-
公开(公告)号:US20200159923A1
公开(公告)日:2020-05-21
申请号:US16752374
申请日:2020-01-24
Applicant: CrowdStrike, Inc.
Inventor: Horea Coroiu , Daniel Radu
Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.
-
公开(公告)号:US20190156032A1
公开(公告)日:2019-05-23
申请号:US16252428
申请日:2019-01-18
Applicant: CrowdStrike, Inc.
Inventor: Horea Coroiu , Daniel Radu
CPC classification number: G06F21/564 , G06F16/152 , G06F16/901 , G06F2221/033 , H04L63/1416 , H04W12/1208
Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.
-
公开(公告)号:US20190156030A1
公开(公告)日:2019-05-23
申请号:US16252359
申请日:2019-01-18
Applicant: CrowdStrike, Inc.
Inventor: Horea Coroiu , Daniel Radu
Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.
-
公开(公告)号:US20240386109A1
公开(公告)日:2024-11-21
申请号:US18667819
申请日:2024-05-17
Applicant: CrowdStrike, Inc.
Inventor: George Robert Kurtz , Dmitri Alperovitch , Amol Kulkarni , Jan Miller , Daniel Radu
Abstract: A security service can determine a synthetic context based at least in part on context data associated with a first malware sample, and detonate the first malware sample in the synthetic context to provide one or more first event records representing events performed by the first malware sample and detected during detonation. Additionally or alternatively, the security service can detonate the first malware sample and locate a second malware sample in a corpus based at least in part on the one or more first event records. Additionally or alternatively, the security service can receive event records representing events detected during a detonation of a first malware sample, the detonation based at least in part on context data, and locate a second malware sample in the corpus based at least in part on the one or more reference event records.
-
公开(公告)号:US10546127B2
公开(公告)日:2020-01-28
申请号:US16252388
申请日:2019-01-18
Applicant: CrowdStrike, Inc.
Inventor: Horea Coroiu , Daniel Radu
IPC: G06F21/56 , G06F16/14 , H04L29/06 , G06F16/901
Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.
-
公开(公告)号:US10482246B2
公开(公告)日:2019-11-19
申请号:US16252359
申请日:2019-01-18
Applicant: CrowdStrike, Inc.
Inventor: Horea Coroiu , Daniel Radu
IPC: G06F21/56 , G06F16/14 , H04L29/06 , H04W12/12 , G06F16/901
Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.
-
公开(公告)号:US20190156031A1
公开(公告)日:2019-05-23
申请号:US16252388
申请日:2019-01-18
Applicant: CrowdStrike, Inc.
Inventor: Horea Coroiu , Daniel Radu
Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.
-
公开(公告)号:US20250036773A1
公开(公告)日:2025-01-30
申请号:US18425973
申请日:2024-01-29
Applicant: Crowdstrike, Inc.
Inventor: Theo Chihaia , Daniel Radu , Adrian-Cosmin Cojocaru
IPC: G06F21/57 , G06F16/22 , G06F16/2452
Abstract: A system and method of using generative AI to convert NL queries to database commands for accessing one or more databases. The method includes receiving a natural language (NL) request for information associated with a private network. The method includes providing the NL request to an artificial intelligence (AI) model trained to identify, from a plurality of access objects associated with a plurality of databases and a plurality of event types, a particular access object that provides access to one or more event datasets associated with the NL request. The method includes generating, by a processing device and using the AI model, a database request associated with the particular access object based on the NL request.
-
公开(公告)号:US20240427631A1
公开(公告)日:2024-12-26
申请号:US18475058
申请日:2023-09-26
Applicant: CrowdStrike, Inc.
Inventor: Dragos Corlatescu , Dan Belibov , Daniel Radu , Theo Chihaia , Marian Radu
Abstract: Systems and methods for incremental solves using LLMs for API calls is presented. The systems and methods produce, by a first large learning model (LLM), a processing plan based on a first prompt, wherein the processing plan includes a plurality of tasks corresponding to a plurality of services. The systems and methods send a plurality of messages corresponding to the plurality of tasks to a plurality of service agents, wherein the plurality of service agents correspond to the plurality of services and comprise a plurality of second LLMs that produce a plurality of agent responses. The systems and methods then generate a query response based on the plurality of agent responses.
-
公开(公告)号:US20240248983A1
公开(公告)日:2024-07-25
申请号:US18159266
申请日:2023-01-25
Applicant: CrowdStrike, Inc.
Inventor: Marian Radu , Daniel Radu
IPC: G06F21/55
CPC classification number: G06F21/552 , G06F2221/034
Abstract: A security agent configured to utilize a decision validation model for a prediction model of a security agent of the computing device is described herein. The decision validation model includes non-executable data and is utilized by a function of the security agent along with the input vector and decision value of the prediction model as inputs to the decision validation model. The decision validation model then outputs a different decision value from the decision value of the prediction model. The security agent receives the decision validation model from a security service that trains the decision validation model when the prediction model is generating false predictions.
-
-
-
-
-
-
-
-
-