NIPPON TELEGRAPH AND TELEPHONE CORPORATION (20240248986). DETERMINATION METHOD, DETERMINATION DEVICE, AND DETERMINATION PROGRAM simplified abstract

From WikiPatents
Jump to navigation Jump to search

DETERMINATION METHOD, DETERMINATION DEVICE, AND DETERMINATION PROGRAM

Organization Name

NIPPON TELEGRAPH AND TELEPHONE CORPORATION

Inventor(s)

Daiki Chiba of Musashino-shi, Tokyo (JP)

Mitsuaki Akiyama of Musashino-shi, Tokyo (JP)

DETERMINATION METHOD, DETERMINATION DEVICE, AND DETERMINATION PROGRAM - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240248986 titled 'DETERMINATION METHOD, DETERMINATION DEVICE, AND DETERMINATION PROGRAM

The determination method described in the patent application involves extracting feature information from an indicator of compromise (IOC) in cyber security data, assigning labels to each IOC based on the workload needed to address an alert, and creating a model to predict labels from feature information using learning data.

  • Feature information is extracted from IOCs in cyber security data.
  • Labels are assigned to IOCs based on the workload required to handle relevant alerts.
  • A model is developed to predict labels from feature information using learning data.
  • The method aims to improve the efficiency and accuracy of dealing with cyber security threats.
  • By automating the labeling process, the method can streamline threat response efforts.

Potential Applications: - Enhancing threat detection and response in cybersecurity systems. - Improving the accuracy and efficiency of identifying and addressing security threats. - Streamlining the workflow of cybersecurity analysts by automating certain tasks.

Problems Solved: - Streamlining the process of labeling IOCs in cyber security data. - Improving the accuracy of threat detection and response. - Enhancing the efficiency of cybersecurity operations.

Benefits: - Increased efficiency in handling cyber security threats. - Improved accuracy in labeling and addressing security alerts. - Automation of certain tasks to free up analysts for more complex work.

Commercial Applications: Title: Automated Threat Labeling System for Cyber Security Operations This technology can be used in: - Cybersecurity companies offering threat detection and response services. - Organizations looking to enhance their cybersecurity operations. - Government agencies focused on national security and cyber defense.

Questions about the technology: 1. How does this method improve the efficiency of cyber security operations? 2. What are the potential implications of automating threat labeling in cybersecurity systems?


Original Abstract Submitted

a determination method executed by a determination apparatus includes extracting feature information from an indicator of compromise (ioc) included in information related to cyber security, imparting a label to each of iocs according to an actual result of a workload required for dealing with a relevant alert, and learning a model for outputting a label from feature information of an ioc by using learning data obtained by combining the feature information extracted with the label imparted.