JP7035096B2 - コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 - Google Patents
コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 Download PDFInfo
- Publication number
- JP7035096B2 JP7035096B2 JP2019570846A JP2019570846A JP7035096B2 JP 7035096 B2 JP7035096 B2 JP 7035096B2 JP 2019570846 A JP2019570846 A JP 2019570846A JP 2019570846 A JP2019570846 A JP 2019570846A JP 7035096 B2 JP7035096 B2 JP 7035096B2
- Authority
- JP
- Japan
- Prior art keywords
- user
- users
- service
- actions
- cloud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2022031870A JP7279227B2 (ja) | 2017-06-22 | 2022-03-02 | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 |
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201762523668P | 2017-06-22 | 2017-06-22 | |
| US62/523,668 | 2017-06-22 | ||
| US16/011,538 US10701094B2 (en) | 2017-06-22 | 2018-06-18 | Techniques for monitoring privileged users and detecting anomalous activities in a computing environment |
| US16/011,538 | 2018-06-18 | ||
| PCT/US2018/038347 WO2018236915A1 (en) | 2017-06-22 | 2018-06-19 | Techniques for monitoring privileged users and detecting anomalous activities in a computing environment |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2022031870A Division JP7279227B2 (ja) | 2017-06-22 | 2022-03-02 | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2020524855A JP2020524855A (ja) | 2020-08-20 |
| JP2020524855A5 JP2020524855A5 (enExample) | 2021-05-13 |
| JP7035096B2 true JP7035096B2 (ja) | 2022-03-14 |
Family
ID=64692857
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2019570846A Active JP7035096B2 (ja) | 2017-06-22 | 2018-06-19 | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 |
| JP2022031870A Active JP7279227B2 (ja) | 2017-06-22 | 2022-03-02 | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 |
| JP2023077773A Active JP7523630B2 (ja) | 2017-06-22 | 2023-05-10 | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 |
Family Applications After (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2022031870A Active JP7279227B2 (ja) | 2017-06-22 | 2022-03-02 | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 |
| JP2023077773A Active JP7523630B2 (ja) | 2017-06-22 | 2023-05-10 | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 |
Country Status (5)
| Country | Link |
|---|---|
| US (3) | US10701094B2 (enExample) |
| EP (1) | EP3643033B1 (enExample) |
| JP (3) | JP7035096B2 (enExample) |
| CN (2) | CN110999250B (enExample) |
| WO (1) | WO2018236915A1 (enExample) |
Families Citing this family (194)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10356080B2 (en) * | 2017-03-17 | 2019-07-16 | Verizon Patent And Licensing Inc. | System and method for centralized authentication and authorization for cloud platform with multiple deployments |
| US10999296B2 (en) * | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Generating adaptive trust profiles using information derived from similarly situated organizations |
| US11005864B2 (en) | 2017-05-19 | 2021-05-11 | Salesforce.Com, Inc. | Feature-agnostic behavior profile based anomaly detection |
| US10701094B2 (en) | 2017-06-22 | 2020-06-30 | Oracle International Corporation | Techniques for monitoring privileged users and detecting anomalous activities in a computing environment |
| US10764295B2 (en) * | 2017-08-08 | 2020-09-01 | International Business Machines Corporation | Monitoring service policy management |
| US10313413B2 (en) * | 2017-08-28 | 2019-06-04 | Banjo, Inc. | Detecting events from ingested communication signals |
| US10911308B2 (en) * | 2017-09-18 | 2021-02-02 | Rapyuta Robotics Co., Ltd. | Auto-determining and installing missing components to a to-be-managed device by a single execution of unique device setup command |
| US10999325B1 (en) * | 2017-10-20 | 2021-05-04 | Skyhigh Networks, Llc | Cloud security system implementing service action categorization |
| US11973784B1 (en) | 2017-11-27 | 2024-04-30 | Lacework, Inc. | Natural language interface for an anomaly detection framework |
| US12058160B1 (en) | 2017-11-22 | 2024-08-06 | Lacework, Inc. | Generating computer code for remediating detected events |
| US11785104B2 (en) | 2017-11-27 | 2023-10-10 | Lacework, Inc. | Learning from similar cloud deployments |
| US11894984B2 (en) * | 2017-11-27 | 2024-02-06 | Lacework, Inc. | Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments |
| US11770398B1 (en) | 2017-11-27 | 2023-09-26 | Lacework, Inc. | Guided anomaly detection framework |
