NO20081588L - Ekspertsystemanalys og grafisk fremvisning av privilegiumforfremmelsesveier i datamaskinomgivelser - Google Patents
Ekspertsystemanalys og grafisk fremvisning av privilegiumforfremmelsesveier i datamaskinomgivelserInfo
- Publication number
- NO20081588L NO20081588L NO20081588A NO20081588A NO20081588L NO 20081588 L NO20081588 L NO 20081588L NO 20081588 A NO20081588 A NO 20081588A NO 20081588 A NO20081588 A NO 20081588A NO 20081588 L NO20081588 L NO 20081588L
- Authority
- NO
- Norway
- Prior art keywords
- data
- accounts
- privilege
- displayed
- expert system
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
En datainnsamlingsapplikasjon kjøres på et målsystem. Forskjellige data som angir privilegiumforfremmelsesveier blir samlet inn, omfattende brukerkontodata, filtilgangsdata og systemregisterdata. De innsamlede dataene blir analysert i henhold til heuristikker. Systemkontoer blir vist på en graf som noder. Oppdagede privilegiumforfremmelser mellom kontoene blir vist som koblingsforbindelser mellom de respektive kontoene. En bruker kan tilpasse den viste grafen individuelt for å rette søkelyset på bestemte målkontoer og kategorier av privilegiumforfremmelser.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/244,023 US8196178B2 (en) | 2005-10-05 | 2005-10-05 | Expert system analysis and graphical display of privilege elevation pathways in a computing environment |
| PCT/US2006/038456 WO2007044299A1 (en) | 2005-10-05 | 2006-10-03 | Expert system analysis and graphical display of privilege elevation pathways in a computing environment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| NO20081588L true NO20081588L (no) | 2008-05-05 |
Family
ID=37903403
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| NO20081588A NO20081588L (no) | 2005-10-05 | 2008-04-01 | Ekspertsystemanalys og grafisk fremvisning av privilegiumforfremmelsesveier i datamaskinomgivelser |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US8196178B2 (no) |
| KR (1) | KR20080051161A (no) |
| CN (1) | CN101283347A (no) |
| AU (1) | AU2006302565B2 (no) |
| IL (1) | IL190258A0 (no) |
| NO (1) | NO20081588L (no) |
| RU (1) | RU2421792C2 (no) |
| WO (1) | WO2007044299A1 (no) |
Families Citing this family (40)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1810143A4 (en) * | 2004-09-22 | 2011-03-16 | Xyratex Tech Ltd | SYSTEM AND METHOD FOR MONITORING NETWORK PERFORMANCE AND PREDICTIVE MALFUNCTION ANALYSIS |
| US8631477B2 (en) * | 2009-07-23 | 2014-01-14 | International Business Machines Corporation | Lifecycle management of privilege sharing using an identity management system |
| US8756509B2 (en) * | 2011-07-27 | 2014-06-17 | International Business Machines Corporation | Visually representing and managing access control of resources |
| CN103309962A (zh) * | 2013-05-31 | 2013-09-18 | 华东师范大学 | 一种基于内容相关度和社交影响力的微博服务专家定位方法 |
| US9648036B2 (en) | 2014-12-29 | 2017-05-09 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
| US9467455B2 (en) * | 2014-12-29 | 2016-10-11 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
| US9591489B2 (en) | 2015-07-09 | 2017-03-07 | International Business Machines Corporation | Controlling application access to applications and resources via graphical representation and manipulation |
| US10043018B2 (en) | 2015-11-17 | 2018-08-07 | Microsoft Technology Licensing, Llc | Access privilege analysis for a securable asset |
| US10346625B2 (en) | 2016-10-31 | 2019-07-09 | International Business Machines Corporation | Automated mechanism to analyze elevated authority usage and capability |
| US9928365B1 (en) | 2016-10-31 | 2018-03-27 | International Business Machines Corporation | Automated mechanism to obtain detailed forensic analysis of file access |
| US10824725B2 (en) | 2017-03-21 | 2020-11-03 | Mcafee, Llc | Automatic detection of software that performs unauthorized privilege escalation |
| US10650156B2 (en) | 2017-04-26 | 2020-05-12 | International Business Machines Corporation | Environmental security controls to prevent unauthorized access to files, programs, and objects |
| CN110688405A (zh) * | 2019-08-23 | 2020-01-14 | 上海科技发展有限公司 | 基于人工智能的专家推荐方法、装置、终端、及介质 |
| US11379577B2 (en) | 2019-09-26 | 2022-07-05 | Microsoft Technology Licensing, Llc | Uniform resource locator security analysis using malice patterns |
| US11509667B2 (en) | 2019-10-19 | 2022-11-22 | Microsoft Technology Licensing, Llc | Predictive internet resource reputation assessment |
| US11431751B2 (en) | 2020-03-31 | 2022-08-30 | Microsoft Technology Licensing, Llc | Live forensic browsing of URLs |
| US11983272B2 (en) | 2021-07-14 | 2024-05-14 | Saudi Arabian Oil Company | Method and system for detecting and preventing application privilege escalation attacks |
