Splunk Inc.
Computer-implemented system and method for creating an environment for detecting malicious content

Last updated:

Abstract:

Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.

Status:
Grant
Type:

Utility

Filling date:

31 Jan 2018

Issue date:

12 May 2020