| US12489771B1 (en) | 2017-11-27 | 2025-12-02 | Fortinet, Inc. | Detecting anomalous behavior of nodes in a hierarchical cloud deployment |
| US12355793B1 (en) | 2017-11-27 | 2025-07-08 | Fortinet, Inc. | Guided interactions with a natural language interface |
| US12348545B1 (en) | 2017-11-27 | 2025-07-01 | Fortinet, Inc. | Customizable generative artificial intelligence (‘AI’) assistant |
| US12323449B1 (en) | 2017-11-27 | 2025-06-03 | Fortinet, Inc. | Code analysis feedback loop for code created using generative artificial intelligence (‘AI’) |
| US12470577B1 (en) | 2017-11-27 | 2025-11-11 | Fortinet, Inc. | Kernel-based monitoring of container activity in a compute environment |
| US12470578B1 (en) | 2017-11-27 | 2025-11-11 | Fortinet, Inc. | Containerized agent for monitoring container activity in a compute environment |
| US12267345B1 (en) | 2017-11-27 | 2025-04-01 | Fortinet, Inc. | Using user feedback for attack path analysis in an anomaly detection framework |
| US11818156B1 (en) | 2017-11-27 | 2023-11-14 | Lacework, Inc. | Data lake-enabled security platform |
| US12284197B1 (en) | 2017-11-27 | 2025-04-22 | Fortinet, Inc. | Reducing amounts of data ingested into a data warehouse |
| US12126643B1 (en) | 2017-11-27 | 2024-10-22 | Fortinet, Inc. | Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment |
| US12418555B1 (en) | 2017-11-27 | 2025-09-16 | Fortinet Inc. | Guiding query creation for a generative artificial intelligence (AI)-enabled assistant |
| US12309185B1 (en) | 2017-11-27 | 2025-05-20 | Fortinet, Inc. | Architecture for a generative artificial intelligence (AI)-enabled assistant |
| US12495052B1 (en) | 2017-11-27 | 2025-12-09 | Fortinet, Inc. | Detecting package execution for threat assessments |
| US10715458B1 (en) * | 2017-12-08 | 2020-07-14 | Amazon Technologies, Inc. | Organization level identity management |
| US11075946B2 (en) * | 2017-12-19 | 2021-07-27 | T-Mobile Usa, Inc. | Honeypot adaptive security system |
| US11075935B2 (en) * | 2017-12-22 | 2021-07-27 | Kpmg Llp | System and method for identifying cybersecurity threats |
| US10762103B2 (en) | 2017-12-27 | 2020-09-01 | Paypal, Inc. | Calculating representative location information for network addresses |
| US10805305B2 (en) * | 2018-02-07 | 2020-10-13 | Apatics, Inc. | Detection of operational threats using artificial intelligence |
| US12184508B2 (en) | 2018-02-07 | 2024-12-31 | 4L Data Intelligence, Inc. | Detection of operational threats using artificial intelligence |
| US12463985B2 (en) | 2018-02-20 | 2025-11-04 | Darktrace Holdings Limited | Endpoint agent client sensors (cSENSORS) and associated infrastructures for extending network visibility in an artificial intelligence (AI) threat defense environment |
| US11277421B2 (en) * | 2018-02-20 | 2022-03-15 | Citrix Systems, Inc. | Systems and methods for detecting and thwarting attacks on an IT environment |
| US10733329B1 (en) * | 2018-04-20 | 2020-08-04 | Automation Anywhere, Inc. | Robotic process automation system and method with secure credential vault |
| CN109861953B (zh) * | 2018-05-14 | 2020-08-21 | 新华三信息安全技术有限公司 | 一种异常用户识别方法及装置 |
| US11528287B2 (en) | 2018-06-06 | 2022-12-13 | Reliaquest Holdings, Llc | Threat mitigation system and method |
| US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
| US11438357B2 (en) | 2018-06-22 | 2022-09-06 | Senseon Tech Ltd | Endpoint network sensor and related cybersecurity infrastructure |
| GB201810294D0 (en) | 2018-06-22 | 2018-08-08 | Senseon Tech Ltd | Cybe defence system |
| GB2602254B (en) | 2020-12-15 | 2023-04-05 | Senseon Tech Ltd | Network traffic monitoring |
| US11271801B2 (en) * | 2018-06-27 | 2022-03-08 | T-Mobile Usa, Inc. | Compromised network node detection system |
| US10917439B2 (en) * | 2018-07-16 | 2021-02-09 | Securityadvisor Technologies, Inc. | Contextual security behavior management and change execution |
| US10796019B2 (en) * | 2018-07-17 | 2020-10-06 | Dell Products L.P. | Detecting personally identifiable information (PII) in telemetry data |
| US11362910B2 (en) * | 2018-07-17 | 2022-06-14 | International Business Machines Corporation | Distributed machine learning for anomaly detection |
| GB201812171D0 (en) | 2018-07-26 | 2018-09-12 | Senseon Tech Ltd | Cyber defence system |
| JP6669954B2 (ja) * | 2018-08-14 | 2020-03-18 | デジタルア−ツ株式会社 | 情報処理装置、情報処理方法、及び情報処理プログラム |
| US10956595B2 (en) * | 2018-08-16 | 2021-03-23 | Super Auth, Inc. | User access management from anywhere and prevent intruders by notifying the users after a predetermined time interval |
