Citrix Systems, Inc.
Malicious Event Detection in Computing Environments

Last updated:

Abstract:

Methods and systems for detecting malicious events in computing systems are described herein. Relationships between events occurring at computing systems are identified. The identified relationships are compared to a series of events previously determined to be a malicious activity to determine whether the identified relationship is potentially malicious activity. If the identified relationship is determined to be potentially malicious, actions can be taken to mitigate damages caused by the events in the identified relationship.

Status:
Application
Type:

Utility

Filling date:

13 May 2020

Issue date:

28 Oct 2021