-
公开(公告)号:US11936669B2
公开(公告)日:2024-03-19
申请号:US17937826
申请日:2022-10-04
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Andrey Karpovsky , Tomer Rotstein , Fady Nasereldeen , Naama Kraus , Roy Levin , Yotam Livny
CPC classification number: H04L63/1416 , G06N5/04 , G06N20/00
Abstract: Unauthorized use of user credentials in a network is detected. Data indicative of text strings being used to access resources in the network is accessed. Regex models are determined for the text strings. Troupings of the regex models are determined based on an optimization of a cumulative weighted function. A regex model having a cumulative weighted function that exceeds a predetermined threshold is identified. An alert is generated when the cumulative weighted function for the identified regex model exceeds the predetermined threshold.
-
公开(公告)号:US11647035B2
公开(公告)日:2023-05-09
申请号:US17021801
申请日:2020-09-15
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Andrey Karpovsky , Roy Levin , Tomer Rotstein , Michael Makhlevich , Tamer Salman , Ram Haim Pliskin
IPC: G06F15/173 , H04L9/40 , G06N20/00 , G06N7/00 , H04L41/06
CPC classification number: H04L63/1425 , G06N7/005 , G06N20/00 , H04L41/06
Abstract: An indication is received of a security alert. The indication is generated based on a detected anomaly in one of a data plane or a control plane of a computing environment. When the detected anomaly is in the data plane, the control plane is monitored for a subsequent anomaly in the control plane, and otherwise the data plane is monitored for a subsequent anomaly in the data plane. A correlation between the detected anomalies is determined. A notification of the security alert is sent when the correlation exceeds a predetermined threshold.
-
公开(公告)号:US20220067484A1
公开(公告)日:2022-03-03
申请号:US17004435
申请日:2020-08-27
Applicant: Microsoft Technology Licensing, LLC
Inventor: Omer Karin , Idan Y. Hen , Roy Levin
Abstract: Generally discussed herein are devices, systems, and methods for cloud traffic monitoring. A method can include receiving sampled network metadata of a packet transmitted via a computer network, providing the sampled network metadata to a neural network (NN) trained on labeled sampled network metadata, and providing, based on only the sampled network metadata, a classification for the sampled network metadata via the trained neural network.
-
4.
公开(公告)号:US11263544B2
公开(公告)日:2022-03-01
申请号:US16105189
申请日:2018-08-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Yotam Livny , Roy Levin , Ram Haim Pliskin , Ben Kliger , Mathias Abraham Marc Scherman , Moshe Israel , Michael Zeev Bargury
Abstract: Systems, methods, and apparatuses are provided for clustering incidents in a computing environment. An incident notification relating to an event (e.g., a potential cyberthreat or any other alert) in the computing environment is received and a set of features may be generated based on the incident notification. The set of features may be provided as an input to a machine-learning engine to identify a similar incident notification in the computing environment. The similar incident notification may include a resolved incident notification or an unresolved incident notification. An action to resolve the incident notification may be received, and the received action may thereby be executed. In some implementations, in addition to resolving the received incident notification, the action may be executed to resolve a similar unresolved incident notification identified by the machine-learning engine.
-
公开(公告)号:US11165791B2
公开(公告)日:2021-11-02
申请号:US16351962
申请日:2019-03-13
Applicant: Microsoft Technology Licensing, LLC
Inventor: Andrey Karpovsky , Ron Matchoro , Haim Saadia Ben Danan , Yotam Livny , Naama Kraus , Roy Levin , Tamer Salman
IPC: H04L29/06 , H04L12/911 , H04L29/08
Abstract: Generally discussed herein are devices, systems, and methods for computer or other network device security. A method can include identifying a profile associated with event data regarding an operation performed on a cloud resource, determining whether the event data is associated with anomalous customer interaction with the cloud resource, in response to determining the event data is associated with anomalous customer interaction, identifying whether another cloud resource of the cloud resources with a lower granularity profile that is associated with the profile of the cloud resource has previously been determined to be a target of an anomalous operation, and providing a single alert to a client device indicating the anomalous behavior on the cloud resource in response to determining both the event data is associated with anomalous customer interaction and the another cloud resource is determined to be the target of the anomalous operation.
-
6.