| US11310276B2 (en) * | 2018-09-17 | 2022-04-19 | International Business Machines Corporation | Adjusting resiliency policies for cloud services based on a resiliency score |
| CA3055993C (en) * | 2018-09-20 | 2024-01-02 | Idera, Inc. | Database access, monitoring, and control system and method for reacting to suspicious database activities |
| US10728307B2 (en) * | 2018-10-08 | 2020-07-28 | Sonrai Security Inc. | Cloud intelligence data model and framework |
| US11258827B2 (en) * | 2018-10-19 | 2022-02-22 | Oracle International Corporation | Autonomous monitoring of applications in a cloud environment |
| US10681056B1 (en) | 2018-11-27 | 2020-06-09 | Sailpoint Technologies, Inc. | System and method for outlier and anomaly detection in identity management artificial intelligence systems using cluster based analysis of network identity graphs |
| US10341430B1 (en) | 2018-11-27 | 2019-07-02 | Sailpoint Technologies, Inc. | System and method for peer group detection, visualization and analysis in identity management artificial intelligence systems using cluster based analysis of network identity graphs |
| US11178169B2 (en) | 2018-12-27 | 2021-11-16 | Paypal, Inc. | Predicting online electronic attacks based on other attacks |
| US11487873B2 (en) * | 2019-01-22 | 2022-11-01 | EMC IP Holding Company LLC | Risk score generation utilizing monitored behavior and predicted impact of compromise |
| US11416641B2 (en) * | 2019-01-24 | 2022-08-16 | Netskope, Inc. | Incident-driven introspection for data loss prevention |
| US11074341B2 (en) | 2019-02-10 | 2021-07-27 | Microsoft Technology Licensing, Llc | Dynamic cybersecurity peer identification using groups |
| US10523682B1 (en) | 2019-02-26 | 2019-12-31 | Sailpoint Technologies, Inc. | System and method for intelligent agents for decision support in network identity graph based identity management artificial intelligence systems |
| US10554665B1 (en) | 2019-02-28 | 2020-02-04 | Sailpoint Technologies, Inc. | System and method for role mining in identity management artificial intelligence systems using cluster based analysis of network identity graphs |
| US12289321B2 (en) * | 2019-03-04 | 2025-04-29 | Microsoft Technology Licensing, Llc | Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform |
| US11409842B2 (en) * | 2019-03-04 | 2022-08-09 | Third Iron, LLC | Systems and methods for providing a digital content item to an authorized user |
| CN111767533B (zh) * | 2019-04-01 | 2025-01-07 | 富泰华工业(深圳)有限公司 | 离线模式用户授权方法、装置、电子装置及存储介质 |
| US10992706B2 (en) | 2019-04-30 | 2021-04-27 | Netiq Corporation | Detection of cyber attacks from high-frequency hashed incorrect passwords |
| US11245702B2 (en) | 2019-05-08 | 2022-02-08 | Red Hat, Inc. | Security vulnerability assessment for users of a cloud computing environment |
| US11290495B2 (en) * | 2019-06-20 | 2022-03-29 | Servicenow, Inc. | Solution management systems and methods for addressing cybersecurity vulnerabilities |
| US11562170B2 (en) * | 2019-07-15 | 2023-01-24 | Microsoft Technology Licensing, Llc | Modeling higher-level metrics from graph data derived from already-collected but not yet connected data |
| US11709855B2 (en) | 2019-07-15 | 2023-07-25 | Microsoft Technology Licensing, Llc | Graph embedding already-collected but not yet connected data |
| US10581851B1 (en) * | 2019-07-17 | 2020-03-03 | Capital One Services, Llc | Change monitoring and detection for a cloud computing environment |
| US11496492B2 (en) * | 2019-08-14 | 2022-11-08 | Hewlett Packard Enterprise Development Lp | Managing false positives in a network anomaly detection system |
| US11388175B2 (en) | 2019-09-05 | 2022-07-12 | Cisco Technology, Inc. | Threat detection of application traffic flows |
| US10798100B1 (en) * | 2019-09-12 | 2020-10-06 | Snowflake Inc. | Managing membership in a private data exchange |
| US11334604B2 (en) | 2019-09-12 | 2022-05-17 | Snowflake Inc. | Private data exchange |
| GB201915265D0 (en) | 2019-10-22 | 2019-12-04 | Senseon Tech Ltd | Anomaly detection |
| US12088473B2 (en) | 2019-10-23 | 2024-09-10 | Aryaka Networks, Inc. | Method, device and system for enhancing predictive classification of anomalous events in a cloud-based application acceleration as a service environment |
| US12047373B2 (en) * | 2019-11-05 | 2024-07-23 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
| US11676218B2 (en) * | 2019-11-05 | 2023-06-13 | International Business Machines Corporation | Intelligent agent to simulate customer data |
