INTER-APPLICATION DEPENDENCY ANALYSIS FOR IMPROVING COMPUTER SYSTEM THREAT DETECTION

    公开(公告)号:WO2019032180A1

    公开(公告)日:2019-02-14

    申请号:PCT/US2018/037183

    申请日:2018-06-13

    Abstract: A method and system are provided for improving threat detection in a computer system by performing an inter-application dependency analysis on events of the computer system. The method includes receiving, by a processor operatively coupled to a memory, a Tracking Description Language (TDL) query including general constraints, a tracking declaration and an output specification, parsing, by the processor, the TDL query using a language parser, executing, by the processor, a tracking analysis based on the parsed TDL query, generating, by the processor, a tracking graph by cleaning a result of the tracking analysis, and outputting, by the processor and via an interface, query results based on the tracking graph.

    INTEGRATED COMMUNITY AND ROLE DISCOVERY IN ENTERPRISE NETWORKS
    13.
    发明申请
    INTEGRATED COMMUNITY AND ROLE DISCOVERY IN ENTERPRISE NETWORKS 审中-公开
    综合社区和企业网络中的角色发现

    公开(公告)号:WO2016168531A1

    公开(公告)日:2016-10-20

    申请号:PCT/US2016/027659

    申请日:2016-04-15

    Abstract: Methods and systems for detecting anomalous communications include simulating a network graph based on community and role labels of each node in the network graph based on one or more linking rules. The community and role labels of each node are adjusted based on differences between the simulated network graph and a true network graph. The simulation and adjustment are repeated until the simulated network graph converges to the true network graph to determine a final set of community and role labels. It is determined whether a network communication is anomalous based on the final set of community and role labels.

    Abstract translation: 用于检测异常通信的方法和系统包括基于一个或多个链接规则来模拟网络图中基于社区和每个节点的角色标签的网络图。 基于模拟网络图和真实网络图之间的差异来调整每个节点的社区和角色标签。 重复模拟和调整,直到模拟网络图收敛到真实的网络图,以确定最终的一组社区和角色标签。 基于社区和角色标签的最终集确定网络通信是否是异常的。

    MODULAR NETWORK BASED KNOWLEDGE SHARING FOR MULTIPLE ENTITIES

    公开(公告)号:WO2022076402A1

    公开(公告)日:2022-04-14

    申请号:PCT/US2021/053558

    申请日:2021-10-05

    Abstract: A method for vehicle fault detection is provided. The method includes training (810), by a cloud module controlled by a processor device, an entity-shared modular and a shared modular connection controller. The entity- shared modular stores common knowledge for a transfer scope, and is formed from a set of sub- networks which are dynamically assembled for different target entities of a vehicle by the shared modular connection controller. The method further includes training (820), by an edge module controlled by another processor device, an entity-specific decoder and an entity-specific connection controller. The entity-specific decoder is for filtering entity- specific information from the common knowledge in the entity- shared modular by dynamically assembling the set of sub-networks in a manner decided by the entity specific connection controller.

    GRAPH-BASED ATTACK CHAIN DISCOVERY IN ENTERPRISE SECURITY SYSTEMS
    17.
    发明申请
    GRAPH-BASED ATTACK CHAIN DISCOVERY IN ENTERPRISE SECURITY SYSTEMS 审中-公开
    企业安全系统中基于图形的攻击链发现

    公开(公告)号:WO2018071356A1

    公开(公告)日:2018-04-19

    申请号:PCT/US2017/055826

    申请日:2017-10-10

    CPC classification number: G06F21/554 G06F21/55 G06F21/60

    Abstract: Methods and systems for detecting anomalous events include detecting anomalous events (42, 43) in monitored system data. An event correlation graph is generated (302) based on the monitored system data that characterizes the tendency of processes to access system targets. Kill chains are generated (310) that connect malicious events over a span of time from the event correlation graph that characterize events in an attack path over time by sorting events according to a maliciousness value and determining at least one sub-graph within the event correlation graph with an above-threshold maliciousness rank. A security management action is performed (412) based on the kill chains.