| US12278840B1 (en) | 2021-07-16 | 2025-04-15 | Wiz, Inc. | Efficient representation of multiple cloud computing environments through unified identity mapping |
| US20240137382A1 (en) | 2021-07-16 | 2024-04-25 | Wiz, Inc. | Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping |
| US12505200B2 (en) | 2022-05-23 | 2025-12-23 | Wiz, Inc. | Techniques for improved virtual instance inspection utilizing disk cloning |
| US12278819B1 (en) | 2021-07-16 | 2025-04-15 | Wiz, Inc. | Cybersecurity threat detection utilizing unified identity mapping and permission detection |
| WO2023094931A1 (en) | 2021-11-24 | 2023-06-01 | Wiz, Inc. | Detecting vulnerabilities in configuration code of a cloud environment utilizing infrastructure as code |
| US12489781B2 (en) | 2021-11-24 | 2025-12-02 | Wiz, Inc. | Techniques for lateral movement detection in a cloud computing environment |
| US11936785B1 (en) | 2021-12-27 | 2024-03-19 | Wiz, Inc. | System and method for encrypted disk inspection utilizing disk cloning techniques |
| US12081656B1 (en) | 2021-12-27 | 2024-09-03 | Wiz, Inc. | Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity |
| US12219048B1 (en) | 2021-12-27 | 2025-02-04 | Wiz, Inc. | Techniques for encrypted disk cybersecurity inspection utilizing disk cloning |
| US11841945B1 (en) | 2022-01-31 | 2023-12-12 | Wiz, Inc. | System and method for cybersecurity threat detection utilizing static and runtime data |
| US12531881B2 (en) | 2022-01-31 | 2026-01-20 | Wiz, Inc. | Detection of cybersecurity threats utilizing established baselines |
| US12267326B2 (en) | 2022-04-13 | 2025-04-01 | Wiz, Inc. | Techniques for detecting resources without authentication using exposure analysis |
| US11936693B2 (en) | 2022-04-13 | 2024-03-19 | Wiz, Inc. | System and method for applying a policy on a network path |
| US12395488B2 (en) | 2022-04-13 | 2025-08-19 | Wiz, Inc. | Techniques for analyzing external exposure in cloud environments |
| US12244627B2 (en) | 2022-04-13 | 2025-03-04 | Wiz, Inc. | Techniques for active inspection of vulnerability exploitation using exposure |
| US12443720B2 (en) | 2022-08-10 | 2025-10-14 | Wiz, Inc. | Techniques for detecting applications paths utilizing exposure analysis |
| US12287899B2 (en) | 2022-05-23 | 2025-04-29 | Wiz, Inc. | Techniques for detecting sensitive data in cloud computing environments utilizing cloning |
| US12506755B2 (en) | 2022-05-23 | 2025-12-23 | Wiz, Inc. | Technology discovery techniques in cloud computing environments utilizing disk cloning |
| US12079328B1 (en) | 2022-05-23 | 2024-09-03 | Wiz, Inc. | Techniques for inspecting running virtualizations for cybersecurity risks |
| US12212586B2 (en) | 2022-05-23 | 2025-01-28 | Wiz, Inc. | Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources |
| US12217079B2 (en) | 2022-05-23 | 2025-02-04 | Wiz, Inc. | Detecting security exceptions across multiple compute environments |
| US12061925B1 (en) | 2022-05-26 | 2024-08-13 | Wiz, Inc. | Techniques for inspecting managed workloads deployed in a cloud computing environment |
| US20240020407A1 (en) * | 2022-07-13 | 2024-01-18 | Veza Technologies, Inc. | Node and edge deduplication for a privilege graph |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5278901A (en) | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method |
| US6647400B1 (en) | 1999-08-30 | 2003-11-11 | Symantec Corporation | System and method for analyzing filesystems to detect intrusions |
| US7117273B1 (en) | 2000-01-25 | 2006-10-03 | Cisco Technology, Inc. | Methods and apparatus for maintaining a map of node relationships for a network |
| US7007301B2 (en) | 2000-06-12 | 2006-02-28 | Hewlett-Packard Development Company, L.P. | Computer architecture for an intrusion detection system |
| US6718386B1 (en) | 2000-07-18 | 2004-04-06 | Mark Joseph Hanfland | Methods, system, and article for displaying privilege state data |
| FR2816730B1 (fr) | 2000-11-13 | 2004-10-15 | Commissariat Energie Atomique | Procede de securisation rendant deterministe l'execution en temps reel d'applications multitaches du type controle- commande avec confinement d'erreur |
| US7080406B2 (en) | 2000-12-15 | 2006-07-18 | International Business Machines Corporation | Method for transferring privilege access to a resource manager with subsequent loss of privilege by the initiating identity |
| US7013395B1 (en) * | 2001-03-13 | 2006-03-14 | Sandra Corporation | Method and tool for network vulnerability analysis |
| US20020174087A1 (en) * | 2001-05-02 | 2002-11-21 | Hao Ming C. | Method and system for web-based visualization of directed association and frequent item sets in large volumes of transaction data |