| US11461793B2 (en) | 2019-11-05 | 2022-10-04 | International Business Machines Corporation | Identification of behavioral pattern of simulated transaction data |
| US11461728B2 (en) | 2019-11-05 | 2022-10-04 | International Business Machines Corporation | System and method for unsupervised abstraction of sensitive data for consortium sharing |
| US12056720B2 (en) | 2019-11-05 | 2024-08-06 | International Business Machines Corporation | System and method for unsupervised abstraction of sensitive data for detection model sharing across entities |
| US11842357B2 (en) | 2019-11-05 | 2023-12-12 | International Business Machines Corporation | Intelligent agent to simulate customer data |
| US11599884B2 (en) | 2019-11-05 | 2023-03-07 | International Business Machines Corporation | Identification of behavioral pattern of simulated transaction data |
| US11556734B2 (en) | 2019-11-05 | 2023-01-17 | International Business Machines Corporation | System and method for unsupervised abstraction of sensitive data for realistic modeling |
| US11475467B2 (en) | 2019-11-05 | 2022-10-18 | International Business Machines Corporation | System and method for unsupervised abstraction of sensitive data for realistic modeling |
| US11475468B2 (en) | 2019-11-05 | 2022-10-18 | International Business Machines Corporation | System and method for unsupervised abstraction of sensitive data for detection model sharing across entities |
| US11488172B2 (en) | 2019-11-05 | 2022-11-01 | International Business Machines Corporation | Intelligent agent to simulate financial transactions |
| US11488185B2 (en) | 2019-11-05 | 2022-11-01 | International Business Machines Corporation | System and method for unsupervised abstraction of sensitive data for consortium sharing |
| US11606262B2 (en) * | 2019-11-08 | 2023-03-14 | International Business Machines Corporation | Management of a computing system with multiple domains |
| US11416771B2 (en) * | 2019-11-11 | 2022-08-16 | International Business Machines Corporation | Self-learning peer group analysis for optimizing identity and access management environments |
| US11611576B2 (en) * | 2019-12-11 | 2023-03-21 | GE Precision Healthcare LLC | Methods and systems for securing an imaging system |
| US11321446B2 (en) * | 2019-12-16 | 2022-05-03 | Dell Products L.P. | System and method to ensure secure and automatic synchronization of credentials across devices |
| US10877867B1 (en) | 2019-12-17 | 2020-12-29 | CloudFit Software, LLC | Monitoring user experience for cloud-based services |
| US11012326B1 (en) * | 2019-12-17 | 2021-05-18 | CloudFit Software, LLC | Monitoring user experience using data blocks for secure data access |
| US11481304B1 (en) * | 2019-12-22 | 2022-10-25 | Automation Anywhere, Inc. | User action generated process discovery |
| US11838300B1 (en) * | 2019-12-24 | 2023-12-05 | Musarubra Us Llc | Run-time configurable cybersecurity system |
| US20210200955A1 (en) * | 2019-12-31 | 2021-07-01 | Paypal, Inc. | Sentiment analysis for fraud detection |
| US11799889B2 (en) * | 2019-12-31 | 2023-10-24 | Intuit, Inc. | Web service usage anomaly detection and prevention |
| US11770374B1 (en) | 2019-12-31 | 2023-09-26 | Cigna Intellectual Property, Inc. | Computer user credentialing and verification system |
| US11436149B2 (en) | 2020-01-19 | 2022-09-06 | Microsoft Technology Licensing, Llc | Caching optimization with accessor clustering |
| WO2021148145A1 (en) * | 2020-01-20 | 2021-07-29 | Atos Information Technology GmbH | Method for intrusion detection to detect malicious insider threat activities and system for intrusion detection |
| US11637910B2 (en) * | 2020-08-20 | 2023-04-25 | Zscaler, Inc. | Cloud access security broker systems and methods with an in-memory data store |
| WO2021165933A1 (en) * | 2020-02-20 | 2021-08-26 | Celestya Ltd. | Method and system for online user behavior management |
| US11575677B2 (en) * | 2020-02-24 | 2023-02-07 | Fmr Llc | Enterprise access control governance in a computerized information technology (IT) architecture |
| US20210273961A1 (en) * | 2020-02-28 | 2021-09-02 | Darktrace Limited | Apparatus and method for a cyber-threat defense system |
| CN111488594B (zh) * | 2020-03-03 | 2023-11-03 | 杭州未名信科科技有限公司 | 一种基于云服务器的权限检查方法、装置、存储介质及终端 |
| US11222134B2 (en) | 2020-03-04 | 2022-01-11 | Sotero, Inc. | System and methods for data encryption and application-agnostic querying of encrypted data |