公开(公告)号:US20200057953A1
公开(公告)日:2020-02-20
申请号:US16105189
申请日:2018-08-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Yotam Livny , Roy Levin , Ram Haim Pliskin , Ben Kliger , Mathias Abraham Marc Scherman , Moshe Israel , Michael Zeev Bargury
Abstract: Systems, methods, and apparatuses are provided for clustering incidents in a computing environment. An incident notification relating to an event (e.g., a potential cyberthreat or any other alert) in the computing environment is received and a set of features may be generated based on the incident notification. The set of features may be provided as an input to a machine-learning engine to identify a similar incident notification in the computing environment. The similar incident notification may include a resolved incident notification or an unresolved incident notification. An action to resolve the incident notification may be received, and the received action may thereby be executed. In some implementations, in addition to resolving the received incident notification, the action may be executed to resolve a similar unresolved incident notification identified by the machine-learning engine.
-
公开(公告)号:US11991191B2
公开(公告)日:2024-05-21
申请号:US17742688
申请日:2022-05-12
Applicant: Microsoft Technology Licensing, LLC
Inventor: Roy Levin , Mathias A. M. Scherman
IPC: H04L9/40
CPC classification number: H04L63/1416 , H04L63/1466
Abstract: Methods, systems, and apparatuses are provided for detecting a missing security alert by receiving an alert sequence generated by a network security provider, applying the received alert sequence to a security incident model, receiving an indication from the security incident model that the received alert sequence corresponds to a security incident defined by a predetermined sequence of alerts that includes at least one alert missing from the received alert sequence, and generating a notification to the network security provider that indicates at least one of the security incident or the missing alert(s). In addition, the security incident model may be generated by providing a set of historical alerts and a set of historical security incidents to a machine learning algorithm to generate the security incident model.
-
公开(公告)号:US11856015B2
公开(公告)日:2023-12-26
申请号:US17357546
申请日:2021-06-24
Applicant: Microsoft Technology Licensing, LLC
Inventor: Roy Levin , Andrey Karpovsky
CPC classification number: H04L63/1425 , H04L63/102 , H04L63/1416 , H04L63/1483 , H04L63/20
Abstract: An anomalous action security assessor is disclosed. An anomaly is received from a set of anomalies. A series of linked queries associated with the anomaly is presented to the user. The series of linked queries includes a base query and a subquery. The base query tests an attribute of the anomaly and resolves to a plurality of outcomes of the base query. The subquery is associated with an outcome of the plurality of outcomes of the base query. The series of linked queries finally resolve to one of tag the anomaly and dismiss the anomaly. A security alert is issued if the series of linked queries finally resolves to tag the anomaly.
-
公开(公告)号:US11716340B2
公开(公告)日:2023-08-01
申请号:US17333534
申请日:2021-05-28
Applicant: Microsoft Technology Licensing, LLC
Inventor: Roy Levin , Ram Haim Pliskin , Johnathan Samuel Simon
CPC classification number: H04L63/1425 , H04L67/10 , H04L67/535
Abstract: Generally discussed herein are devices, systems, and methods for improving cloud resource security. A method can include obtaining a cloud resource management log that details actions performed by users of cloud resources in a cloud portal, the actions including entries comprising at least two of a user identification (ID) of a user of the users, an operation of operations performed on the cloud resource, a uniform resource identifier (URI) of a cloud resource of the cloud resources that is a target of the operation, or a time the operation was performed. The method can include determining a respective score for each action in the cloud resource management log, comparing the respective score to a specified criterion, and providing an indication of anomalous action in response to determining the respective score satisfies the specified criterion.
-
公开(公告)号:US11159567B2
公开(公告)日:2021-10-26
申请号:US16101398
申请日:2018-08-11
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ram Haim Pliskin , Roy Levin
Abstract: Methods, systems, and computer program products are described herein for detecting malicious cloud-based resource allocations. Such detection may be achieved using machine learning-based techniques that analyze sequences of cloud-based resource allocations to determine whether such sequences are performed with a malicious intent. For instance, a sequence classification model may be generated by training a machine learning-based algorithm on both resource allocation sequences that are known to be used for malicious purposes and resource allocation sequences that are known to be used for non-malicious or benign purposes. Using these sequences, the machine learning-based algorithm learns what constitutes a malicious resource allocation sequence and generates the sequence classification model. The sequence classification model is used to classify any sequence of resource allocation operations performed via a valid user's cloud services subscription provided thereto as being a malicious sequence or a non-malicious sequence.
-
-
-
-
-
-
-
-
-