主权项 |
1. A method comprising:
detecting, by a computer system, anomalies in activity on a computer network, based on received event data associated with the activity; generating, by the computer system, anomaly data indicative of the anomalies in response to said detecting; identifying, by the computer system, threat indicators by processing the anomaly data; generating, by the computer system, threat indicator data indicative of the threat indicators in response to said identifying; and identifying, by the computer system, the security threat to the computer network by processing the threat indicator data. |