ES2877112T3 - Detección de anomalías mejorada - Google Patents

Detección de anomalías mejorada Download PDF

Info

Publication number
ES2877112T3
ES2877112T3 ES18765600T ES18765600T ES2877112T3 ES 2877112 T3 ES2877112 T3 ES 2877112T3 ES 18765600 T ES18765600 T ES 18765600T ES 18765600 T ES18765600 T ES 18765600T ES 2877112 T3 ES2877112 T3 ES 2877112T3
Authority
ES
Spain
Prior art keywords
physical
records
record
values
partition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES18765600T
Other languages
English (en)
Spanish (es)
Inventor
Tomá Matyska
Eugen Stripling
Barak Chizi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KBC Group NV
Original Assignee
KBC Group NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by KBC Group NV filed Critical KBC Group NV
Application granted granted Critical
Publication of ES2877112T3 publication Critical patent/ES2877112T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • G06F16/278Data partitioning, e.g. horizontal or vertical partitioning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Artificial Intelligence (AREA)
  • Medical Informatics (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Physics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Debugging And Monitoring (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
ES18765600T 2017-08-31 2018-08-31 Detección de anomalías mejorada Active ES2877112T3 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP17188880.3A EP3451219A1 (en) 2017-08-31 2017-08-31 Improved anomaly detection
PCT/EP2018/073481 WO2019043163A1 (en) 2017-08-31 2018-08-31 Improved anomaly detection

Publications (1)

Publication Number Publication Date
ES2877112T3 true ES2877112T3 (es) 2021-11-16

Family

ID=59772441

Family Applications (1)

Application Number Title Priority Date Filing Date
ES18765600T Active ES2877112T3 (es) 2017-08-31 2018-08-31 Detección de anomalías mejorada

Country Status (9)

Country Link
US (2) US11194787B2 (enExample)
EP (2) EP3451219A1 (enExample)
JP (1) JP7224339B2 (enExample)
AU (1) AU2018326573B2 (enExample)
CA (1) CA3070309C (enExample)
ES (1) ES2877112T3 (enExample)
HU (1) HUE054547T2 (enExample)
IL (1) IL272764B2 (enExample)
WO (1) WO2019043163A1 (enExample)

