CN111213161B - 认知虚拟检测器 - Google Patents
认知虚拟检测器 Download PDFInfo
- Publication number
- CN111213161B CN111213161B CN201880067127.1A CN201880067127A CN111213161B CN 111213161 B CN111213161 B CN 111213161B CN 201880067127 A CN201880067127 A CN 201880067127A CN 111213161 B CN111213161 B CN 111213161B
- Authority
- CN
- China
- Prior art keywords
- user
- virtual agent
- response
- computer
- processors
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
- G06N20/20—Ensemble learning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/02—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/30—Semantic analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
- G06F9/453—Help systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/004—Artificial life, i.e. computing arrangements simulating life
- G06N3/006—Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/01—Probabilistic graphical models, e.g. probabilistic networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1818—Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0681—Configuration of triggering conditions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Artificial Intelligence (AREA)
- Computer Hardware Design (AREA)
- Evolutionary Computation (AREA)
- Data Mining & Analysis (AREA)
- Mathematical Physics (AREA)
- General Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Pure & Applied Mathematics (AREA)
- Algebra (AREA)
- Probability & Statistics with Applications (AREA)
- Mathematical Optimization (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Molecular Biology (AREA)
- Human Computer Interaction (AREA)
- Computer And Data Communications (AREA)
- User Interface Of Digital Computer (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/786,888 | 2017-10-18 | ||
| US15/786,888 US10574598B2 (en) | 2017-10-18 | 2017-10-18 | Cognitive virtual detector |
| PCT/IB2018/057830 WO2019077440A1 (en) | 2017-10-18 | 2018-10-10 | VIRTUAL COGNITIVE DETECTOR |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111213161A CN111213161A (zh) | 2020-05-29 |
| CN111213161B true CN111213161B (zh) | 2023-11-10 |
Family
ID=66096155
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201880067127.1A Active CN111213161B (zh) | 2017-10-18 | 2018-10-10 | 认知虚拟检测器 |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US10574598B2 (enExample) |
| JP (1) | JP7083559B2 (enExample) |
| CN (1) | CN111213161B (enExample) |
| GB (1) | GB2581741A (enExample) |
| WO (1) | WO2019077440A1 (enExample) |
Families Citing this family (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11024085B2 (en) * | 2016-07-09 | 2021-06-01 | Doubleme, Inc. | Electronic system and method for three-dimensional mixed-reality space and experience construction and sharing |
| US10574598B2 (en) | 2017-10-18 | 2020-02-25 | International Business Machines Corporation | Cognitive virtual detector |
| US10423873B2 (en) * | 2017-12-01 | 2019-09-24 | International Business Machines Corporation | Information flow analysis for conversational agents |
| US10521462B2 (en) * | 2018-02-27 | 2019-12-31 | Accenture Global Solutions Limited | Virtual services rapid deployment tool |
| US11429725B1 (en) * | 2018-04-26 | 2022-08-30 | Citicorp Credit Services, Inc. (Usa) | Automated security risk assessment systems and methods |
| CN108897848A (zh) * | 2018-06-28 | 2018-11-27 | 北京百度网讯科技有限公司 | 机器人互动方法、装置及设备 |
| US10893072B2 (en) * | 2018-08-17 | 2021-01-12 | Paypal, Inc. | Using cloned accounts to track attacks on user accounts |
| US11182557B2 (en) * | 2018-11-05 | 2021-11-23 | International Business Machines Corporation | Driving intent expansion via anomaly detection in a modular conversational system |
| EP3906508B1 (en) * | 2018-12-31 | 2024-03-13 | Intel Corporation | Securing systems employing artificial intelligence |