| US7243374B2 (en) | 2001-08-08 | 2007-07-10 | Microsoft Corporation | Rapid application security threat analysis |
| US6952779B1 (en) * | 2002-10-01 | 2005-10-04 | Gideon Cohen | System and method for risk detection and analysis in a computer network |
| CN1809812A (zh) | 2003-04-18 | 2006-07-26 | 盎司实验室股份有限公司 | 用于源代码检测源代码中弱点的方法和装置 |
| US7580986B2 (en) * | 2004-05-17 | 2009-08-25 | Pixar | Dependency graph-based aggregate asset status reporting methods and apparatus |
| US7555778B2 (en) * | 2004-10-19 | 2009-06-30 | George Mason Intellectual Properties, Inc. | Minimum-cost network hardening |
| US20070061125A1 (en) | 2005-08-12 | 2007-03-15 | Bhatt Sandeep N | Enterprise environment analysis |
| US20070079372A1 (en) | 2005-10-05 | 2007-04-05 | Microsoft Corporation | Method for collecting and reporting privilege elevation pathways in a computing environment |
| US8020194B2 (en) | 2005-10-06 | 2011-09-13 | Microsoft Corporation | Analyzing cross-machine privilege elevation pathways in a networked computing environment |
-
2005
- 2005-10-05 US US11/244,023 patent/US8196178B2/en not_active Expired - Fee Related
-
2006
- 2006-10-03 RU RU2008113194/08A patent/RU2421792C2/ru not_active IP Right Cessation
- 2006-10-03 AU AU2006302565A patent/AU2006302565B2/en not_active Ceased
- 2006-10-03 KR KR1020087008248A patent/KR20080051161A/ko not_active Ceased
- 2006-10-03 CN CNA2006800373509A patent/CN101283347A/zh active Pending
- 2006-10-03 WO PCT/US2006/038456 patent/WO2007044299A1/en not_active Ceased
-
2008
- 2008-03-18 IL IL190258A patent/IL190258A0/en unknown
- 2008-04-01 NO NO20081588A patent/NO20081588L/no not_active Application Discontinuation
Also Published As
| Publication number | Publication date |
|---|---|
| IL190258A0 (en) | 2008-11-03 |
| AU2006302565A1 (en) | 2007-04-19 |
| US8196178B2 (en) | 2012-06-05 |
| US20070079358A1 (en) | 2007-04-05 |
| AU2006302565B2 (en) | 2011-09-15 |
| RU2008113194A (ru) | 2009-10-10 |
| KR20080051161A (ko) | 2008-06-10 |
| WO2007044299A1 (en) | 2007-04-19 |
| RU2421792C2 (ru) | 2011-06-20 |
| CN101283347A (zh) | 2008-10-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| NO20081588L (no) | Ekspertsystemanalys og grafisk fremvisning av privilegiumforfremmelsesveier i datamaskinomgivelser | |
| Tenenhaus et al. | PLS path modeling | |
| ATE539170T1 (de) | Abschätzung und verringerung des risikos von graft-versus-host-reaktion | |
| PH12017502073A1 (en) | Interrogatory cell-based assays and uses thereof | |
| ATE464007T1 (de) | Analyse eines medizinischen bildes | |
| EA200801928A1 (ru) | Система и способ моделирования полёта | |
| WO2006032001A3 (en) | Methods and system for executing a program in multiple execution environments | |
| WO2007137034A9 (en) | Managing computing resources in graph-based computations | |
| MY149803A (en) | Markup based extensibility for user interfaces | |
| WO2006062958A3 (en) | Image-based computational mechanical analysis and indexing for cardiovascular diseases | |
| BRPI0600007A (pt) | utilização de descrições abstratas para gerar, trocar e configurar tempos de execução de serviços e clientes | |
| WO2009100410A3 (en) | Method and system for analysis of flow cytometry data using support vector machines | |
| EA200601711A1 (ru) | Способ, устройство и запоминающее устройство для хранения программ, выполненные с возможностью автоматической качественной и количественной оценки риска, на основе технической конструкции ствола скважины и свойств породы | |
| WO2007001668A3 (en) | Dynamic user experience with semantic rich objects | |
| WO2007078300A3 (en) | Architecture of ticc-ppde, a new paradigm for parallel programming | |
| ATE429673T1 (de) | Dynamische bios-ausführung und gleichzeitiger update für einen blade-server | |
| WO2007064896A3 (en) | Data exchange system and method | |
| WO2008027563A3 (en) | System and device architecture for single-chip multi-core processor | |
| WO2008096632A1 (ja) | オブジェクト図表示装置、オブジェクト図表示方法、プログラム、及びコンピュータ読み取り可能な記録媒体 | |
| TW200636581A (en) | Methods and apparatus for instruction set emulation | |
| MX2010002229A (es) | Dispositivo de arbol de decision y sitio de red para proporcionar informacion. | |
| SE0500181L (sv) | Medicinskt system | |
| MX2009003659A (es) | Sistema y metodo para analisis y reporte de interaccion dinamica de medicamento. | |
| EA200701826A1 (ru) | Способ и композиция для лечения диабета | |
| Keay | Emergent phenomena of robot competitions: Robot identity construction and naming |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FC2A | Withdrawal, rejection or dismissal of laid open patent application |