有任意数目客户端和/或服务器的一个。现在参照图18,示出了方框图,其描绘了用于在分布式计算网络上实施根据一个特征方面的系统的至少一部分的示例性架构30。根据特征方面,可以提供任意数目客户端33。每个客户端33可以运行用于实施系统的客户端侧部分的软件;客户端可以包括如图17中所示的系统20。此外,可以提供任意数目服务器32用于处理从一个或多个客户端33接收的请求。客户端33和服务器32可以经由一个或多个电子网络31相互通信,电子网络在各个特征方面中可以是互联网、广域网、移动电话网络(诸如CDMA或GSM蜂窝网络)、无线网络(诸如WiFi、WiMAX、LTE等等)或局域网(或实际上本领域已知的任何网络拓扑,特征方面并未在任何其他之上优选任意一个网络拓扑)的任一。In some feature aspects, the system may be implemented on a distributed computing network, such as may have one of any number of clients and/or servers. Referring now to FIG. 18, a block diagram depicting an exemplary architecture 30 for implementing at least a portion of a system in accordance with one feature aspect over a distributed computing network is shown. Depending on the feature aspect, any number of clients 33 may be provided. Each client 33 may run software for implementing the client-side portion of the system; the client may include the system 20 as shown in FIG. 17 . Furthermore, any number of servers 32 may be provided for processing requests received from one or more clients 33 . The client 33 and server 32 may communicate with each other via one or more electronic networks 31, which may be, in various characteristic aspects, the Internet, a wide area network, a mobile telephone network (such as a CDMA or GSM cellular network), a wireless network (such as WiFi, WiMAX , LTE, etc.) or a local area network (or indeed any network topology known in the art, no one network topology is preferred over any other in terms of characteristics).

此外,在一些特征方面中,当需要获得额外信息或涉及关于特定调用的额外数据时,服务器32可以调用外部服务37。与外部服务37通信可以例如经由一个或多个网络31而发生。在各个特征方面中,外部服务37可以包括与硬件装置相关或安装在其上的网络使能的服务或功能。例如,在其中客户端应用24实施在智能电话或其他电子装置上的一个特征方面中,客户端应用24可以获得存储在云中服务器系统32中、或者在部署在特定企业或用户房产的一个或多个上的外部服务37的信息。Furthermore, in some feature aspects, server 32 may invoke external services 37 when additional information is required or additional data related to a particular invocation is required. Communication with external services 37 may occur, for example, via one or more networks 31 . In various feature aspects, external services 37 may include network-enabled services or functions associated with or installed on hardware devices. For example, in one feature aspect where client application 24 is implemented on a smartphone or other electronic device, client application 24 may be stored in server system 32 in the cloud, or deployed at one or more locations on a particular enterprise or user property. More information on external services 37.

在一些特征方面中,客户端33或服务器32(或两者)可以利用可以本地地或跨一个或多个网络31远程地部署的一个或多个专用服务或应用。例如,一个或多个数据库34可以由一个或多个特征方面使用或涉及。本领域技术人员应该理解,数据库34可以以广泛各种架构设置且使用广泛各种数据访问和操纵机制。例如,在各个特征方面中,一个或多个数据库34可以包括使用结构化查询语言(SQL)的相关数据库系统,而其他的可以包括备选的数据存储技术诸如现有技术中称作“NoSQL”的那些(例如HADOOP CASSANDRATM,GOOGLEBIGTABLETM等等)。在一些特征方面中,可以根据特征方面使用变形数据库架构诸如面向列的数据库、存储器内数据库、群集数据库、分布式数据库、或甚至平面文件数据储存库。本领域技术人员应该知晓,如合适的话可以使用已知或未来数据库技术的任意组合,除非特殊数据库技术或特殊部件排列专用于在此所述的特定特征方面。此外,应该知晓,术语“数据库”如在此所使用可以涉及物理数据库机器,用作单个数据库系统的机器群集,或者总数据库管理系统内的逻辑数据库。除非对于术语“数据库”的给定用途规定特殊含义,其应该解释为意味着这些词含义的任意,所有这些理解由本领域技术人员理解为术语“数据库”的普通含义。In some feature aspects, client 33 or server 32 (or both) may utilize one or more dedicated services or applications that may be deployed locally or remotely across one or more networks 31 . For example, one or more databases 34 may be used or referenced by one or more feature aspects. Those skilled in the art will appreciate that the database 34 may be arranged in a wide variety of architectures and using a wide variety of data access and manipulation mechanisms. For example, in various feature aspects, one or more of the databases 34 may include relational database systems using Structured Query Language (SQL), while others may include alternative data storage technologies such as those referred to in the art as "NoSQL" (eg HADOOP CASSANDRA TM , GOOGLEBIGTABLE TM , etc.). In some feature aspects, variant database architectures such as column-oriented databases, in-memory databases, clustered databases, distributed databases, or even flat file data repositories may be used according to the feature aspects. Those skilled in the art will appreciate that any combination of known or future database technologies may be used as appropriate, unless a particular database technology or particular arrangement of components is dedicated to the particular features described herein. Furthermore, it should be understood that the term "database" as used herein may refer to a physical database machine, a cluster of machines functioning as a single database system, or a logical database within an overall database management system. Unless a specific meaning is specified for a given use of the term "database", it should be construed to mean any of the meanings of these words, all such understandings being understood by those skilled in the art to be the ordinary meaning of the term "database".