| US11368470B2 (en) * | 2019-06-13 | 2022-06-21 | International Business Machines Corporation | Real-time alert reasoning and priority-based campaign discovery |
| CA3085098A1 (en) * | 2019-06-27 | 2020-12-27 | Royal Bank Of Canada | Image recognition reverse tuning test system |
| US10896664B1 (en) * | 2019-10-14 | 2021-01-19 | International Business Machines Corporation | Providing adversarial protection of speech in audio signals |
| US11386226B2 (en) | 2019-10-21 | 2022-07-12 | International Business Machines Corporation | Preventing leakage of selected information in public channels |
| JP7349404B2 (ja) * | 2020-04-27 | 2023-09-22 | Kddi株式会社 | 判定装置、判定方法及び判定プログラム |
| CN113411299B (zh) * | 2020-08-25 | 2023-01-10 | 中数数字工程(深圳)有限公司 | 基于大数据的终端设备虚拟代理系统 |
| CN111818096B (zh) * | 2020-08-31 | 2020-12-22 | 北京安帝科技有限公司 | 网络协议解析方法和装置 |
| US12499313B2 (en) * | 2021-01-21 | 2025-12-16 | Servicenow, Inc. | Ensemble scoring system for a natural language understanding (NLU) framework |
| CN113468264B (zh) * | 2021-05-20 | 2024-02-20 | 杭州趣链科技有限公司 | 一种基于区块链的中毒防御和中毒溯源的联邦学习方法和装置 |
| US11947694B2 (en) | 2021-06-29 | 2024-04-02 | International Business Machines Corporation | Dynamic virtual honeypot utilizing honey tokens and data masking |
| US12321428B2 (en) * | 2021-07-08 | 2025-06-03 | Nippon Telegraph And Telephone Corporation | User authentication device, user authentication method, and user authentication computer program |
| CN113656271B (zh) * | 2021-08-10 | 2024-06-07 | 上海浦东发展银行股份有限公司 | 用户异常行为的处理方法、装置、设备及存储介质 |
| US11558506B1 (en) * | 2021-09-27 | 2023-01-17 | Nice Ltd. | Analysis and matching of voice signals |
| US20230147451A1 (en) * | 2021-11-08 | 2023-05-11 | Intelepeer | Methods and systems for generating a virtual graph of multi channel communications |
| US12284211B2 (en) * | 2023-02-02 | 2025-04-22 | Advanced Security Technologies Asia Pte. Ltd. | Cyber clone of a computing entity |
| US20250330481A1 (en) * | 2023-09-29 | 2025-10-23 | F5, Inc. | Methods for security control and devices thereof |
| US12028359B1 (en) * | 2023-10-25 | 2024-07-02 | Coalition, Inc. | Method of ranking and address network threats |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104704797A (zh) * | 2012-08-10 | 2015-06-10 | 纽昂斯通讯公司 | 用于电子设备的虚拟代理通信 |
Family Cites Families (43)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP3734206B2 (ja) * | 1998-05-01 | 2006-01-11 | インターナショナル・ビジネス・マシーンズ・コーポレーション | エージェント対話管理方法、コンピュータ及び記憶媒体 |
| US7136860B2 (en) * | 2000-02-14 | 2006-11-14 | Overture Services, Inc. | System and method to determine the validity of an interaction on a network |
| US8566102B1 (en) * | 2002-03-28 | 2013-10-22 | At&T Intellectual Property Ii, L.P. | System and method of automating a spoken dialogue service |
| US20050149630A1 (en) | 2003-06-27 | 2005-07-07 | Brent Smolinski | Context sensitive transfer with active listening and active alerts |
| US20070299915A1 (en) * | 2004-05-02 | 2007-12-27 | Markmonitor, Inc. | Customer-based detection of online fraud |
| US7444379B2 (en) | 2004-06-30 | 2008-10-28 | International Business Machines Corporation | Method for automatically setting chat status based on user activity in local environment |
| US8145708B2 (en) | 2006-11-10 | 2012-03-27 | Microsoft Corporation | On-line virtual robot (bot) security agent |
| US7716247B2 (en) | 2006-12-18 | 2010-05-11 | Microsoft Corporation | Multi-protocol access to files and directories |
| US8630961B2 (en) * | 2009-01-08 | 2014-01-14 | Mycybertwin Group Pty Ltd | Chatbots |
| US8260465B2 (en) | 2009-07-17 | 2012-09-04 | Rain Bird Corporation | Data communication in a multi-wire irrigation control system |
| CA2675664A1 (en) * | 2009-08-28 | 2009-11-05 | Ibm Canada Limited - Ibm Canada Limitee | Escalation of user identity and validation requirements to counter a threat |
| US8279779B2 (en) * | 2009-12-10 | 2012-10-02 | Verizon Patent And Licensing Inc. | Method and system for virtual agent session monitoring and barge-in |
| US20130031042A1 (en) | 2011-07-27 | 2013-01-31 | Sintayehu Dehnie | Distributed assured network system (DANS) |
| US8881289B2 (en) * | 2011-10-18 | 2014-11-04 | Mcafee, Inc. | User behavioral risk assessment |
| CN104411234B (zh) * | 2012-05-02 | 2017-08-22 | 赛佛欧普手术有限公司 | 用于电生理诱发电位的表征和分类的系统、方法及计算机算法 |
| CN104885427B (zh) * | 2012-12-06 | 2018-03-30 | 波音公司 | 用于威胁检测的情景感知型网络安全监控 |
| US20140164532A1 (en) * | 2012-12-11 | 2014-06-12 | Nuance Communications, Inc. | Systems and methods for virtual agent participation in multiparty conversation |
| US9137687B2 (en) | 2013-09-06 | 2015-09-15 | Qualcomm Incorporated | Pipelining registration and conflict detection in dual-SIM-dual-active communication device coexistence |
| US9189742B2 (en) * | 2013-11-20 | 2015-11-17 | Justin London | Adaptive virtual intelligent agent |
| WO2016035083A2 (en) * | 2014-09-06 | 2016-03-10 | Andriani Matthew | Non-disruptive ddos testing |
| US20160071517A1 (en) * | 2014-09-09 | 2016-03-10 | Next It Corporation | Evaluating Conversation Data based on Risk Factors |
| IL235423A0 (en) * | 2014-10-30 | 2015-01-29 | Ironscales Ltd | Method and system for mitigating targeted phishing attacks |
| EP3215945B1 (en) * | 2014-11-03 | 2018-09-19 | Vectra Networks, Inc. | A system for detecting threats using scenario-based tracking of internal and external network traffic |
| US9954891B2 (en) * | 2015-05-18 | 2018-04-24 | Verizon Digital Media Services Inc. | Unobtrusive and dynamic DDoS mitigation |
| JP6028839B1 (ja) * | 2015-07-16 | 2016-11-24 | 日本電気株式会社 | 通信装置、通信処理方法、プログラム |
| US10791072B2 (en) * | 2015-09-14 | 2020-09-29 | Fujitsu Limited | Generating conversations for behavior encouragement |
| US10664741B2 (en) * | 2016-01-14 | 2020-05-26 | Samsung Electronics Co., Ltd. | Selecting a behavior of a virtual agent |
| JP6232456B2 (ja) * | 2016-02-02 | 2017-11-15 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | 制御装置、緩和システム、制御方法及びコンピュータプログラム |
| US20170242886A1 (en) * | 2016-02-19 | 2017-08-24 | Jack Mobile Inc. | User intent and context based search results |
| US20170277792A1 (en) * | 2016-03-24 | 2017-09-28 | Cyber-Ark Software Ltd. | Adaptive response generation on an endpoint |
| US9812127B1 (en) * | 2016-04-29 | 2017-11-07 | Conduent Business Services, Llc | Reactive learning for efficient dialog tree expansion |
| US11250841B2 (en) * | 2016-06-10 | 2022-02-15 | Conduent Business Services, Llc | Natural language generation, a hybrid sequence-to-sequence approach |
| US10193923B2 (en) * | 2016-07-20 | 2019-01-29 | Duo Security, Inc. | Methods for preventing cyber intrusions and phishing activity |
| US20180054523A1 (en) * | 2016-08-16 | 2018-02-22 | Rulai, Inc. | Method and system for context sensitive intelligent virtual agents |
| US20180075014A1 (en) * | 2016-09-11 | 2018-03-15 | Xiaojiang Duan | Conversational artificial intelligence system and method using advanced language elements |
| US11206248B2 (en) * | 2016-09-23 | 2021-12-21 | Ncr Corporation | Multifactor authentication from messaging systems |
| US20180114527A1 (en) * | 2016-10-25 | 2018-04-26 | IPsoft Incorporated | Methods and systems for virtual agents |
| US10904288B2 (en) * | 2017-04-18 | 2021-01-26 | Perspecta Labs Inc. | Identifying and deceiving adversary nodes and maneuvers for attack deception and mitigation |
| US10762201B2 (en) * | 2017-04-20 | 2020-09-01 | Level Effect LLC | Apparatus and method for conducting endpoint-network-monitoring |
| US10817670B2 (en) * | 2017-05-10 | 2020-10-27 | Oracle International Corporation | Enabling chatbots by validating argumentation |
| US20190068527A1 (en) * | 2017-08-28 | 2019-02-28 | Moveworks, Inc. | Method and system for conducting an automated conversation with a virtual agent system |
| US10673787B2 (en) * | 2017-10-03 | 2020-06-02 | Servicenow, Inc. | Virtual agent conversation service |
| US10574598B2 (en) | 2017-10-18 | 2020-02-25 | International Business Machines Corporation | Cognitive virtual detector |
-
2017
- 2017-10-18 US US15/786,888 patent/US10574598B2/en not_active Expired - Fee Related
-
2018
- 2018-10-10 JP JP2020520029A patent/JP7083559B2/ja active Active
- 2018-10-10 WO PCT/IB2018/057830 patent/WO2019077440A1/en not_active Ceased
- 2018-10-10 CN CN201880067127.1A patent/CN111213161B/zh active Active
- 2018-10-10 GB GB2007194.0A patent/GB2581741A/en not_active Withdrawn
-
2020
- 2020-01-20 US US16/747,007 patent/US11206228B2/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104704797A (zh) * | 2012-08-10 | 2015-06-10 | 纽昂斯通讯公司 | 用于电子设备的虚拟代理通信 |
Non-Patent Citations (2)
| Title |
|---|
| Design and analysis of Decoy Systems for Computer Security;Brian M. Bowen;《Computer Science》;摘要、第1-9章 * |
| Detection and Mitigation of Security Threats in Cloud Computing;Tianwei Zhang;《Princeton University》;第1-7章 * |
Also Published As
| Publication number | Publication date |
|---|---|
| US20200153763A1 (en) | 2020-05-14 |
| CN111213161A (zh) | 2020-05-29 |
| WO2019077440A1 (en) | 2019-04-25 |
| JP2021500645A (ja) | 2021-01-07 |
| US10574598B2 (en) | 2020-02-25 |
| GB202007194D0 (en) | 2020-07-01 |
| US11206228B2 (en) | 2021-12-21 |
| US20190116136A1 (en) | 2019-04-18 |
| JP7083559B2 (ja) | 2022-06-13 |
| GB2581741A (en) | 2020-08-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111213161B (zh) | 认知虚拟检测器 | |
| Mishra et al. | Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis | |
| US10735432B2 (en) | Personalized inferred authentication for virtual assistance | |
| US20220130274A1 (en) | Dynamically Injecting Security Awareness Training Prompts Into Enterprise User Flows | |
| US11720742B2 (en) | Detecting webpages that share malicious content | |
| US8528054B2 (en) | Multi-step challenge-response test | |
| US20100299292A1 (en) | Systems and Methods for Application-Level Security | |
| EP3523743B1 (en) | Detection of compromised devices via user states | |
| CN109983745A (zh) | 使用具有自然语言接口的自动机器人程序来改善安全警报响应和调解的响应时间的安全系统和方法 | |
| US20170076089A1 (en) | Method, system, and device of differentiating among users based on responses to interferences | |
| Shezan et al. | Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems | |
| US11025741B2 (en) | Dynamic cognitive user interface | |
| CA3170593A1 (en) | Detection of phishing websites using machine learning | |
| JP7320462B2 (ja) | アクセス権に基づいてコンピューティングデバイス上でタスクを実行するシステムおよび方法 | |
| Shaqiri | Development and Refinement of a chatbot for Cybersecurity Support | |
| Sharma et al. | Understanding AI in Cybersecurity and Secure AI | |
| Kurian et al. | Relevance of bots in software and their impacts on software security | |
| US12401680B1 (en) | Agentic on-device adaptation for increasing node efficiency by accommodating distribution shifts | |
| de Sousa | XS-Leaks Crutch: Assisted Detection & Exploitation of Cross-Site Leaks | |
| Arya | The Evolution of Phishing Attacks How Machine Learning Keeps Up | |
| US20220269781A1 (en) | Intelligent Friction for Authentication Methods and Systems | |
| Fadheel | On Phishing: Proposing a Host-Based Multi-Layer Passive/Active Anti-phishing Approach Combating Counterfeit Websites | |
| REDDAH et al. | Theme Machine Learning for smartphone security: Android botnet d | |
| Casini et al. | Measuring the Adoption of Device Class Fingerprinting | |
| Weerawardhana | Helping Humans and Agents Avoid Undesirable Consequences with Models of Intervention |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |