Proofpoint, Inc.
THREAT ACTOR IDENTIFICATION SYSTEMS AND METHODS

Last updated:

Abstract:

A threat actor identification system that obtains domain data for a set of domains, generates domain clusters, determines whether the domain clusters are associated with threat actors, and presents domain data for the clusters that are associated with threat actors to brand owners that are associated with the threat actors. The clusters may be generated based on similarities in web page content, domain registration information, and/or domain infrastructure information. For each cluster, a clustering engine determines whether the cluster is associated with a threat actor, and for clusters that are associated with threat actors, corresponding domain information is stored for presentation to brand owners to whom the threat actor poses a threat.

Status:
Application
Type:

Utility

Filling date:

14 Jan 2019

Issue date:

16 Jul 2020