类似地,一些特征方面可以利用一个或多个安全系统36和配置系统35。安全和配置管理是普通信息技术(IT)和网络功能,且每个的一些量通常与任意IT或网络系统相关联。本领域技术人员应该理解,现在或未来本领域已知的任何配置或安全子系统可以不受限制的与特征方面结合使用,除非由任何特殊特征方面的描述而特殊地要求特殊安全36或配置系统35或方案。Similarly, some feature aspects may utilize one or more of the security system 36 and the configuration system 35 . Security and configuration management are general information technology (IT) and network functions, and some quantity of each is typically associated with any IT or network system. It should be understood by those skilled in the art that any configuration or security subsystem known in the art, now or in the future, may be used in conjunction with feature aspects without limitation unless a particular security 36 or configuration system is specifically required by the description of any particular feature aspect 35 or scheme.

图19示出了如可以用于遍布系统各个位置任一的计算机系统40的示例性概图。这是可以执行代码以处理数据的任意计算机的示例。可以对计算机系统40做出各种修改和改变而并未脱离在此所公开系统和方法的更广阔范围。中央处理器单元(CPU)41连接至总线42,总线也连接至存储器43、非易失性存储器44、显示器47、输入/输出(I/O)单元48、以及网络接口卡(NIC)53。I/O单元48可以通常连接至键盘49、指针装置50、硬盘52、以及实时时钟51。NIC 53连接至网络54,其可以是互联网或局域网络,局域网可以具有或不具有至互联网的连接。也示出作为系统40一部分的电源单元45在该示例中连接至主交流(AC)电源46。未示出可以存在的电池,以及广泛已知但是不可用于在此所公开的当前系统和方法的特殊创新功能的许多其他装置和修改。应该知晓,可以组合所示的一些或所有部件,诸如在各个集成应用中,例如Qualcomm或Samsung芯片上系统(SOC)装置,或只要其可以适用于组合多个性能或功能至单个硬件装置中(例如在移动装置诸如智能电话、视频游戏控制台、车载计算机系统诸如汽车中导航或多媒体系统、或其他集成硬件装置中)。FIG. 19 shows an exemplary overview of a computer system 40 as may be used in any of various locations throughout the system. This is an example of any computer that can execute code to process data. Various modifications and changes may be made to computer system 40 without departing from the broader scope of the systems and methods disclosed herein. Central processing unit (CPU) 41 is connected to bus 42 , which is also connected to memory 43 , non-volatile memory 44 , display 47 , input/output (I/O) unit 48 , and network interface card (NIC) 53 . I/O unit 48 may generally be connected to keyboard 49 , pointing device 50 , hard disk 52 , and real-time clock 51 . The NIC 53 is connected to a network 54, which may be the Internet or a local area network, which may or may not have a connection to the Internet. Power supply unit 45, also shown as part of system 40, is connected to mains alternating current (AC) power source 46 in this example. Batteries that may be present are not shown, as well as many other devices and modifications that are widely known but not available for the particular innovative functions of the current systems and methods disclosed herein. It should be appreciated that some or all of the components shown may be combined, such as in various integrated applications, such as Qualcomm or Samsung system-on-chip (SOC) devices, or as long as it may be suitable to combine multiple capabilities or functions into a single hardware device ( For example in mobile devices such as smartphones, video game consoles, in-vehicle computer systems such as in-car navigation or multimedia systems, or other integrated hardware devices).

在各个特征方面中,用于实施各个特征方面的系统或方法的功能可以在任意数目的客户端和/或服务器部件之中分布。例如,可以实施各种软件模块用于与任何特定特征方面的系统结合执行各种功能,且该模块可以各种不同地实施以运行在服务器和/或客户端部件上。In the various feature aspects, the functionality of the system or method for implementing the various feature aspects may be distributed among any number of client and/or server components. For example, various software modules may be implemented to perform various functions in conjunction with the system of any particular feature, and such modules may be implemented in various ways to run on server and/or client components.

本领域技术人员将知晓上述各个特征方面的可能修改范围。因此,本发明由权利要求及其等价形式而限定。Those skilled in the art will recognize the range of possible modifications in the various features described above. Accordingly, the invention is defined by the claims and their equivalents.

Claims (7)

1.一种用于减缓网络攻击的先进网络决策平台,所述平台包括:1. An advanced network decision-making platform for mitigating network attacks, the platform comprising: 时序数据存储,包括至少处理器、存储器、以及存储在所述存储器中并运行在所述处理器上的多个编程指令,其中当运行在所述处理器上时所述可编程指令使得所述处理器:A sequential data store comprising at least a processor, a memory, and a plurality of programmed instructions stored in the memory and executed on the processor, wherein the programmable instructions when executed on the processor cause the processor: 监控多个网络事件;monitor multiple network events; 产生包括至少网络事件的记录和所述事件发生时间的时序数据;generating time series data including at least a record of a network event and the time at which the event occurred; 观察和状态评估模块,包括至少处理器、存储器、和存储在所述存储器中并运行在所述处理器上的多个编程指令,其中当运行在所述处理器上时所述可编程指令使得所述处理器:An observation and state evaluation module comprising at least a processor, a memory, and a plurality of programmed instructions stored in the memory and executed on the processor, wherein the programmable instructions when executed on the processor cause The processor: 监控网络上多个相连的资源;Monitor multiple connected resources on the network; 产生表示了所述多个相连资源的至少一部分的网络-物理图,所述网络-物理图包括至少在所述网络上多个相连资源的一部分之间的逻辑关系,以及在包括至少硬件装置的任何相连资源之间的物理关系;generating a network-physical graph representing at least a portion of the plurality of connected resources, the network-physical graph including logical relationships between at least a portion of the plurality of connected resources on the network, and the physical relationship between any connected resources; 定向计算图模块,包括至少处理器、存储器、和存储在所述存储器中并运行在所述处理器上的多个编程指令,其中当运行在所述处理器上时所述可编程指令使得所述处理器:A directed computational graph module comprising at least a processor, a memory, and a plurality of programmed instructions stored in the memory and executed on the processor, wherein the programmable instructions when executed on the processor cause all Describe the processor: 对所述时序数据的至少一部分执行多个分析和变换操作;performing a plurality of analysis and transformation operations on at least a portion of the time series data; 对所述网络-物理图的至少一部分执行多个分析和变换操作;以及performing a plurality of analysis and transformation operations on at least a portion of the network-physical graph; and 动作结果模拟模块,包括至少处理器、存储器、和存储在所述存储器中并运行在所述处理器上的多个编程指令,其中当运行在所述处理器上时所述可编程指令使得所述处理器:An action result simulation module comprising at least a processor, a memory, and a plurality of programmed instructions stored in the memory and executed on the processor, wherein the programmable instructions when executed on the processor cause all Describe the processor: 产生包括至少模拟网络攻击的模拟网络事件;Generate simulated cyber events that include at least simulated cyber attacks; 至少部分地基于由所述定向计算图模块所执行分析的结果而产生多个安全推荐。A plurality of security recommendations are generated based at least in part on the results of the analysis performed by the directed computational graph module. 2.根据权利要求1所述的系统,其中,所述对网络-物理图的至少一部分执行多个分析和变换操作包括对于所述图中资源的一部分的每一个计算影响评估得分。2. The system of claim 1, wherein the performing a plurality of analysis and transformation operations on at least a portion of a network-physical graph includes computing an impact assessment score for each of a portion of resources in the graph. 3.根据权利要求2所述的系统,其中,所述对时序数据的至少一部分执行多个分析和变换操作包括计算网络攻击的总影响,其中所述计算至少部分地基于对于由所述网络攻击影响的每个资源的影响评估得分。3. The system of claim 2, wherein the performing a plurality of analysis and transformation operations on at least a portion of the time series data comprises calculating a total impact of a cyberattack, wherein the calculating is based at least in part on the impact of the cyberattack by the cyberattack. Impact assessment score for each resource impacted. 4.根据权利要求1所述的系统,其中,所述对网络-物理图的至少一部分执行多个分析和变换操作包括针对已知的安全脆弱点比较资源之间的关系。4. The system of claim 1, wherein the performing a plurality of analysis and transformation operations on at least a portion of the network-physical graph includes comparing relationships between resources for known security vulnerabilities. 5.根据权利要求4所述的系统,其中,由动作结果模拟模块产生的推荐至少部分地基于针对已知安全脆弱点的比较的结果。5. The system of claim 4, wherein the recommendation generated by the action outcome simulation module is based at least in part on the results of the comparison against known security vulnerabilities. 6.根据权利要求1所述的系统,其中,进一步配置所述观察和状态评估模块以至少部分地基于所述时序数据的至少一部分而产生可视化,其中所述可视化说明了所述数据随时间的变化。6. The system of claim 1, wherein the observation and state assessment module is further configured to generate a visualization based at least in part on at least a portion of the time series data, wherein the visualization illustrates the evolution of the data over time. Variety. 7.一种用于利用先进网络决策平台减缓网络攻击的方法,包括步骤:7. A method for mitigating a cyber attack using an advanced cyber decision platform, comprising the steps of: a)使用观察和状态评估模块产生表示多个相连资源的至少一部分的网络-物理图,所述网络-物理图包括至少在所述网络上多个相连资源的一部分之间的逻辑关系,以及在包括至少硬件装置的任何相连资源之间的物理关系;a) generating a network-physical map representing at least a portion of a plurality of connected resources using the observation and state evaluation module, the network-physical map including logical relationships between at least a portion of the plurality of connected resources on the network, and the physical relationship between any connected resources including at least hardware devices; b)使用定向计算图模块对所述网络-物理图的至少一部分执行多个分析和变换操作;b) performing a plurality of analysis and transformation operations on at least a portion of the cyber-physical graph using a directed computational graph module; c)使用动作结果模拟模块产生包括至少模拟网络攻击的模拟网络事件;c) use the action result simulation module to generate simulated network events including at least simulated network attacks; d)使用时序数据存储监控包括至少所述模拟网络攻击的多个网络事件;d) monitoring a plurality of network events including at least the simulated network attack using time series data storage; e)至少部分地基于所述网络事件产生时序数据;e) generating timing data based at least in part on the network event; f)对所述时序数据的至少一部分执行多个分析和变换操作;以及f) performing a plurality of analysis and transformation operations on at least a portion of the time series data; and g)至少部分地基于由所述定向计算图模块所执行分析的结果而产生多个安全推荐。g) generating a plurality of safety recommendations based at least in part on the results of the analysis performed by the directed computational graph module.
CN201880059195.3A 2017-07-20 2018-07-20 Advanced cybersecurity threat mitigation using behavioral and deep analytics Withdrawn CN111316272A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US15/655,113 US10735456B2 (en) 2015-10-28 2017-07-20 Advanced cybersecurity threat mitigation using behavioral and deep analytics
US15/655,113 2017-07-20
PCT/US2018/043191 WO2019018829A1 (en) 2017-07-20 2018-07-20 Advanced cybersecurity threat mitigation using behavioral and deep analytics

Publications (1)

Publication Number Publication Date
CN111316272A true CN111316272A (en) 2020-06-19

Family

ID=65015309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880059195.3A Withdrawn CN111316272A (en) 2017-07-20 2018-07-20 Advanced cybersecurity threat mitigation using behavioral and deep analytics

Country Status (3)

Country Link
EP (1) EP3655878A4 (en)
CN (1) CN111316272A (en)
WO (1) WO2019018829A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114143052A (en) * 2021-11-19 2022-03-04 北京灰度科技有限公司 Network defense system risk assessment method based on controllable intrusion simulation
US11444961B2 (en) * 2019-12-20 2022-09-13 Intel Corporation Active attack detection in autonomous vehicle networks
CN115277404A (en) * 2022-05-13 2022-11-01 清华大学 Cloud network large-scale change, release and arrangement method, device, equipment and storage medium

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12500920B2 (en) 2015-10-28 2025-12-16 Qomplx Llc Computer-implemented system and method for cybersecurity threat analysis using federated machine learning and hierarchical task networks
CN108011893A (en) * 2017-12-26 2018-05-08 广东电网有限责任公司信息中心 A kind of asset management system based on networked asset information gathering
US12041065B2 (en) * 2019-10-15 2024-07-16 Fortinet, Inc. Resolving the disparate impact of security exploits to resources within a resource group
CN115118422B (en) * 2022-03-10 2025-06-17 西安邮电大学 A group intelligence collaborative sharing and anti-leakage system and method for undisclosed vulnerabilities
CN114860585B (en) * 2022-04-22 2024-11-19 中国人民解放军国防科技大学 A network protocol software analysis method based on multi-layer semantic recovery
WO2025019721A1 (en) * 2023-07-19 2025-01-23 Qomplx Llc A system and method for cyber exploitation path analysis and task plan optimization
CN120430879B (en) * 2025-07-08 2025-09-12 南京财经大学 A comprehensive financial audit system based on big data

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015149062A1 (en) * 2014-03-28 2015-10-01 Zitovault, Inc. System and method for predicting impending cyber security events using multi channel behavioral analysis in a distributed computing environment
US10248910B2 (en) * 2015-10-28 2019-04-02 Fractal Industries, Inc. Detection mitigation and remediation of cyberattacks employing an advanced cyber-decision platform
US10735456B2 (en) * 2015-10-28 2020-08-04 Qomplx, Inc. Advanced cybersecurity threat mitigation using behavioral and deep analytics
DE102015119597B4 (en) * 2015-11-13 2022-07-14 Kriwan Industrie-Elektronik Gmbh cyber-physical system
US10367829B2 (en) * 2015-11-19 2019-07-30 Anomali Incorporated Protecting threat indicators from third party abuse

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11444961B2 (en) * 2019-12-20 2022-09-13 Intel Corporation Active attack detection in autonomous vehicle networks
CN114143052A (en) * 2021-11-19 2022-03-04 北京灰度科技有限公司 Network defense system risk assessment method based on controllable intrusion simulation
CN114143052B (en) * 2021-11-19 2023-04-28 北京灰度科技有限公司 Network defense system risk assessment method, device and storage medium based on controllable intrusion simulation
CN115277404A (en) * 2022-05-13 2022-11-01 清华大学 Cloud network large-scale change, release and arrangement method, device, equipment and storage medium

Also Published As

Publication number Publication date
EP3655878A4 (en) 2021-04-07
WO2019018829A1 (en) 2019-01-24
EP3655878A1 (en) 2020-05-27

Similar Documents

Publication Publication Date Title
US12267347B2 (en) System and method for comprehensive data loss prevention and compliance management
US11323471B2 (en) Advanced cybersecurity threat mitigation using cyberphysical graphs with state changes
US11757920B2 (en) User and entity behavioral analysis with network topology enhancements
US12225042B2 (en) System and method for user and entity behavioral analysis using network topology information
US11968227B2 (en) Detecting KERBEROS ticket attacks within a domain
US20220263860A1 (en) Advanced cybersecurity threat hunting using behavioral and deep analytics
US20220377093A1 (en) System and method for data compliance and prevention with threat detection and response
US12506754B2 (en) System and methods for cybersecurity analysis using UEBA and network topology data and trigger-based network remediation
US11570209B2 (en) Detecting and mitigating attacks using forged authentication objects within a domain
US10432660B2 (en) Advanced cybersecurity threat mitigation for inter-bank financial transactions
US10594714B2 (en) User and entity behavioral analysis using an advanced cyber decision platform
US10609079B2 (en) Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
CN111316272A (en) Advanced cybersecurity threat mitigation using behavioral and deep analytics
WO2020102601A1 (en) Comprehensive data loss prevention and compliance management
CN111492360A (en) Detecting and mitigating counterfeit authentication object attacks using advanced network decision platforms
CN111316268A (en) Advanced cyber-security threat mitigation for interbank financial transactions
WO2019051131A1 (en)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200619