[go: up one dir, main page]

WO2019051131A3 - Advanced cybersecurity threat mitigation for inter-bank financial transactions - Google Patents

Advanced cybersecurity threat mitigation for inter-bank financial transactions Download PDF

Info

Publication number
WO2019051131A3
WO2019051131A3 PCT/US2018/049807 US2018049807W WO2019051131A3 WO 2019051131 A3 WO2019051131 A3 WO 2019051131A3 US 2018049807 W US2018049807 W US 2018049807W WO 2019051131 A3 WO2019051131 A3 WO 2019051131A3
Authority
WO
WIPO (PCT)
Prior art keywords
inter
financial transactions
threat mitigation
network
bank financial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2018/049807
Other languages
French (fr)
Other versions
WO2019051131A2 (en
Inventor
Jason Crabtree
Andrew Sellers
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qomplx Inc
Original Assignee
Fractal Industries Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/696,367 external-priority patent/US10432660B2/en
Application filed by Fractal Industries Inc filed Critical Fractal Industries Inc
Priority to EP18852934.1A priority Critical patent/EP3679506A4/en
Priority to CN201880071889.9A priority patent/CN111316268A/en
Publication of WO2019051131A2 publication Critical patent/WO2019051131A2/en
Publication of WO2019051131A3 publication Critical patent/WO2019051131A3/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Debugging And Monitoring (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A system for mitigation of cyberattacks employing an advanced cyber decision platform comprising a time series data store, a directed computational graph module, an action outcome simulation module, and observation and state estimation module, wherein the state of a network is monitored and used to produce a cyber-physical graph representing network resources, simulated network events are produced and monitored, and the network events and their effects are analyzed to produce security recommendations.
PCT/US2018/049807 2017-09-06 2018-09-06 Advanced cybersecurity threat mitigation for inter-bank financial transactions Ceased WO2019051131A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP18852934.1A EP3679506A4 (en) 2017-09-06 2018-09-06 Advanced cybersecurity threat mitigation for inter-bank financial transactions
CN201880071889.9A CN111316268A (en) 2017-09-06 2018-09-06 Advanced cyber-security threat mitigation for interbank financial transactions

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/696,367 2017-09-06
US15/696,367 US10432660B2 (en) 2015-10-28 2017-09-06 Advanced cybersecurity threat mitigation for inter-bank financial transactions

Publications (2)

Publication Number Publication Date
WO2019051131A2 WO2019051131A2 (en) 2019-03-14
WO2019051131A3 true WO2019051131A3 (en) 2019-04-04

Family

ID=65635202

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/049807 Ceased WO2019051131A2 (en) 2017-09-06 2018-09-06 Advanced cybersecurity threat mitigation for inter-bank financial transactions

Country Status (3)

Country Link
EP (1) EP3679506A4 (en)
CN (1) CN111316268A (en)
WO (1) WO2019051131A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111741004B (en) * 2020-06-24 2022-05-27 中国银行股份有限公司 Network security situation awareness method and related device
CN112149124B (en) * 2020-11-02 2022-04-29 电子科技大学 A method and system for Android malware detection based on heterogeneous information network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130198840A1 (en) * 2012-01-31 2013-08-01 International Business Machines Corporation Systems, methods and computer programs providing impact mitigation of cyber-security failures
US8768838B1 (en) * 2005-02-02 2014-07-01 Nexus Payments, LLC Financial transactions using a rule-module nexus and a user account registry
US20150295948A1 (en) * 2012-10-23 2015-10-15 Suzanne P. Hassell Method and device for simulating network resiliance against attacks
US9225730B1 (en) * 2014-03-19 2015-12-29 Amazon Technologies, Inc. Graph based detection of anomalous activity

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10248910B2 (en) * 2015-10-28 2019-04-02 Fractal Industries, Inc. Detection mitigation and remediation of cyberattacks employing an advanced cyber-decision platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8768838B1 (en) * 2005-02-02 2014-07-01 Nexus Payments, LLC Financial transactions using a rule-module nexus and a user account registry
US20130198840A1 (en) * 2012-01-31 2013-08-01 International Business Machines Corporation Systems, methods and computer programs providing impact mitigation of cyber-security failures
US20150295948A1 (en) * 2012-10-23 2015-10-15 Suzanne P. Hassell Method and device for simulating network resiliance against attacks
US9225730B1 (en) * 2014-03-19 2015-12-29 Amazon Technologies, Inc. Graph based detection of anomalous activity

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3679506A4 *

Also Published As

Publication number Publication date
EP3679506A4 (en) 2021-01-13
CN111316268A (en) 2020-06-19
EP3679506A2 (en) 2020-07-15
WO2019051131A2 (en) 2019-03-14

Similar Documents

Publication Publication Date Title
Eckhart et al. Digital twins for cyber-physical systems security: State of the art and outlook
WO2016022705A8 (en) Cyber security posture validation platform
US20170134411A1 (en) Methods and Automated Systems to Effectively Resist (PAMD) Cyber Attacks
IN2015CH05184A (en)
Liu et al. Modeling of self-healing against cascading overload failures in complex networks
Eryilmaz et al. An algorithmic approach for the dynamic reliability analysis of non-repairable multi-state weighted k-out-of-n: G system
SG10201900062SA (en) Method and system of decentralized malware identification
Babun et al. Identifying counterfeit smart grid devices: A lightweight system level framework
WO2017106293A3 (en) Dynamic design of complex system-of-systems for planning and adaptation to unplanned scenarios
WO2019051131A3 (en) Advanced cybersecurity threat mitigation for inter-bank financial transactions
Muneeswari et al. Mitigation of attack detection via multi-stage cyber intelligence technique in smart grid
Perkins et al. Using discrete event simulation to model attacker interactions with cyber and physical security systems
GB2533049A (en) System and method for securing an architectural environment against crime and minimizing criminal elements
Gryzunov Model of purpose aggressive actions on the information-computing system
Vargas et al. The effect of entropy on the performance of modified genetic algorithm using earthquake and wind time series
CN103067200B (en) A kind of intermingle density effect simulation method and system
Umamaheswaran et al. IOT-based analysis for effective continuous monitoring prevent fraudulent intrusions in finance and banking
Afrin et al. Ai-powered cybersecurity for smart grid communication: A systematic review of intrusion detection and threat mitigation systems
Danilczyk Digital Twin for Intelligent Cyber-Physical Systems
KR102134357B1 (en) System for testing cyber security of nuclear power plant and method thereof
Degtiareva et al. Artificial Intelligence Solutions for Cybersecurity in Energy Systems
Grusho et al. Intelligent data analysis in information security
Basterrech et al. A performance study of random neural network as supervised learning tool using CUDA
Areo Foraging Facilitation and Its Implications for Predator-Prey Dynamics in Smart Grid Vulnerability Modeling
CN104023337A (en) Dynamically adjusted trust value calculation method based on Beta credit system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18852934

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018852934

Country of ref document: EP

Effective date: 20200406