WO2019051131A3 - Advanced cybersecurity threat mitigation for inter-bank financial transactions - Google Patents
Advanced cybersecurity threat mitigation for inter-bank financial transactions Download PDFInfo
- Publication number
- WO2019051131A3 WO2019051131A3 PCT/US2018/049807 US2018049807W WO2019051131A3 WO 2019051131 A3 WO2019051131 A3 WO 2019051131A3 US 2018049807 W US2018049807 W US 2018049807W WO 2019051131 A3 WO2019051131 A3 WO 2019051131A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- inter
- financial transactions
- threat mitigation
- network
- bank financial
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Debugging And Monitoring (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A system for mitigation of cyberattacks employing an advanced cyber decision platform comprising a time series data store, a directed computational graph module, an action outcome simulation module, and observation and state estimation module, wherein the state of a network is monitored and used to produce a cyber-physical graph representing network resources, simulated network events are produced and monitored, and the network events and their effects are analyzed to produce security recommendations.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP18852934.1A EP3679506A4 (en) | 2017-09-06 | 2018-09-06 | Advanced cybersecurity threat mitigation for inter-bank financial transactions |
| CN201880071889.9A CN111316268A (en) | 2017-09-06 | 2018-09-06 | Advanced cyber-security threat mitigation for interbank financial transactions |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/696,367 | 2017-09-06 | ||
| US15/696,367 US10432660B2 (en) | 2015-10-28 | 2017-09-06 | Advanced cybersecurity threat mitigation for inter-bank financial transactions |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2019051131A2 WO2019051131A2 (en) | 2019-03-14 |
| WO2019051131A3 true WO2019051131A3 (en) | 2019-04-04 |
Family
ID=65635202
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2018/049807 Ceased WO2019051131A2 (en) | 2017-09-06 | 2018-09-06 | Advanced cybersecurity threat mitigation for inter-bank financial transactions |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP3679506A4 (en) |
| CN (1) | CN111316268A (en) |
| WO (1) | WO2019051131A2 (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111741004B (en) * | 2020-06-24 | 2022-05-27 | 中国银行股份有限公司 | Network security situation awareness method and related device |
| CN112149124B (en) * | 2020-11-02 | 2022-04-29 | 电子科技大学 | A method and system for Android malware detection based on heterogeneous information network |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130198840A1 (en) * | 2012-01-31 | 2013-08-01 | International Business Machines Corporation | Systems, methods and computer programs providing impact mitigation of cyber-security failures |
| US8768838B1 (en) * | 2005-02-02 | 2014-07-01 | Nexus Payments, LLC | Financial transactions using a rule-module nexus and a user account registry |
| US20150295948A1 (en) * | 2012-10-23 | 2015-10-15 | Suzanne P. Hassell | Method and device for simulating network resiliance against attacks |
| US9225730B1 (en) * | 2014-03-19 | 2015-12-29 | Amazon Technologies, Inc. | Graph based detection of anomalous activity |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10248910B2 (en) * | 2015-10-28 | 2019-04-02 | Fractal Industries, Inc. | Detection mitigation and remediation of cyberattacks employing an advanced cyber-decision platform |
-
2018
- 2018-09-06 EP EP18852934.1A patent/EP3679506A4/en not_active Withdrawn
- 2018-09-06 CN CN201880071889.9A patent/CN111316268A/en active Pending
- 2018-09-06 WO PCT/US2018/049807 patent/WO2019051131A2/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8768838B1 (en) * | 2005-02-02 | 2014-07-01 | Nexus Payments, LLC | Financial transactions using a rule-module nexus and a user account registry |
| US20130198840A1 (en) * | 2012-01-31 | 2013-08-01 | International Business Machines Corporation | Systems, methods and computer programs providing impact mitigation of cyber-security failures |
| US20150295948A1 (en) * | 2012-10-23 | 2015-10-15 | Suzanne P. Hassell | Method and device for simulating network resiliance against attacks |
| US9225730B1 (en) * | 2014-03-19 | 2015-12-29 | Amazon Technologies, Inc. | Graph based detection of anomalous activity |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP3679506A4 * |
Also Published As
| Publication number | Publication date |
|---|---|
| EP3679506A4 (en) | 2021-01-13 |
| CN111316268A (en) | 2020-06-19 |
| EP3679506A2 (en) | 2020-07-15 |
| WO2019051131A2 (en) | 2019-03-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Eckhart et al. | Digital twins for cyber-physical systems security: State of the art and outlook | |
| WO2016022705A8 (en) | Cyber security posture validation platform | |
| US20170134411A1 (en) | Methods and Automated Systems to Effectively Resist (PAMD) Cyber Attacks | |
| IN2015CH05184A (en) | ||
| Liu et al. | Modeling of self-healing against cascading overload failures in complex networks | |
| Eryilmaz et al. | An algorithmic approach for the dynamic reliability analysis of non-repairable multi-state weighted k-out-of-n: G system | |
| SG10201900062SA (en) | Method and system of decentralized malware identification | |
| Babun et al. | Identifying counterfeit smart grid devices: A lightweight system level framework | |
| WO2017106293A3 (en) | Dynamic design of complex system-of-systems for planning and adaptation to unplanned scenarios | |
| WO2019051131A3 (en) | Advanced cybersecurity threat mitigation for inter-bank financial transactions | |
| Muneeswari et al. | Mitigation of attack detection via multi-stage cyber intelligence technique in smart grid | |
| Perkins et al. | Using discrete event simulation to model attacker interactions with cyber and physical security systems | |
| GB2533049A (en) | System and method for securing an architectural environment against crime and minimizing criminal elements | |
| Gryzunov | Model of purpose aggressive actions on the information-computing system | |
| Vargas et al. | The effect of entropy on the performance of modified genetic algorithm using earthquake and wind time series | |
| CN103067200B (en) | A kind of intermingle density effect simulation method and system | |
| Umamaheswaran et al. | IOT-based analysis for effective continuous monitoring prevent fraudulent intrusions in finance and banking | |
| Afrin et al. | Ai-powered cybersecurity for smart grid communication: A systematic review of intrusion detection and threat mitigation systems | |
| Danilczyk | Digital Twin for Intelligent Cyber-Physical Systems | |
| KR102134357B1 (en) | System for testing cyber security of nuclear power plant and method thereof | |
| Degtiareva et al. | Artificial Intelligence Solutions for Cybersecurity in Energy Systems | |
| Grusho et al. | Intelligent data analysis in information security | |
| Basterrech et al. | A performance study of random neural network as supervised learning tool using CUDA | |
| Areo | Foraging Facilitation and Its Implications for Predator-Prey Dynamics in Smart Grid Vulnerability Modeling | |
| CN104023337A (en) | Dynamically adjusted trust value calculation method based on Beta credit system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18852934 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2018852934 Country of ref document: EP Effective date: 20200406 |