18543380. Command and Control Steganographic Communications Detection Engine simplified abstract (Bank of America Corporation)

From WikiPatents
Revision as of 04:09, 16 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Command and Control Steganographic Communications Detection Engine

Organization Name

Bank of America Corporation

Inventor(s)

Steven E. Sinks of Scottsdale AZ (US)

Jonathan Sheedy of Poynton (GB)

Command and Control Steganographic Communications Detection Engine - A simplified explanation of the abstract

This abstract first appeared for US patent application 18543380 titled 'Command and Control Steganographic Communications Detection Engine

Simplified Explanation

The network security computing system described in the abstract includes a steganographic communications analysis engine that monitors messages on a secure computing network, identifies patterns of file transfers, quarantines compromised devices, and analyzes files for steganographic information.

  • The steganographic communications analysis engine monitors incoming and outgoing messages on a secure computing network.
  • It identifies patterns of file transfers between a computing device and a message recipient.
  • When a pattern is identified, the engine quarantines the associated computing device from the network.
  • The engine analyzes files transferred between the device and recipient for steganographic information.
  • If steganographic information is detected, the engine displays an indication that the device has been compromised by malware.

Potential Applications

This technology could be applied in secure communication networks, government agencies, financial institutions, and any organization requiring advanced network security measures.

Problems Solved

This technology helps in detecting and preventing steganographic communication, identifying compromised devices, and protecting sensitive information from being leaked or manipulated.

Benefits

The system enhances network security, prevents data breaches, safeguards confidential information, and maintains the integrity of communication channels.

Potential Commercial Applications

Potential commercial applications include network security software development, cybersecurity consulting services, and integration of steganographic detection technology into existing security systems.

Possible Prior Art

One possible prior art could be the use of traditional network security measures such as firewalls and antivirus software to protect against known threats, but these may not be sufficient to detect steganographic communication.

Unanswered Questions

How does the steganographic communications analysis engine differentiate between legitimate and malicious file transfers?

The abstract does not provide details on the specific methods or algorithms used by the engine to distinguish between normal and suspicious file transfers.

What measures are in place to ensure the accuracy and reliability of the steganographic analysis performed by the engine?

The abstract does not mention any validation or verification processes to confirm the effectiveness of the steganographic detection capabilities of the engine.


Original Abstract Submitted

A network security computing system includes a steganographic communications analysis engine monitoring incoming and outgoing messages on a secure computing network. The steganographic communications analysis engine identifies a pattern of file transfers between a first computing device on the secure computing network and an internal or external message recipient. When a pattern is identified, the steganographic communications analysis engine quarantines an associated computing device from the secure network. The steganographic communications analysis engine analyzes files transferred between the computing device and the recipient for indications of steganographic information and causes display, based on an identified indication of steganography, an indication that the computing device had been compromised by command and control malware.