| US11461677B2 (en) | 2020-03-10 | 2022-10-04 | Sailpoint Technologies, Inc. | Systems and methods for data correlation and artifact matching in identity management artificial intelligence systems |
| US11425155B2 (en) * | 2020-03-12 | 2022-08-23 | The Aerospace Corporation | Monitoring the integrity of a space vehicle |
| US11689550B2 (en) * | 2020-03-13 | 2023-06-27 | Mcafee, Llc | Methods and apparatus to analyze network traffic for malicious activity |
| TWI758705B (zh) * | 2020-03-30 | 2022-03-21 | 台北富邦商業銀行股份有限公司 | 智能防駭特權治理系統 |
| US11438364B2 (en) * | 2020-04-30 | 2022-09-06 | Bank Of America Corporation | Threat analysis for information security |
| CN111562930A (zh) * | 2020-04-30 | 2020-08-21 | 深圳壹账通智能科技有限公司 | web应用安全的升级方法与系统 |
| AU2021275768A1 (en) * | 2020-05-18 | 2022-12-22 | Darktrace Holdings Limited | Cyber security for instant messaging across platforms |
| US11030565B1 (en) * | 2020-05-18 | 2021-06-08 | Grant Thornton Llp | System and method for audit report generation from structured data |
| JP7413924B2 (ja) * | 2020-05-25 | 2024-01-16 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置及び情報処理プログラム |
| US10862928B1 (en) | 2020-06-12 | 2020-12-08 | Sailpoint Technologies, Inc. | System and method for role validation in identity management artificial intelligence systems using analysis of network identity graphs |
| US20210392146A1 (en) * | 2020-06-16 | 2021-12-16 | Zscaler, Inc. | Machine Learning-based user and entity behavior analysis for network security |
| US20210397903A1 (en) * | 2020-06-18 | 2021-12-23 | Zoho Corporation Private Limited | Machine learning powered user and entity behavior analysis |
| CN111786980A (zh) * | 2020-06-24 | 2020-10-16 | 广州海颐信息安全技术有限公司 | 基于行为的特权账户威胁告警方法 |
| CA3177396A1 (en) * | 2020-06-29 | 2022-01-06 | Prabhu PALANISAMY | Temporary cloud provider credentials via secure discovery framework |
| AU2021299262A1 (en) | 2020-06-29 | 2023-01-05 | Illumina, Inc. | Policy-based genomic data sharing for software-as-a-service tenants |
| CN111967011B (zh) * | 2020-07-10 | 2022-10-14 | 电子科技大学 | 一种基于可解释的内部威胁评估方法 |
| CN112231336B (zh) * | 2020-07-17 | 2023-07-25 | 北京百度网讯科技有限公司 | 识别用户的方法、装置、存储介质及电子设备 |
| US11722510B2 (en) * | 2020-08-10 | 2023-08-08 | Bank Of America Corporation | Monitoring and preventing remote user automated cyber attacks |
| US11979473B2 (en) | 2020-08-20 | 2024-05-07 | Zscaler, Inc. | Cloud access security broker systems and methods with an in-memory data store |
| US10938828B1 (en) | 2020-09-17 | 2021-03-02 | Sailpoint Technologies, Inc. | System and method for predictive platforms in identity management artificial intelligence systems using analysis of network identity graphs |
| US11645391B2 (en) | 2020-10-09 | 2023-05-09 | Saudi Arabian Oil Company | Protecting computer systems against malicious software stored on removeable data storage devices |
| CN112306835B (zh) * | 2020-11-02 | 2024-05-28 | 平安科技(深圳)有限公司 | 用户数据监控分析方法、装置、设备及介质 |
| US11196775B1 (en) | 2020-11-23 | 2021-12-07 | Sailpoint Technologies, Inc. | System and method for predictive modeling for entitlement diffusion and role evolution in identity management artificial intelligence systems using network identity graphs |
| WO2022113348A1 (ja) * | 2020-11-30 | 2022-06-02 | 三菱電機株式会社 | 開発側セキュリティ分析支援装置、運用側セキュリティ分析支援装置、およびセキュリティ分析支援システム |
| US20230077527A1 (en) * | 2020-12-31 | 2023-03-16 | Ajay Sarkar | Local agent system for obtaining hardware monitoring and risk information utilizing machine learning models |
| US12217206B2 (en) | 2021-01-21 | 2025-02-04 | Omnissa, Llc | User experience scoring and user interface |
| US11487639B2 (en) | 2021-01-21 | 2022-11-01 | Vmware, Inc. | User experience scoring and user interface |
| US20220237097A1 (en) * | 2021-01-22 | 2022-07-28 | Vmware, Inc. | Providing user experience data to tenants |
| US11586526B2 (en) | 2021-01-22 | 2023-02-21 | Vmware, Inc. | Incident workflow interface for application analytics |
| US11777959B2 (en) | 2021-02-12 | 2023-10-03 | Capital One Services, Llc | Digital security violation system |
| US11295241B1 (en) * | 2021-02-19 | 2022-04-05 | Sailpoint Technologies, Inc. | System and method for incremental training of machine learning models in artificial intelligence systems, including incremental training using analysis of network identity graphs |
| US12063305B2 (en) | 2021-02-24 | 2024-08-13 | Shopify Inc. | Methods and apparatus to manage application access in networked environments |
| US11894971B2 (en) | 2021-03-31 | 2024-02-06 | Equifax Inc. | Techniques for prediction models using time series data |
