US 12,267,345 B1
Using user feedback for attack path analysis in an anomaly detection framework
Úlfar Erlingsson, Palo Alto, CA (US); Jay Parikh, Redwood City, CA (US); and Yijou Chen, Cupertino, CA (US)
Assigned to Fortinet, Inc., Sunnyvale, CA (US)
Filed by LACEWORK, INC., Mountain View, CA (US)
Filed on May 24, 2023, as Appl. No. 18/322,984.
Application 18/322,984 is a continuation in part of application No. 17/671,199, filed on Feb. 14, 2022, granted, now 11,785,104.
Application 17/671,199 is a continuation in part of application No. 17/504,311, filed on Oct. 18, 2021, granted, now 11,677,772.
Application 17/504,311 is a continuation of application No. 16/665,961, filed on Oct. 28, 2019, granted, now 11,153,339, issued on Oct. 19, 2021.
Application 16/665,961 is a continuation of application No. 16/134,794, filed on Sep. 18, 2018, granted, now 10,581,891, issued on Mar. 3, 2020.
Claims priority of provisional application 63/496,276, filed on Apr. 14, 2023.
Claims priority of provisional application 63/438,161, filed on Jan. 10, 2023.
Claims priority of provisional application 63/243,013, filed on Sep. 10, 2021.
Claims priority of provisional application 62/650,971, filed on Mar. 30, 2018.
Claims priority of provisional application 62/590,986, filed on Nov. 27, 2017.
Int. Cl. H04L 43/045 (2022.01); G06F 9/455 (2018.01); G06F 9/54 (2006.01); G06F 16/901 (2019.01); G06F 16/9038 (2019.01); G06F 16/9535 (2019.01); G06F 16/9537 (2019.01); G06F 21/57 (2013.01); H04L 9/40 (2022.01); H04L 43/06 (2022.01); H04L 67/306 (2022.01); H04L 67/50 (2022.01); G06F 16/2455 (2019.01)
CPC H04L 63/1425 (2013.01) [G06F 9/455 (2013.01); G06F 9/545 (2013.01); G06F 16/9024 (2019.01); G06F 16/9038 (2019.01); G06F 16/9535 (2019.01); G06F 16/9537 (2019.01); G06F 21/57 (2013.01); H04L 43/045 (2013.01); H04L 43/06 (2013.01); H04L 63/10 (2013.01); H04L 67/306 (2013.01); H04L 67/535 (2022.05); G06F 16/2456 (2019.01)] 20 Claims
OG exemplary drawing
 
1. A method of using user feedback for attack path analysis in an anomaly detection framework, the method comprising:
performing an attack path analysis for a cloud deployment;
receiving, from a user, user feedback for an attack vector of the attack path analysis; and
initiating, based on the user feedback, a workflow for modifying one or more parameters for generating the attack path analysis.