Microsoft technology licensing, llc (20240121249). SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS

Organization Name

microsoft technology licensing, llc

Inventor(s)

Tomer Rotstein of Haifa (IL)

Eran Shany of Haifa (IL)

SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240121249 titled 'SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS

Simplified Explanation

The patent application describes a method for identifying suspected malicious activity on a computing device by matching metadata with log activity data.

  • Receiving metadata with suspected malicious activity indicator and device identifier
  • Receiving log activity data from a second computing device
  • Matching device identifiers from metadata and log activity data
  • Transmitting an alert if a match is found, identifying the second computing device as the source of suspected malicious activity

Potential Applications

This technology could be applied in cybersecurity systems to quickly identify and respond to potential threats on computing devices.

Problems Solved

This technology helps in efficiently detecting and addressing malicious activities on computing devices, enhancing overall cybersecurity measures.

Benefits

- Improved security measures - Quick identification of potential threats - Enhanced response to cybersecurity incidents

Potential Commercial Applications

"Enhancing Cybersecurity Measures with Device Identification and Activity Matching Technology"

Possible Prior Art

There may be existing technologies that focus on matching device identifiers with suspicious activity indicators to enhance cybersecurity measures.

Unanswered Questions

=== How does the method ensure the accuracy of matching device identifiers with suspected malicious activity indicators? The patent application does not provide specific details on the algorithms or processes used to ensure the accuracy of matching device identifiers with suspected malicious activity indicators.

=== What measures are in place to protect the privacy of users' data during the matching process? The patent application does not address the privacy concerns related to matching device identifiers and suspected malicious activity indicators.


Original Abstract Submitted

a method may include receiving from a first computing device, metadata that includes a suspected malicious activity indicator and a device identifier associated with the indicator; receiving, from a second computing device, log activity data; matching the device identifier included in the metadata to a device identifier in the log activity data; and based on the matching, transmitting an alert identifying the second computing device as a source of the suspected malicious activity.