CPC G06F 21/6218 (2013.01) [G06F 16/22 (2019.01); G06F 16/24578 (2019.01); G06F 21/604 (2013.01); H04L 63/0823 (2013.01); H04L 63/083 (2013.01)] | 20 Claims |
1. A method comprising:
querying, by a computer, one or more data sources using keywords indicative of potential breaches to produce query results;
identifying, by the computer, a candidate breach based at least in part on query results associated with characteristics of a system;
computing, by the computer, a likelihood that the candidate breach is an actual breach based on the query results and a set of breach criteria weights; and
in response to the computed likelihood exceeding a breach threshold, identifying, by the computer, a network node associated with the candidate breach for isolation.
|