SG10202002125QA - System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats - Google Patents
System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threatsInfo
- Publication number
- SG10202002125QA SG10202002125QA SG10202002125QA SG10202002125QA SG10202002125QA SG 10202002125Q A SG10202002125Q A SG 10202002125QA SG 10202002125Q A SG10202002125Q A SG 10202002125QA SG 10202002125Q A SG10202002125Q A SG 10202002125QA SG 10202002125Q A SG10202002125Q A SG 10202002125QA
- Authority
- SG
- Singapore
- Prior art keywords
- morphologies
- analysing
- unknown
- detecting data
- data anomalies
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9017—Indexing; Data structures therefor; Storage structures using directory or table look-up
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Mathematical Physics (AREA)
- Computational Linguistics (AREA)
- Databases & Information Systems (AREA)
- Biomedical Technology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biophysics (AREA)
- Molecular Biology (AREA)
- Virology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Priority Applications (13)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10202002125QA SG10202002125QA (en) | 2020-03-09 | 2020-03-09 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
US16/946,245 US11082441B1 (en) | 2020-03-09 | 2020-06-11 | Systems and methods for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
JP2021505691A JP7092939B2 (en) | 2020-03-09 | 2020-07-30 | Systems and methods for detecting data anomalies by morphological analysis of known and / or unknown cybersecurity threats |
CA3125101A CA3125101A1 (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
PCT/SG2020/050441 WO2021183043A1 (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
AU2020223632A AU2020223632B2 (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
CN202080002105.4A CN113632083B (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analyzing the morphology of known and/or unknown cyber-security threats |
EP20753862.0A EP3899770B1 (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
DK20753862.0T DK3899770T3 (en) | 2020-03-09 | 2020-07-30 | SYSTEM AND METHOD FOR DETECTION OF DATA IRREGULARITIES BY ANALYSIS OF THE MORPHOLOGIES OF KNOWN AND/OR UNKNOWN CYBER SECURITY THREATS |
KR1020217002942A KR102323290B1 (en) | 2020-03-09 | 2020-07-30 | Systems and methods for detecting data anomalies by analyzing morphologies of known and/or unknown cybersecurity threats |
NZ767245A NZ767245B2 (en) | 2020-03-09 | 2020-08-20 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
TW109129559A TWI720932B (en) | 2020-03-09 | 2020-08-28 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
IL289367A IL289367B (en) | 2020-03-09 | 2021-12-24 | Systems and methods for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10202002125QA SG10202002125QA (en) | 2020-03-09 | 2020-03-09 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10202002125QA true SG10202002125QA (en) | 2020-07-29 |
Family
ID=72355657
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10202002125QA SG10202002125QA (en) | 2020-03-09 | 2020-03-09 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
Country Status (8)
Country | Link |
---|---|
US (1) | US11082441B1 (en) |
EP (1) | EP3899770B1 (en) |
KR (1) | KR102323290B1 (en) |
CN (1) | CN113632083B (en) |
AU (1) | AU2020223632B2 (en) |
SG (1) | SG10202002125QA (en) |
TW (1) | TWI720932B (en) |
WO (1) | WO2021183043A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11711310B2 (en) | 2019-09-18 | 2023-07-25 | Tweenznet Ltd. | System and method for determining a network performance property in at least one network |
US11716338B2 (en) * | 2019-11-26 | 2023-08-01 | Tweenznet Ltd. | System and method for determining a file-access pattern and detecting ransomware attacks in at least one computer network |
US11792223B2 (en) * | 2020-06-29 | 2023-10-17 | Netapp, Inc. | Systems and methods for detecting malware attacks |
US11720991B2 (en) * | 2021-05-20 | 2023-08-08 | International Business Machines Corporation | Signing and authentication of digital images and other data arrays |
US11934667B1 (en) * | 2021-06-30 | 2024-03-19 | Amazon Technologies, Inc. | Encrypted-data-only media operations |
WO2023113772A1 (en) * | 2021-12-13 | 2023-06-22 | Hewlett-Packard Development Company, L.P. | Suspicious activity notifications via canary files |
US20230224275A1 (en) * | 2022-01-12 | 2023-07-13 | Bank Of America Corporation | Preemptive threat detection for an information system |
US11647040B1 (en) * | 2022-07-14 | 2023-05-09 | Tenable, Inc. | Vulnerability scanning of a remote file system |
CN115374075B (en) * | 2022-08-01 | 2023-09-01 | 北京明朝万达科技股份有限公司 | File type identification method and device |
WO2024065238A1 (en) * | 2022-09-28 | 2024-04-04 | Yu Wenfeng | Systems, methods, and media for protecting application programming interfaces |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9087195B2 (en) * | 2009-07-10 | 2015-07-21 | Kaspersky Lab Zao | Systems and methods for detecting obfuscated malware |
