Detection of compromised devices via user states

    公开(公告)号:US10534925B2

    公开(公告)日:2020-01-14

    申请号:US15286558

    申请日:2016-10-05

    Abstract: Controlling device security includes obtaining a set of device activity data indicating current device activity on a device and a set of user activity data indicating a current activity state of one or more legitimate users of the device. It is determined whether the indicated current activity state of the users indicates that a legitimate user is in an active state on the device, or that none of the legitimate users is in an active state on the device. A statistical fit of the indicated current device activity on the device, with the indicated current activity state of the one or more legitimate users, is determined, by a comparison with at least one of the models that are generated via supervised learning. A security alert action may be initiated, based on a result of the determination of the statistical fit indicating a compromised state of the device.

    DETECTION OF ABNORMAL RESOURCE USAGE IN A DATA CENTER
    8.
    发明申请
    DETECTION OF ABNORMAL RESOURCE USAGE IN A DATA CENTER 有权
    检测数据中心异常资源使用情况

    公开(公告)号:US20160350198A1

    公开(公告)日:2016-12-01

    申请号:US14721777

    申请日:2015-05-26

    Abstract: A system for identifying abnormal resource usage in a data center is provided. In some embodiments, the system employs a prediction model for each of a plurality of resources and an abnormal resource usage criterion. For each of a plurality of resources of the data center, the system retrieves current resource usage data for a current time and past resource usage data for that resource. The system then extracts features from the past resource usage data for that resource, predicts using the prediction model for that resource usage data for the current time based on the extracted features, and determines an error between the predicted resource usage data and the current resource usage data. After determining the error data for the resources, the system determines whether errors satisfy the abnormal resource usage criterion. If so, the system indicates that an abnormal resource usage has occurred.

    Abstract translation: 提供了用于识别数据中心中的异常资源使用的系统。 在一些实施例中,系统针对多个资源中的每个资源和异常资源使用准则采用预测模型。 对于数据中心的多个资源中的每一个,系统检索当前时间的当前资源使用数据和该资源的过去资源使用数据。 系统然后从该资源的过去资源使用数据中提取特征,基于所提取的特征,预测当前时间使用该资源使用数据的预测模型,并且确定预测资源使用数据与当前资源使用之间的误差 数据。 在确定资源的错误数据后,系统确定错误是否满足异常资源使用准则。 如果是这样,系统表示资源使用异常。

    Enterprise graph method of threat detection

    公开(公告)号:US10771492B2

    公开(公告)日:2020-09-08

    申请号:US15273604

    申请日:2016-09-22

    Abstract: Systems and methods for analyzing security alerts within an enterprise are provided. An enterprise graph is generated based on information such as operational intelligence regarding the enterprise. The enterprise graph identifies relationships between entities of the enterprise and a plurality of security alerts are produced by a plurality of security components of the enterprise. One or more significant relationships are identified between two or more of the plurality of security alerts based on a strength of a relationship identified in the enterprise graph. A significant relationship is utilized to identify a potential security incident between two or more of the security alerts.

    Detection of abnormal resource usage in a data center

    公开(公告)号:US10402244B2

    公开(公告)日:2019-09-03

    申请号:US15385718

    申请日:2016-12-20

    Abstract: A system for identifying abnormal resource usage in a data center is provided. In some embodiments, the system employs a prediction model for each of a plurality of resources and an abnormal resource usage criterion. For each of a plurality of resources of the data center, the system retrieves current resource usage data for a current time and past resource usage data for that resource. The system then extracts features from the past resource usage data for that resource, predicts using the prediction model for that resource usage data for the current time based on the extracted features, and determines an error between the predicted resource usage data and the current resource usage data. After determining the error data for the resources, the system determines whether errors satisfy the abnormal resource usage criterion. If so, the system indicates that an abnormal resource usage has occurred.

Patent Agency Ranking