Abstract
A method for securing an IT (information technology) system using a set of methods for knowledge extraction, event detection, risk estimation and explanation for ranking cyber-alerts which includes a method to explain the relationship (or an attack pathway) from an entity (user or host) and an event context to another entity (a high-value resource) and an event context (attack or service failure).
Application Number
15/730,028
Inventors
Agarwal,Khushbu
Choudhury,Sutanay
Market Sector
Security