CN101854404B (en) * | 2010-06-04 | 2013-08-07 | 中国科学院计算机网络信息中心 | Method and device for detecting anomaly of domain name system |
US9292688B2 (en) | 2012-09-26 | 2016-03-22 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
US11126720B2 (en) * | 2012-09-26 | 2021-09-21 | Bluvector, Inc. | System and method for automated machine-learning, zero-day malware detection |
US10713358B2 (en) * | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
US9465939B2 (en) * | 2014-06-27 | 2016-10-11 | Mcafee, Inc. | Mitigation of malware |
US20170068816A1 (en) * | 2015-09-04 | 2017-03-09 | University Of Delaware | Malware analysis and detection using graph-based characterization and machine learning |
US10491627B1 (en) * | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
US20180248896A1 (en) * | 2017-02-24 | 2018-08-30 | Zitovault Software, Inc. | System and method to prevent, detect, thwart, and recover automatically from ransomware cyber attacks, using behavioral analysis and machine learning |
EP3528459B1 (en) * | 2018-02-20 | 2020-11-04 | Darktrace Limited | A cyber security appliance for an operational technology network |
KR102075715B1 (en) * | 2018-05-29 | 2020-02-10 | 국방과학연구소 | Apparatus for classifying attack groups and method therefor |
US11574051B2 (en) * | 2018-08-02 | 2023-02-07 | Fortinet, Inc. | Malware identification using multiple artificial neural networks |
CN109522926A (en) * | 2018-09-28 | 2019-03-26 | 南京航空航天大学 | Method for detecting abnormality based on comentropy cluster |
-
2020
- 2020-03-09 SG SG10202002125QA patent/SG10202002125QA/en unknown
- 2020-06-11 US US16/946,245 patent/US11082441B1/en active Active
- 2020-07-30 AU AU2020223632A patent/AU2020223632B2/en active Active
- 2020-07-30 CN CN202080002105.4A patent/CN113632083B/en active Active
- 2020-07-30 WO PCT/SG2020/050441 patent/WO2021183043A1/en active Application Filing
- 2020-07-30 KR KR1020217002942A patent/KR102323290B1/en active IP Right Grant
- 2020-07-30 EP EP20753862.0A patent/EP3899770B1/en active Active
- 2020-08-28 TW TW109129559A patent/TWI720932B/en active
Also Published As
Publication number | Publication date |
---|---|
US11082441B1 (en) | 2021-08-03 |
CN113632083A (en) | 2021-11-09 |
KR102323290B1 (en) | 2021-11-05 |
AU2020223632B2 (en) | 2021-10-21 |
KR20210114916A (en) | 2021-09-24 |
EP3899770B1 (en) | 2022-10-05 |
TW202134919A (en) | 2021-09-16 |
EP3899770A1 (en) | 2021-10-27 |
WO2021183043A1 (en) | 2021-09-16 |
TWI720932B (en) | 2021-03-01 |
EP3899770A4 (en) | 2021-12-08 |
AU2020223632A1 (en) | 2021-09-23 |
CN113632083B (en) | 2022-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10202002125QA (en) | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats | |
EP3821360A4 (en) | Communications methods and apparatus for dynamic detection and/or mitigation of threats and/or anomalies | |
BR112018007040A2 (en) | method and apparatus for detecting and classifying convulsive activity | |
GB2595809B (en) | Method, apparatus, and system for quantitative analysis of seal of trap faults | |
SG11202112145PA (en) | Method and system for malware or cybercriminal infrastructure detection | |
EP3344977C0 (en) | Method and system for analysis of samples using laser induced breakdown spectroscopy | |
EP4139829A4 (en) | Method and system for confidential string-matching and deep packet inspection | |
IL278697A (en) | Apparatus and method for point-of-care, rapid, field-deployable diagnostic testing of covid-19, viruses, antibodies and markers | |
EP4098012A4 (en) | Methods and apparatus for beam failure detection reference signal determination | |
ZA202207309B (en) | Method for evaluating monitoring capability of shaft-ground integrated microseismic monitoring system | |
EP3948628A4 (en) | System and method for detection of counterfeit and cyber electronic components | |
WO2010144105A3 (en) | Integrated airport domain awareness response system, system for ground-based transportable defense of airports against manpads, and methods | |
IL289367B (en) | Systems and methods for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats | |
SG11202006380UA (en) | Multi-sensor gas sampling detection system for radical gases and short-lived molecules and method of use | |
EP4054406A4 (en) | Systems, apparatus, and methods of analyzing specimens | |
GB202400903D0 (en) | System and method for analysis of specimens | |
SG10202001237WA (en) | System and method for near real time detection of attacks and influence in social networks | |
GB2615191B (en) | Seismic detection system and method | |
EP4237977C0 (en) | Method for detection of malware | |
HUE059270T2 (en) | Method and apparatus for detecting the anomalies of an infrastructure | |
IL287180A (en) | Method and system for classification of samples | |
GB202005170D0 (en) | Apparatus and method for biomarker detection | |
EP3899591A4 (en) | Method of analysing seismic data to detect hydrocarbons | |
DK2689274T3 (en) | METHOD AND APPARATUS FOR ANALYSIS OF DATA IN GEOPHYSICAL SURVEILLANCE MEASUREMENTS | |
GB2606258B (en) | System for and method of detecting changes |