CN111213161B - 认知虚拟检测器 - Google Patents

认知虚拟检测器 Download PDF

Info

Publication number
CN111213161B
CN111213161B CN201880067127.1A CN201880067127A CN111213161B CN 111213161 B CN111213161 B CN 111213161B CN 201880067127 A CN201880067127 A CN 201880067127A CN 111213161 B CN111213161 B CN 111213161B
Authority
CN
China
Prior art keywords
user
virtual agent
response
computer
processors
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880067127.1A
Other languages
English (en)
Chinese (zh)
Other versions
CN111213161A (zh
Inventor
E.杜斯特瓦尔德
G.A.鲍达尔特
D.J.皮奥科夫斯基
J.T.杜比
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CN111213161A publication Critical patent/CN111213161A/zh
Application granted granted Critical
Publication of CN111213161B publication Critical patent/CN111213161B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • G06N20/20Ensemble learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/02User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • G06F9/453Help systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/004Artificial life, i.e. computing arrangements simulating life
    • G06N3/006Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/01Probabilistic graphical models, e.g. probabilistic networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1818Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0681Configuration of triggering conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Artificial Intelligence (AREA)
  • Computer Hardware Design (AREA)
  • Evolutionary Computation (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Probability & Statistics with Applications (AREA)
  • Mathematical Optimization (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Molecular Biology (AREA)
  • Human Computer Interaction (AREA)
  • Computer And Data Communications (AREA)
  • User Interface Of Digital Computer (AREA)
CN201880067127.1A 2017-10-18 2018-10-10 认知虚拟检测器 Active CN111213161B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US15/786,888 2017-10-18
US15/786,888 US10574598B2 (en) 2017-10-18 2017-10-18 Cognitive virtual detector
PCT/IB2018/057830 WO2019077440A1 (en) 2017-10-18 2018-10-10 VIRTUAL COGNITIVE DETECTOR

Publications (2)

Publication Number Publication Date
CN111213161A CN111213161A (zh) 2020-05-29
CN111213161B true CN111213161B (zh) 2023-11-10

Family

ID=66096155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880067127.1A Active CN111213161B (zh) 2017-10-18 2018-10-10 认知虚拟检测器

Country Status (5)

Country Link
US (2) US10574598B2 (enExample)
JP (1) JP7083559B2 (enExample)
CN (1) CN111213161B (enExample)
GB (1) GB2581741A (enExample)
WO (1) WO2019077440A1 (enExample)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11024085B2 (en) * 2016-07-09 2021-06-01 Doubleme, Inc. Electronic system and method for three-dimensional mixed-reality space and experience construction and sharing
US10574598B2 (en) 2017-10-18 2020-02-25 International Business Machines Corporation Cognitive virtual detector
US10423873B2 (en) * 2017-12-01 2019-09-24 International Business Machines Corporation Information flow analysis for conversational agents
US10521462B2 (en) * 2018-02-27 2019-12-31 Accenture Global Solutions Limited Virtual services rapid deployment tool
US11429725B1 (en) * 2018-04-26 2022-08-30 Citicorp Credit Services, Inc. (Usa) Automated security risk assessment systems and methods
CN108897848A (zh) * 2018-06-28 2018-11-27 北京百度网讯科技有限公司 机器人互动方法、装置及设备
US10893072B2 (en) * 2018-08-17 2021-01-12 Paypal, Inc. Using cloned accounts to track attacks on user accounts
US11182557B2 (en) * 2018-11-05 2021-11-23 International Business Machines Corporation Driving intent expansion via anomaly detection in a modular conversational system
EP3906508B1 (en) * 2018-12-31 2024-03-13 Intel Corporation Securing systems employing artificial intelligence
US11368470B2 (en) * 2019-06-13 2022-06-21 International Business Machines Corporation Real-time alert reasoning and priority-based campaign discovery
CA3085098A1 (en) * 2019-06-27 2020-12-27 Royal Bank Of Canada Image recognition reverse tuning test system
US10896664B1 (en) * 2019-10-14 2021-01-19 International Business Machines Corporation Providing adversarial protection of speech in audio signals
US11386226B2 (en) 2019-10-21 2022-07-12 International Business Machines Corporation Preventing leakage of selected information in public channels
JP7349404B2 (ja) * 2020-04-27 2023-09-22 Kddi株式会社 判定装置、判定方法及び判定プログラム
CN113411299B (zh) * 2020-08-25 2023-01-10 中数数字工程(深圳)有限公司 基于大数据的终端设备虚拟代理系统
CN111818096B (zh) * 2020-08-31 2020-12-22 北京安帝科技有限公司 网络协议解析方法和装置
US12499313B2 (en) * 2021-01-21 2025-12-16 Servicenow, Inc. Ensemble scoring system for a natural language understanding (NLU) framework
CN113468264B (zh) * 2021-05-20 2024-02-20 杭州趣链科技有限公司 一种基于区块链的中毒防御和中毒溯源的联邦学习方法和装置
US11947694B2 (en) 2021-06-29 2024-04-02 International Business Machines Corporation Dynamic virtual honeypot utilizing honey tokens and data masking
US12321428B2 (en) * 2021-07-08 2025-06-03 Nippon Telegraph And Telephone Corporation User authentication device, user authentication method, and user authentication computer program
CN113656271B (zh) * 2021-08-10 2024-06-07 上海浦东发展银行股份有限公司 用户异常行为的处理方法、装置、设备及存储介质
US11558506B1 (en) * 2021-09-27 2023-01-17 Nice Ltd. Analysis and matching of voice signals
US20230147451A1 (en) * 2021-11-08 2023-05-11 Intelepeer Methods and systems for generating a virtual graph of multi channel communications
US12284211B2 (en) * 2023-02-02 2025-04-22 Advanced Security Technologies Asia Pte. Ltd. Cyber clone of a computing entity
US20250330481A1 (en) * 2023-09-29 2025-10-23 F5, Inc. Methods for security control and devices thereof
US12028359B1 (en) * 2023-10-25 2024-07-02 Coalition, Inc. Method of ranking and address network threats

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104704797A (zh) * 2012-08-10 2015-06-10 纽昂斯通讯公司 用于电子设备的虚拟代理通信

Family Cites Families (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3734206B2 (ja) * 1998-05-01 2006-01-11 インターナショナル・ビジネス・マシーンズ・コーポレーション エージェント対話管理方法、コンピュータ及び記憶媒体
US7136860B2 (en) * 2000-02-14 2006-11-14 Overture Services, Inc. System and method to determine the validity of an interaction on a network
US8566102B1 (en) * 2002-03-28 2013-10-22 At&T Intellectual Property Ii, L.P. System and method of automating a spoken dialogue service
US20050149630A1 (en) 2003-06-27 2005-07-07 Brent Smolinski Context sensitive transfer with active listening and active alerts
US20070299915A1 (en) * 2004-05-02 2007-12-27 Markmonitor, Inc. Customer-based detection of online fraud
US7444379B2 (en) 2004-06-30 2008-10-28 International Business Machines Corporation Method for automatically setting chat status based on user activity in local environment
US8145708B2 (en) 2006-11-10 2012-03-27 Microsoft Corporation On-line virtual robot (bot) security agent
US7716247B2 (en) 2006-12-18 2010-05-11 Microsoft Corporation Multi-protocol access to files and directories
US8630961B2 (en) * 2009-01-08 2014-01-14 Mycybertwin Group Pty Ltd Chatbots
US8260465B2 (en) 2009-07-17 2012-09-04 Rain Bird Corporation Data communication in a multi-wire irrigation control system
CA2675664A1 (en) * 2009-08-28 2009-11-05 Ibm Canada Limited - Ibm Canada Limitee Escalation of user identity and validation requirements to counter a threat
US8279779B2 (en) * 2009-12-10 2012-10-02 Verizon Patent And Licensing Inc. Method and system for virtual agent session monitoring and barge-in
US20130031042A1 (en) 2011-07-27 2013-01-31 Sintayehu Dehnie Distributed assured network system (DANS)
US8881289B2 (en) * 2011-10-18 2014-11-04 Mcafee, Inc. User behavioral risk assessment
CN104411234B (zh) * 2012-05-02 2017-08-22 赛佛欧普手术有限公司 用于电生理诱发电位的表征和分类的系统、方法及计算机算法
CN104885427B (zh) * 2012-12-06 2018-03-30 波音公司 用于威胁检测的情景感知型网络安全监控
US20140164532A1 (en) * 2012-12-11 2014-06-12 Nuance Communications, Inc. Systems and methods for virtual agent participation in multiparty conversation
US9137687B2 (en) 2013-09-06 2015-09-15 Qualcomm Incorporated Pipelining registration and conflict detection in dual-SIM-dual-active communication device coexistence
US9189742B2 (en) * 2013-11-20 2015-11-17 Justin London Adaptive virtual intelligent agent
WO2016035083A2 (en) * 2014-09-06 2016-03-10 Andriani Matthew Non-disruptive ddos testing
US20160071517A1 (en) * 2014-09-09 2016-03-10 Next It Corporation Evaluating Conversation Data based on Risk Factors
IL235423A0 (en) * 2014-10-30 2015-01-29 Ironscales Ltd Method and system for mitigating targeted phishing attacks
EP3215945B1 (en) * 2014-11-03 2018-09-19 Vectra Networks, Inc. A system for detecting threats using scenario-based tracking of internal and external network traffic
US9954891B2 (en) * 2015-05-18 2018-04-24 Verizon Digital Media Services Inc. Unobtrusive and dynamic DDoS mitigation
JP6028839B1 (ja) * 2015-07-16 2016-11-24 日本電気株式会社 通信装置、通信処理方法、プログラム
US10791072B2 (en) * 2015-09-14 2020-09-29 Fujitsu Limited Generating conversations for behavior encouragement
US10664741B2 (en) * 2016-01-14 2020-05-26 Samsung Electronics Co., Ltd. Selecting a behavior of a virtual agent
JP6232456B2 (ja) * 2016-02-02 2017-11-15 エヌ・ティ・ティ・コミュニケーションズ株式会社 制御装置、緩和システム、制御方法及びコンピュータプログラム
US20170242886A1 (en) * 2016-02-19 2017-08-24 Jack Mobile Inc. User intent and context based search results
US20170277792A1 (en) * 2016-03-24 2017-09-28 Cyber-Ark Software Ltd. Adaptive response generation on an endpoint
US9812127B1 (en) * 2016-04-29 2017-11-07 Conduent Business Services, Llc Reactive learning for efficient dialog tree expansion
US11250841B2 (en) * 2016-06-10 2022-02-15 Conduent Business Services, Llc Natural language generation, a hybrid sequence-to-sequence approach
US10193923B2 (en) * 2016-07-20 2019-01-29 Duo Security, Inc. Methods for preventing cyber intrusions and phishing activity
US20180054523A1 (en) * 2016-08-16 2018-02-22 Rulai, Inc. Method and system for context sensitive intelligent virtual agents
US20180075014A1 (en) * 2016-09-11 2018-03-15 Xiaojiang Duan Conversational artificial intelligence system and method using advanced language elements
US11206248B2 (en) * 2016-09-23 2021-12-21 Ncr Corporation Multifactor authentication from messaging systems
US20180114527A1 (en) * 2016-10-25 2018-04-26 IPsoft Incorporated Methods and systems for virtual agents
US10904288B2 (en) * 2017-04-18 2021-01-26 Perspecta Labs Inc. Identifying and deceiving adversary nodes and maneuvers for attack deception and mitigation
US10762201B2 (en) * 2017-04-20 2020-09-01 Level Effect LLC Apparatus and method for conducting endpoint-network-monitoring
US10817670B2 (en) * 2017-05-10 2020-10-27 Oracle International Corporation Enabling chatbots by validating argumentation
US20190068527A1 (en) * 2017-08-28 2019-02-28 Moveworks, Inc. Method and system for conducting an automated conversation with a virtual agent system
US10673787B2 (en) * 2017-10-03 2020-06-02 Servicenow, Inc. Virtual agent conversation service
US10574598B2 (en) 2017-10-18 2020-02-25 International Business Machines Corporation Cognitive virtual detector

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104704797A (zh) * 2012-08-10 2015-06-10 纽昂斯通讯公司 用于电子设备的虚拟代理通信

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Design and analysis of Decoy Systems for Computer Security;Brian M. Bowen;《Computer Science》;摘要、第1-9章 *
Detection and Mitigation of Security Threats in Cloud Computing;Tianwei Zhang;《Princeton University》;第1-7章 *

Also Published As

Publication number Publication date
US20200153763A1 (en) 2020-05-14
CN111213161A (zh) 2020-05-29
WO2019077440A1 (en) 2019-04-25
JP2021500645A (ja) 2021-01-07
US10574598B2 (en) 2020-02-25
GB202007194D0 (en) 2020-07-01
US11206228B2 (en) 2021-12-21
US20190116136A1 (en) 2019-04-18
JP7083559B2 (ja) 2022-06-13
GB2581741A (en) 2020-08-26

Similar Documents

Publication Publication Date Title
CN111213161B (zh) 认知虚拟检测器
Mishra et al. Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis
US10735432B2 (en) Personalized inferred authentication for virtual assistance
US20220130274A1 (en) Dynamically Injecting Security Awareness Training Prompts Into Enterprise User Flows
US11720742B2 (en) Detecting webpages that share malicious content
US8528054B2 (en) Multi-step challenge-response test
US20100299292A1 (en) Systems and Methods for Application-Level Security
EP3523743B1 (en) Detection of compromised devices via user states
CN109983745A (zh) 使用具有自然语言接口的自动机器人程序来改善安全警报响应和调解的响应时间的安全系统和方法
US20170076089A1 (en) Method, system, and device of differentiating among users based on responses to interferences
Shezan et al. Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems
US11025741B2 (en) Dynamic cognitive user interface
CA3170593A1 (en) Detection of phishing websites using machine learning
JP7320462B2 (ja) アクセス権に基づいてコンピューティングデバイス上でタスクを実行するシステムおよび方法
Shaqiri Development and Refinement of a chatbot for Cybersecurity Support
Sharma et al. Understanding AI in Cybersecurity and Secure AI
Kurian et al. Relevance of bots in software and their impacts on software security
US12401680B1 (en) Agentic on-device adaptation for increasing node efficiency by accommodating distribution shifts
de Sousa XS-Leaks Crutch: Assisted Detection & Exploitation of Cross-Site Leaks
Arya The Evolution of Phishing Attacks How Machine Learning Keeps Up
US20220269781A1 (en) Intelligent Friction for Authentication Methods and Systems
Fadheel On Phishing: Proposing a Host-Based Multi-Layer Passive/Active Anti-phishing Approach Combating Counterfeit Websites
REDDAH et al. Theme Machine Learning for smartphone security: Android botnet d
Casini et al. Measuring the Adoption of Device Class Fingerprinting
Weerawardhana Helping Humans and Agents Avoid Undesirable Consequences with Models of Intervention

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant