18543380. Command and Control Steganographic Communications Detection Engine simplified abstract (Bank of America Corporation)
Contents
- 1 Command and Control Steganographic Communications Detection Engine
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 Command and Control Steganographic Communications Detection Engine - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
Command and Control Steganographic Communications Detection Engine
Organization Name
Inventor(s)
Steven E. Sinks of Scottsdale AZ (US)
Jonathan Sheedy of Poynton (GB)
Command and Control Steganographic Communications Detection Engine - A simplified explanation of the abstract
This abstract first appeared for US patent application 18543380 titled 'Command and Control Steganographic Communications Detection Engine
Simplified Explanation
The network security computing system described in the abstract includes a steganographic communications analysis engine that monitors messages on a secure computing network, identifies patterns of file transfers, quarantines compromised devices, and analyzes files for steganographic information.
- The steganographic communications analysis engine monitors incoming and outgoing messages on a secure computing network.
- It identifies patterns of file transfers between a computing device and a message recipient.
- When a pattern is identified, the engine quarantines the associated computing device from the network.
- The engine analyzes files transferred between the device and recipient for steganographic information.
- If steganographic information is detected, the engine displays an indication that the device has been compromised by malware.
Potential Applications
This technology could be applied in secure communication networks, government agencies, financial institutions, and any organization requiring advanced network security measures.
Problems Solved
This technology helps in detecting and preventing steganographic communication, identifying compromised devices, and protecting sensitive information from being leaked or manipulated.
Benefits
The system enhances network security, prevents data breaches, safeguards confidential information, and maintains the integrity of communication channels.
Potential Commercial Applications
Potential commercial applications include network security software development, cybersecurity consulting services, and integration of steganographic detection technology into existing security systems.
Possible Prior Art
One possible prior art could be the use of traditional network security measures such as firewalls and antivirus software to protect against known threats, but these may not be sufficient to detect steganographic communication.
Unanswered Questions
How does the steganographic communications analysis engine differentiate between legitimate and malicious file transfers?
The abstract does not provide details on the specific methods or algorithms used by the engine to distinguish between normal and suspicious file transfers.
What measures are in place to ensure the accuracy and reliability of the steganographic analysis performed by the engine?
The abstract does not mention any validation or verification processes to confirm the effectiveness of the steganographic detection capabilities of the engine.
Original Abstract Submitted
A network security computing system includes a steganographic communications analysis engine monitoring incoming and outgoing messages on a secure computing network. The steganographic communications analysis engine identifies a pattern of file transfers between a first computing device on the secure computing network and an internal or external message recipient. When a pattern is identified, the steganographic communications analysis engine quarantines an associated computing device from the secure network. The steganographic communications analysis engine analyzes files transferred between the computing device and the recipient for indications of steganographic information and causes display, based on an identified indication of steganography, an indication that the computing device had been compromised by command and control malware.