| US11556637B2 (en) | 2021-04-05 | 2023-01-17 | Bank Of America Corporation | Information security system and method for anomaly and security threat detection |
| US11809534B2 (en) * | 2021-04-22 | 2023-11-07 | International Business Machines Corporation | Role design advisor |
| US12470469B2 (en) * | 2021-04-26 | 2025-11-11 | NetBrain Technologies Inc. | Network adaptive monitoring |
| US11811807B2 (en) * | 2021-05-27 | 2023-11-07 | Microsoft Technology Licensing, Llc | Conditional security measures using rolling set of risk scores |
| US11831688B2 (en) * | 2021-06-18 | 2023-11-28 | Capital One Services, Llc | Systems and methods for network security |
| US11856015B2 (en) * | 2021-06-24 | 2023-12-26 | Microsoft Technology Licensing, Llc | Anomalous action security assessor |
| US11501013B1 (en) | 2021-07-09 | 2022-11-15 | Sotero, Inc. | Autonomous machine learning methods for detecting and thwarting malicious database access |
| US11372921B1 (en) * | 2021-07-29 | 2022-06-28 | Accenture Global Solutions Limited | Active directory management and remediation |
| US11227055B1 (en) | 2021-07-30 | 2022-01-18 | Sailpoint Technologies, Inc. | System and method for automated access request recommendations |
| US12052359B2 (en) * | 2021-07-30 | 2024-07-30 | APPDIRECT, Inc. | Encryption key rotation |
| US20230049749A1 (en) * | 2021-08-13 | 2023-02-16 | People Center, Inc. | Resource Provisioning Based on Estimation of Risk |
| US12341791B1 (en) | 2021-09-27 | 2025-06-24 | Liberty Mutual Insurance Company | Machine learning techniques for predictive anomaly detection |
| GB2626472A (en) * | 2021-10-11 | 2024-07-24 | Sophos Ltd | Augmented threat investigation |
| WO2023064007A1 (en) * | 2021-10-11 | 2023-04-20 | Sophos Limited | Augmented threat investigation |
| US12368739B2 (en) * | 2021-10-13 | 2025-07-22 | Oracle International Corporation | Adaptive network attack prediction system |
| US20230129466A1 (en) * | 2021-10-25 | 2023-04-27 | Zscaler, Inc. | Identity intelligence in cloud-based services |
| US11856592B2 (en) * | 2021-10-27 | 2023-12-26 | International Business Machines Corporation | Multi-dimensional mapping and user cognitive profile based device control and channel assignment |
| US20230134546A1 (en) * | 2021-10-29 | 2023-05-04 | Oracle International Corporation | Network threat analysis system |
| US12204401B2 (en) * | 2021-11-19 | 2025-01-21 | Mckinsey & Company, Inc. | Systems and methods for data-driven proactive detection and remediation of errors on endpoint computing systems |
| US12192225B2 (en) * | 2021-12-30 | 2025-01-07 | Forcepoint Federal Holdings Llc | Security analytics system for performing a non-sanctioned entity interaction analysis operation when determining entity risk |
| US12099625B2 (en) * | 2022-02-04 | 2024-09-24 | Snowflake Inc. | Organizing, discovering and evaluating marketplace datasets and services by industry business needs |
| WO2023150567A1 (en) * | 2022-02-04 | 2023-08-10 | Ernst & Young U.S. Llp | Systems and methods for automated discovery and analysis of privileged access across multiple computing platforms |
| WO2023183000A1 (en) * | 2022-03-25 | 2023-09-28 | Rakuten Symphony Singapore Pte. Ltd. | Dynamic privileged access request system |
| US20230336562A1 (en) * | 2022-04-14 | 2023-10-19 | Dish Wireless L.L.C. | Rightsizing permission sets in a cloud-based 5g network |
| US12244602B2 (en) * | 2022-05-31 | 2025-03-04 | Acronis International Gmbh | Automatic user group manager |
| US12457509B2 (en) | 2022-06-30 | 2025-10-28 | T-Mobile Usa, Inc. | Repurposing corrective actions as preemptive actions for adjacent clusters of user devices |
| US11658881B1 (en) | 2022-06-30 | 2023-05-23 | Bank Of America Corporation | System and method for predicting anomalous requests and preventing anomalous interactions in a network |
| US20240007454A1 (en) * | 2022-07-01 | 2024-01-04 | Target Brands, Inc. | Systems and methods for using enterprise idp functionality to authorize user access across servers |
| EP4552031A4 (en) * | 2022-07-05 | 2025-10-15 | Xero Ltd | Methods and systems for detecting compromised accounts and/or attempts to compromise accounts |
| US11743280B1 (en) * | 2022-07-29 | 2023-08-29 | Intuit Inc. | Identifying clusters with anomaly detection |
| US20240054231A1 (en) * | 2022-08-15 | 2024-02-15 | Microsoft Technology Licensing, Llc | Cloud-agnostic code analysis |
| WO2024059676A1 (en) | 2022-09-14 | 2024-03-21 | Sotero, Inc. | Autonomous machine learning methods for detecting and thwarting ransomware attacks |