Families Citing this family (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12099571B2 (en) * 2018-01-18 2024-09-24 Ge Infrastructure Technology Llc Feature extractions to model large-scale complex control systems
WO2020008339A1 (en) * 2018-07-02 2020-01-09 3M Innovative Properties Company Sensing system and method for monitoring time-dependent processes
US10818386B2 (en) * 2018-11-21 2020-10-27 Enlitic, Inc. Multi-label heat map generating system
CA3125449A1 (en) * 2018-12-31 2020-07-09 Tempus Labs A method and process for predicting and analyzing patient cohort response, progression, and survival
US11875903B2 (en) 2018-12-31 2024-01-16 Tempus Labs, Inc. Method and process for predicting and analyzing patient cohort response, progression, and survival
CN109951554A (zh) * 2019-03-25 2019-06-28 北京理工大学 信息安全技术竞赛实时反作弊方法
US11444964B2 (en) 2019-06-04 2022-09-13 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement for detecting anomalies in network data traffic
CN110458713B (zh) * 2019-07-05 2023-10-13 中国平安人寿保险股份有限公司 模型监控方法、装置、计算机设备及存储介质
WO2021014029A1 (es) * 2019-07-22 2021-01-28 Telefónica Iot & Big Data Tech, S.A. Método para detectar anomalías en comunicaciones de datos
CN110516815B (zh) 2019-08-29 2025-03-07 腾讯科技(深圳)有限公司 人工智能推荐模型的特征处理方法、装置及电子设备
US11271958B2 (en) * 2019-09-20 2022-03-08 International Business Machines Corporation Efficient unsupervised anomaly detection on homomorphically encrypted data
US11755734B2 (en) * 2019-09-30 2023-09-12 Mcafee, Llc Analysis priority of objects from cross-sectional variance
US11475024B2 (en) 2019-10-18 2022-10-18 Splunk Inc. Anomaly and outlier explanation generation for data ingested to a data intake and query system
US11620157B2 (en) 2019-10-18 2023-04-04 Splunk Inc. Data ingestion pipeline anomaly detection
WO2021084286A1 (en) * 2019-10-30 2021-05-06 Citrix Systems, Inc. Root cause analysis in multivariate unsupervised anomaly detection
CN110852860B (zh) * 2019-11-15 2024-11-08 北京优途豪程汽车科技发展有限公司 车辆维修报销行为异常检测方法、设备及存储介质
US11582249B2 (en) 2019-11-27 2023-02-14 Telefonaktiebolaget Lm Ericsson (Publ) Computer-implemented method and arrangement for classifying anomalies
US11556568B2 (en) * 2020-01-29 2023-01-17 Optum Services (Ireland) Limited Apparatuses, methods, and computer program products for data perspective generation and visualization
US11312374B2 (en) * 2020-01-31 2022-04-26 International Business Machines Corporation Prediction of accident risk based on anomaly detection
US11423227B2 (en) * 2020-02-13 2022-08-23 International Business Machines Corporation Weak supervised abnormal entity detection
US11647030B2 (en) * 2020-02-21 2023-05-09 Intuit Inc. Detecting fraud rings in information technology systems
US10826927B1 (en) 2020-03-05 2020-11-03 Fmr Llc Systems and methods for data exfiltration detection
US11179644B2 (en) 2020-03-30 2021-11-23 Electronic Arts Inc. Videogame telemetry data and game asset tracker for session recordings
EP3896543A1 (en) * 2020-04-15 2021-10-20 Siemens Aktiengesellschaft Device for evaluating a classification made for a measured data point
US11446570B2 (en) 2020-05-08 2022-09-20 Electronic Arts Inc. Automated test multiplexing system
US12174689B1 (en) * 2020-05-18 2024-12-24 University Of South Florida System and method for online multivariate anomaly detection and localization
US12066883B2 (en) * 2020-05-19 2024-08-20 Electronic Arts Inc. Glitch detection system
US11620578B2 (en) * 2020-07-08 2023-04-04 Vmware, Inc. Unsupervised anomaly detection via supervised methods
US11475332B2 (en) * 2020-07-12 2022-10-18 International Business Machines Corporation Selecting forecasting models by machine learning based on analysis of model robustness
US11663176B2 (en) 2020-07-31 2023-05-30 Splunk Inc. Data field extraction model training for a data intake and query system
US12205022B2 (en) 2020-07-31 2025-01-21 Splunk Inc. Data field extraction by a data intake and query system
US11704490B2 (en) 2020-07-31 2023-07-18 Splunk Inc. Log sourcetype inference model training for a data intake and query system
CN111951027A (zh) * 2020-08-14 2020-11-17 上海冰鉴信息科技有限公司 具有欺诈风险的企业识别方法及装置
US20220092064A1 (en) * 2020-09-21 2022-03-24 International Business Machines Corporation Sample pair selection in entity matching analysis
WO2022073116A1 (en) * 2020-10-06 2022-04-14 Bank Of Montreal Systems and methods for predicting operational events
US11824877B2 (en) * 2020-11-10 2023-11-21 Armis Security Ltd. System and method for anomaly detection interpretation
US11687438B1 (en) 2021-01-29 2023-06-27 Splunk Inc. Adaptive thresholding of data streamed to a data processing pipeline
US20240185965A1 (en) * 2021-03-31 2024-06-06 Sunovion Pharmaceuticals Inc. Computational Model and Methods for Selecting Clinical Trial Subjects to Reduce Heterogeneity
US20220382833A1 (en) * 2021-05-13 2022-12-01 Airhop Communications, Inc. Methods and apparatus for automatic anomaly detection
US20220374736A1 (en) * 2021-05-21 2022-11-24 Humana Inc. Machine learning platform for optimizing communication resources for communicating with users
US12136484B2 (en) 2021-11-05 2024-11-05 Altis Labs, Inc. Method and apparatus utilizing image-based modeling in healthcare
US20230186075A1 (en) * 2021-12-09 2023-06-15 Nutanix, Inc. Anomaly detection with model hyperparameter selection
US11979421B2 (en) * 2021-12-31 2024-05-07 International Business Machines Corporation Cluster-based outlier scoring of network traffic
US12182255B2 (en) * 2022-01-31 2024-12-31 Walmart Apollo, Llc Systems and methods for automated rule-based detection
CN114661795B (zh) * 2022-03-30 2024-12-31 华北水利水电大学 基于folof算法的运动员离群点解释方法及装置
KR102766355B1 (ko) * 2022-04-22 2025-02-13 한국수력원자력 주식회사 딥러닝 기반의 방사성핵종 이상탐지 방법
US12470593B2 (en) 2022-07-11 2025-11-11 Armis Security Ltd. Malicious lateral movement detection using remote system protocols
EP4310727A1 (en) * 2022-07-20 2024-01-24 Thesee Improved online scoring
US11995068B1 (en) 2023-05-03 2024-05-28 International Business Machines Corporation Anomaly detection of entity behavior
CN116304962B (zh) * 2023-05-25 2023-08-04 湖南东润智能仪表有限公司 一种用于水表计量数据的智能异常监测方法
US12468739B2 (en) * 2023-10-27 2025-11-11 Protegrity Us Holding, Llc Detection of susceptibility of membership inference attacks on synthetic data
WO2025192637A1 (ja) * 2024-03-14 2025-09-18 日本電気株式会社 監視システム
KR102867814B1 (ko) * 2024-03-28 2025-10-13 주식회사 엘지유플러스 이상 탐지를 위한 방법, 이를 위한 기기, 저장매체 및 컴퓨터 프로그램
US20250307844A1 (en) * 2024-04-02 2025-10-02 MediConCen Limited Generative AI Based Medical Insurance Claim Fraud Wastage and Abuse Detection System
CN118426997B (zh) * 2024-06-28 2024-10-18 北京云成金融信息服务有限公司 一种用于异常数据的定位及溯源方法

