http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2017210005-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_59c6a921f33fe0adc58c2b6177184515
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-56
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F16-9024
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F16-9014
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1441
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0442
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3247
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3239
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-566
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-554
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-52
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-18
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-52
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04N7-167
filingDate 2017-05-22-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_06161823e57fdeed13f69e7b93cdf874
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9fcdaf895e609030bf755d0d3520850d
publicationDate 2017-12-07-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2017210005-A1
titleOfInvention Systems and methods for detecting attacks in big data systems
abstract Various examples of methods and systems are provided for an attack detection system that can detect attacks in big data systems. The attack detection system can include security modules coupled to data nodes of the big data system. The attack detection system can identify a process executing on the respective data node. A process signature can be generated for the process executing on the data node. A determination of whether a big data system is being attacked can be based at least in part on a comparison of the process signature with at least one other process signature for the same process executing on another security module. The other process signatures are received via secure communication from the other security module.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110830416-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2022094708-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-108737156-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-116361256-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11657148-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-116361256-A
priorityDate 2016-05-31-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID58039
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID58039
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419520940
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID5371562

Total number of triples: 37.