US 11,985,154 B2
Comprehensible threat detection
Jan Kohout, Roudnice nad Labem (CZ); Martin Kopp, Komarov (CZ); Kyrylo Shcherbin, Prague (CZ); Jaroslav Hlavac, Prague (CZ); and Cenek Skarda, Prague Bechovice (CZ)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Feb. 10, 2022, as Appl. No. 17/668,639.
Claims priority of provisional application 63/271,771, filed on Oct. 26, 2021.
Prior Publication US 2023/0133892 A1, May 4, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1425 (2013.01) 20 Claims
OG exemplary drawing
 
1. A system comprising:
one or more processors; and
one or more non-transitory computer-readable media storing instructions that, when executed by the one or more processors, cause the system to perform operations comprising:
receiving telemetry data associated with one or more modalities, the one or more modalities including at least a first modality and a second modality, the second modality different from the first modality;
detecting, in the telemetry data, one or more abnormal events associated with security incidents, the one or more abnormal events including at least a first abnormal event associated with the first modality and a second abnormal event associated with the second modality;
determining a first mapping between a first endpoint identifier associated with the first modality and a network address associated with an entity;
determining a second mapping between a second endpoint identifier associated with the second modality and the network address associated with the entity;
determining, based at least in part on the first mapping and the second mapping, that the first abnormal event and the second abnormal event are each associated with a same entity;
based at least in part on the first abnormal event and the second abnormal event each being associated with the same entity, determining that a correlation between the first abnormal event and the second abnormal event is indicative of a security incident; and
based at least in part on the correlation, outputting an indication of the security incident.