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6269375B1 (en) * 1998-04-01 2001-07-31 International Business Machines Corporation Rebalancing partitioned data
US6260036B1 (en) * 1998-05-07 2001-07-10 Ibm Scalable parallel algorithm for self-organizing maps with applications to sparse data mining problems
US7380039B2 (en) * 2003-12-30 2008-05-27 3Tera, Inc. Apparatus, method and system for aggregrating computing resources
WO2007098426A2 (en) 2006-02-17 2007-08-30 Test Advantage, Inc. Methods and apparatus for data analysis
JP2012208710A (ja) 2011-03-29 2012-10-25 Panasonic Corp 属性推定装置
US9694286B2 (en) * 2014-02-27 2017-07-04 Mohammad Iman Khabazian Anomaly detection for rules-based system
US9489630B2 (en) * 2014-05-23 2016-11-08 DataRobot, Inc. Systems and techniques for predictive data analytics
US20160379309A1 (en) 2015-06-24 2016-12-29 IGATE Global Solutions Ltd. Insurance Fraud Detection and Prevention System
DE102015114015A1 (de) 2015-08-24 2017-03-02 Carl Zeiss Ag Maschinelles lernen
US10045218B1 (en) * 2016-07-27 2018-08-07 Argyle Data, Inc. Anomaly detection in streaming telephone network data
US10402396B2 (en) * 2016-10-20 2019-09-03 Microsoft Technology Licensing, Llc Online fraud detection system in an electronic content exchange
JP6185206B1 (ja) 2017-05-31 2017-08-23 オーナンバ株式会社 太陽光発電システムの異常または異常の予兆を検出するための方法及び装置
SG11202010731VA (en) * 2018-05-06 2020-11-27 Strong Force Tx Portfolio 2018 Llc Methods and systems for improving machines and systems that automate execution of distributed ledger and other transactions in spot and forward markets for energy, compute, storage and other resources

Also Published As

Publication number Publication date
US20200334228A1 (en) 2020-10-22
EP3451219A1 (en) 2019-03-06
CA3070309C (en) 2024-01-02
IL272764A (en) 2020-04-30
HUE054547T2 (hu) 2021-09-28
JP2020532010A (ja) 2020-11-05
IL272764B2 (en) 2023-05-01
CA3070309A1 (en) 2019-03-07
IL272764B1 (en) 2023-01-01
US11194787B2 (en) 2021-12-07
AU2018326573A1 (en) 2020-02-06
EP3676740B1 (en) 2021-04-14
US11599524B2 (en) 2023-03-07
EP3676740A1 (en) 2020-07-08
US20220050820A1 (en) 2022-02-17
JP7224339B2 (ja) 2023-02-17
WO2019043163A1 (en) 2019-03-07
AU2018326573B2 (en) 2022-12-08

Similar Documents

Publication Publication Date Title
ES2877112T3 (es) Detección de anomalías mejorada
Preston et al. Putting vulnerability to climate change on the map: a review of approaches, benefits, and risks
US10438308B2 (en) Systems and methods for identifying entities using geographical and social mapping
US9412141B2 (en) Systems and methods for identifying entities using geographical and social mapping
Kienberger et al. Spatial-explicit modeling of social vulnerability to malaria in East Africa
US11888886B1 (en) Cyber security risk assessment and cyber security insurance platform
Python et al. A Bayesian approach to modelling subnational spatial dynamics of worldwide non-state terrorism, 2010–2016
Barzani et al. Evaluating the impact of recursive feature elimination on machine learning models for predicting forest fire-prone zones
Nunes et al. Assessing wildfire hazard in the wildland–urban interfaces (WUIs) of Central Portugal
Gibb et al. The anthropogenic fingerprint on emerging infectious diseases
Hamilton et al. Mapping forest burn extent from hyperspatial imagery using machine learning
Saini et al. The power of predictive analytics: forecasting crime trends in high-risk areas for crime prevention using machine learning
Ibrahim et al. Evaluating flood damage to paddy rice fields using PlanetScope and sentinel-1 Data in North-Western Nigeria: towards potential climate adaptation strategies
Salman et al. Cyclone vulnerability assessment of the central coast of Bangladesh: A comprehensive study utilizing FAHP and geospatial techniques
Tong et al. Mapping wildfire ignition probability and predictor sensitivity with ensemble-based machine learning
Tabar et al. WARNER: weakly-supervised neural network to identify eviction filing hotspots in the absence of court records
Douglass et al. Measuring the landscape of civil war: Evaluating geographic coding decisions with historic data from the Mau Mau rebellion
Al Marzooqi The contribution of artificial intelligence (AI) to disaster response and management
Kadar et al. Towards a burglary risk profiler using demographic and spatial factors
Gu et al. Heterogeneous data mining for planning active surveillance of malaria
DeLisle et al. Deep learning visual methods for identifying abandoned houses
Sahle et al. Uncovering Knowledge that Supports Malaria Prevention and Control Intervention Program in Ethiopia.
Abdelaziz et al. Data security in healthcare systems: integration of information security and information management.
Hamida et al. Dengue fever vulnerability prediction using integrated moving average-hierarchical clustering
Drakes Local-scale social vulnerability to multiple hazards