| WO2024076453A1 (en) * | 2022-10-06 | 2024-04-11 | Microsoft Technology Licensing, Llc | Cybersecurity insider risk management |
| US20240121242A1 (en) * | 2022-10-06 | 2024-04-11 | Microsoft Technology Licensing, Llc | Cybersecurity insider risk management |
| US12430452B2 (en) | 2022-10-31 | 2025-09-30 | Saudi Arabian Oil Company | Systems, devices, and methods for determining and registering authorized roles |
| US12348550B2 (en) * | 2022-11-15 | 2025-07-01 | At&T Intellectual Property Ii, L.P. | Predicting and using threat levels for cyber threats using data from public data sources |
| US20240232259A1 (en) * | 2023-01-10 | 2024-07-11 | Salesforce, Inc. | Just-in-time materialization of cloned users in computing environments within a database system |
| US12341789B2 (en) * | 2023-01-19 | 2025-06-24 | Zscaler, Inc. | Access key abuse detection |
| US12255925B2 (en) * | 2023-01-31 | 2025-03-18 | Salesforce, Inc. | Systems and methods for automatically rendering and deploying network security policies |
| CN116366310B (zh) * | 2023-02-28 | 2023-11-21 | 深圳市众志天成科技有限公司 | 一种基于信息安全的云服务方法及装置 |
| US20240372872A1 (en) * | 2023-05-04 | 2024-11-07 | Dish Wireless L.L.C. | Multi-account security in cloud-based 5g network |
| WO2024232875A1 (en) * | 2023-05-09 | 2024-11-14 | Visa International Service Association | Shield-up system and method for payment transactions |
| US20240419785A1 (en) * | 2023-06-19 | 2024-12-19 | Arm Limited | Behavior detection with detection refinement for determination of emerging threats |
| US11909743B1 (en) * | 2023-07-13 | 2024-02-20 | Snowflake Inc. | Organization-level account on data platform |
| US12309152B2 (en) * | 2023-08-15 | 2025-05-20 | Citibank, N.A. | Access control for requests to services |
| US20250097251A1 (en) * | 2023-09-19 | 2025-03-20 | Microsoft Technology Licensing, Llc | Inheriting security risks for cloud entities in a cloud computing system |
| US12413606B2 (en) * | 2023-09-29 | 2025-09-09 | Rapid7, Inc. | Techniques for detecting cyberattacks on an authentication system |
| KR102708849B1 (ko) * | 2023-10-12 | 2024-09-25 | (주)아스트론시큐리티 | 위협 시나리오를 판단하는 방법 |
| US20250211621A1 (en) * | 2023-12-21 | 2025-06-26 | Microsoft Technology Licensing, Llc | Cloud service security risk assessment and management |
| US20250272428A1 (en) * | 2024-02-27 | 2025-08-28 | GE Precision Healthcare LLC | Automated role-based access control for patient health information security and compliance |
| CN117828593B (zh) * | 2024-03-04 | 2024-07-30 | 南通颐铭科技有限公司 | 一种基于数据分析的办公账户数据监测预警方法 |
| CN117850714B (zh) * | 2024-03-04 | 2024-05-07 | 珠海芯烨电子科技有限公司 | 一种云打印机数据审计方法以及相关装置 |
| US12493664B2 (en) * | 2024-03-28 | 2025-12-09 | Intuit Inc. | Addressing data scarcity in early-cycle annual software services |
| US12229261B1 (en) * | 2024-05-03 | 2025-02-18 | Halcyon Tech, Inc. | Antiransomware file analysis and scoring |
| CN118155784B (zh) * | 2024-05-09 | 2024-07-12 | 江苏法迈生医学科技有限公司 | 临床试验管理系统的数据安全管理方法 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2014115841A (ja) | 2012-12-10 | 2014-06-26 | Hitachi Systems Ltd | 特権ユーザid貸し出しシステム、特権ユーザidの貸し出し方法、およびプログラム |
| JP2015531517A (ja) | 2012-09-20 | 2015-11-02 | アルカテル−ルーセント | システム制御 |
Family Cites Families (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8769622B2 (en) * | 2011-06-30 | 2014-07-01 | International Business Machines Corporation | Authentication and authorization methods for cloud computing security |
| US10419524B2 (en) * | 2012-09-07 | 2019-09-17 | Oracle International Corporation | System and method for workflow orchestration for use with a cloud computing environment |
| US8881249B2 (en) * | 2012-12-12 | 2014-11-04 | Microsoft Corporation | Scalable and automated secret management |
| US9246839B2 (en) * | 2013-01-02 | 2016-01-26 | International Business Machines Corporation | Extending organizational boundaries throughout a cloud architecture |
| US9674211B2 (en) | 2013-01-30 | 2017-06-06 | Skyhigh Networks, Inc. | Cloud service usage risk assessment using darknet intelligence |
| US9876804B2 (en) | 2013-10-20 | 2018-01-23 | Cyber-Ark Software Ltd. | Method and system for detecting unauthorized access to and use of network resources |
| US10063654B2 (en) | 2013-12-13 | 2018-08-28 | Oracle International Corporation | Systems and methods for contextual and cross application threat detection and prediction in cloud applications |
| US9692789B2 (en) | 2013-12-13 | 2017-06-27 | Oracle International Corporation | Techniques for cloud security monitoring and threat intelligence |
| US9210183B2 (en) * | 2013-12-19 | 2015-12-08 | Microsoft Technology Licensing, Llc | Detecting anomalous activity from accounts of an online service |
| US9852208B2 (en) | 2014-02-25 | 2017-12-26 | International Business Machines Corporation | Discovering communities and expertise of users using semantic analysis of resource access logs |
| CA2951723C (en) * | 2014-06-10 | 2021-04-27 | Sightline Innovation Inc. | System and method for network based application development and implementation |
| EP3262815B1 (en) | 2015-02-24 | 2020-10-14 | Cisco Technology, Inc. | System and method for securing an enterprise computing environment |
| EP3292500A1 (en) | 2015-05-05 | 2018-03-14 | Balabit S.A. | Computer-implemented method for determining computer system security threats, security operations center system and computer program product |
| US10042697B2 (en) * | 2015-05-28 | 2018-08-07 | Oracle International Corporation | Automatic anomaly detection and resolution system |
| CN106341386B (zh) | 2015-07-07 | 2018-09-25 | 埃森哲环球服务有限公司 | 针对基于云的多层安全架构的威胁评估级确定及补救 |
| US20180293377A1 (en) | 2015-10-13 | 2018-10-11 | Nec Corporation | Suspicious behavior detection system, information-processing device, method, and program |
| US10536478B2 (en) | 2016-02-26 | 2020-01-14 | Oracle International Corporation | Techniques for discovering and managing security of applications |
| US10142362B2 (en) | 2016-06-02 | 2018-11-27 | Zscaler, Inc. | Cloud based systems and methods for determining security risks of users and groups |
| US10701094B2 (en) | 2017-06-22 | 2020-06-30 | Oracle International Corporation | Techniques for monitoring privileged users and detecting anomalous activities in a computing environment |
-
2018
- 2018-06-18 US US16/011,538 patent/US10701094B2/en active Active
- 2018-06-19 JP JP2019570846A patent/JP7035096B2/ja active Active
- 2018-06-19 CN CN201880052275.6A patent/CN110999250B/zh active Active
- 2018-06-19 CN CN202111195996.2A patent/CN113949557B/zh active Active
- 2018-06-19 EP EP18739698.1A patent/EP3643033B1/en active Active
- 2018-06-19 WO PCT/US2018/038347 patent/WO2018236915A1/en not_active Ceased
-
2020
- 2020-06-29 US US16/914,797 patent/US11483328B2/en active Active
-
2022
- 2022-03-02 JP JP2022031870A patent/JP7279227B2/ja active Active
- 2022-10-25 US US17/973,274 patent/US20230126571A1/en active Pending
-
2023
- 2023-05-10 JP JP2023077773A patent/JP7523630B2/ja active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2015531517A (ja) | 2012-09-20 | 2015-11-02 | アルカテル−ルーセント | システム制御 |
| JP2014115841A (ja) | 2012-12-10 | 2014-06-26 | Hitachi Systems Ltd | 特権ユーザid貸し出しシステム、特権ユーザidの貸し出し方法、およびプログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| CN110999250A (zh) | 2020-04-10 |
| US10701094B2 (en) | 2020-06-30 |
| WO2018236915A1 (en) | 2018-12-27 |
| JP2023103341A (ja) | 2023-07-26 |
| JP2022071111A (ja) | 2022-05-13 |
| CN113949557B (zh) | 2024-04-02 |
| JP7523630B2 (ja) | 2024-07-26 |
| US20180375886A1 (en) | 2018-12-27 |
| US11483328B2 (en) | 2022-10-25 |
| US20230126571A1 (en) | 2023-04-27 |
| CN113949557A (zh) | 2022-01-18 |
| EP3643033A1 (en) | 2020-04-29 |
| JP2020524855A (ja) | 2020-08-20 |
| CN110999250B (zh) | 2021-11-05 |
| US20200329066A1 (en) | 2020-10-15 |
| EP3643033B1 (en) | 2021-11-10 |
| JP7279227B2 (ja) | 2023-05-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7523630B2 (ja) | コンピューティング環境における特権ユーザの監視および異常なアクティビティの検出の手法 | |
| US11734148B2 (en) | Testing cloud application integrations, data, and protocols | |
| US12160449B2 (en) | Autonomous monitoring of applications in a cloud environment | |
| US12204650B2 (en) | High granularity application and data security in cloud environments | |
| US11637844B2 (en) | Cloud-based threat detection | |
| JP7222061B2 (ja) | アプリケーションのセキュリティを発見および管理するための技術 | |
| US11165800B2 (en) | Cloud based security monitoring using unsupervised pattern recognition and deep learning | |
| HK1260681A1 (en) | Techniques for discovering and managing security of applications | |
| HK1260681B (zh) | 用於安全管理的计算机实现的方法、系统和可读介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210402 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20210402 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20220126 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20220201 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20220302 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 7035096 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |