18081641. SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Tomer Rotstein of Haifa (IL)

Eran Shany of Haifa (IL)

SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18081641 titled 'SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS

Simplified Explanation

The method described in the abstract involves receiving metadata with a suspected malicious activity indicator and a device identifier, then matching this identifier to log activity data from a second computing device to identify the source of the suspected malicious activity.

  • Receiving metadata with suspected malicious activity indicator and device identifier
  • Receiving log activity data from a second computing device
  • Matching device identifier in metadata to device identifier in log activity data
  • Transmitting an alert identifying the second computing device as the source of suspected malicious activity

Potential Applications

This technology could be applied in cybersecurity systems to quickly identify and respond to potential threats within a network.

Problems Solved

This technology helps in efficiently detecting and addressing malicious activities within a computing environment, enhancing overall security measures.

Benefits

- Improved threat detection capabilities - Faster response times to security incidents - Enhanced network security and protection of sensitive data

Potential Commercial Applications

Enhancing cybersecurity systems for businesses Improving network security for government agencies

Possible Prior Art

One possible prior art could be the use of network monitoring tools to detect and respond to suspicious activities within a network.

Unanswered Questions

How does this method handle false positives in identifying malicious activity?

The abstract does not provide information on how the system distinguishes between actual malicious activity and false alarms.

What measures are in place to protect the privacy of users' data during the monitoring process?

The abstract does not mention any privacy protection mechanisms implemented in the system.


Original Abstract Submitted

A method may include receiving from a first computing device, metadata that includes a suspected malicious activity indicator and a device identifier associated with the indicator; receiving, from a second computing device, log activity data; matching the device identifier included in the metadata to a device identifier in the log activity data; and based on the matching, transmitting an alert identifying the second computing device as a source of the suspected malicious activity.