    Abstract translation: 用于检测异常事件的方法和系统包括检测所监视的系统数据中的异常事件(42,43)。 基于监视的系统数据生成(302)事件关联图,表征过程访问系统目标的倾向。 通过根据恶意值对事件进行排序并确定事件相关内的至少一个子图,产生(310)从事件关联图中连接恶意事件的杀死链(310),所述事件关联图随时间表征攻击路径中的事件 图表具有高于阈值的恶意级别。 基于杀链来执行安全管理操作(412)。

    CONSTRUCTING GRAPH MODELS OF EVENT CORRELATION IN ENTERPRISE SECURITY SYSTEMS
    18.
    发明申请
    CONSTRUCTING GRAPH MODELS OF EVENT CORRELATION IN ENTERPRISE SECURITY SYSTEMS 审中-公开
    企业安全系统中事件相关性的图形模型构建

    公开(公告)号:WO2018071355A1

    公开(公告)日:2018-04-19

    申请号:PCT/US2017/055825

    申请日:2017-10-10

    CPC classification number: G06F21/552 G06F21/554

    Abstract: Methods and systems for detecting anomalous events include detecting anomalous events (42,43) in monitored system data. An event correlation graph is generated (302) by determining a tendency for a first process to access a system target, include an innate tendency of the first process to access the system target, an influence of previous events from the first process, and an influence of processes other than the first process. Kill chains are generated (310) from the event correlation graph that characterize events in an attack path over time. A security management action is performed (412) based on the kill chains.

    Abstract translation: 用于检测异常事件的方法和系统包括检测监测到的系统数据中的异常事件(42,43)。 通过确定第一过程访问系统目标的趋势,包括第一过程访问系统目标的先天趋势,来自第一过程的先前事件的影响以及影响第一过程的影响来生成事件相关图(302) 除第一个过程以外的过程。 从事件关联图生成(310)杀死链,表征攻击路径随时间的事件。 基于杀链来执行安全管理操作(412)。

    ANNEALED SPARSITY VIA ADAPTIVE AND DYNAMIC SHRINKING
    19.
    发明申请
    ANNEALED SPARSITY VIA ADAPTIVE AND DYNAMIC SHRINKING 审中-公开
    通过自适应和动态收缩的退火空间

    公开(公告)号:WO2016196079A1

    公开(公告)日:2016-12-08

    申请号:PCT/US2016/033905

    申请日:2016-05-24

    CPC classification number: G06N99/005 G06F19/34

    Abstract: Systems and methods are provided for acquiring data from an input signal using multitask regression. The method includes: receiving the input signal, the input signal including data that includes a plurality of features; determining at least two computational tasks to analyze within the input signal; regularizing all of the at least two tasks using shared adaptive weights; performing a multitask regression on the input signal to create a solution path for all of the at least two tasks, wherein the multitask regression includes updating a model coefficient and a regularization weight together under an equality norm constraint until convergence is reached, and updating the model coefficient and regularization weight together under an updated equality norm constraint that has a greater l1-penalty than the previous equality norm constraint until convergence is reached; selecting a sparse model from the solution path; constructing an image using the sparse model; and displaying the image.

    Abstract translation: 提供了系统和方法,用于使用多任务回归从输入信号中获取数据。 所述方法包括:接收所述输入信号,所述输入信号包括包括多个特征的数据; 确定在输入信号内分析的至少两个计算任务; 使用共享自适应权重对所有至少两个任务进行规则化; 对输入信号执行多任务回归,以创建用于所有至少两个任务的解决路径,其中所述多任务回归包括在等式范数约束下一起更新模型系数和正则化权重直到达到收敛,并且更新所述模型 系数和正则化权重在更新的等式规范约束下一起,其具有比先前的等式范数约束更大的l1惩罚,直到达到收敛; 从解决路径中选择稀疏模型; 使用稀疏模型构建图像; 并显示图像。

Patent Agency Ranking