Honeywell International Inc.
MAPPING AN ATTACK TREE AND ATTACK PREDICTION IN INDUSTRIAL CONTROL AND IIOT ENVIRONMENT USING HASH DATA ANALYTICS

Last updated:

Abstract:

A method, apparatus and computer program product for detecting malicious content and predicting cyberattacks are described herein. In the context of a method, the method receives a hash query comprising a file hash based on one or more files. The method queries a cyberattack case studies information database based on the hash query to generate one or more attack correlation information items associated with at least one of the one or more files. The method also generates and outputs a file security analysis based on the attack correlation information items for authorization of the one or more files.

Status:
Application
Type:

Utility

Filling date:

6 Mar 2020

Issue date:

9 Sep 2021