SG11201907140UA - Multi-signal analysis for compromised scope identification - Google Patents
Multi-signal analysis for compromised scope identificationInfo
- Publication number
- SG11201907140UA SG11201907140UA SG11201907140UA SG11201907140UA SG11201907140UA SG 11201907140U A SG11201907140U A SG 11201907140UA SG 11201907140U A SG11201907140U A SG 11201907140UA SG 11201907140U A SG11201907140U A SG 11201907140UA SG 11201907140U A SG11201907140U A SG 11201907140UA
- Authority
- SG
- Singapore
- Prior art keywords
- microsoft
- llc
- international
- redmond
- washington
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/01—Probabilistic graphical models, e.g. probabilistic networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Evolutionary Computation (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Medical Informatics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computational Mathematics (AREA)
- Algebra (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Pure & Applied Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Debugging And Monitoring (AREA)
- Measurement Of Resistance Or Impedance (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Time-Division Multiplex Systems (AREA)
- Measurement Of Current Or Voltage (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/431,391 US10491616B2 (en) | 2017-02-13 | 2017-02-13 | Multi-signal analysis for compromised scope identification |
PCT/US2018/017817 WO2018148657A1 (en) | 2017-02-13 | 2018-02-12 | Multi-signal analysis for compromised scope identification |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201907140UA true SG11201907140UA (en) | 2019-09-27 |
Family
ID=61386917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201907140UA SG11201907140UA (en) | 2017-02-13 | 2018-02-12 | Multi-signal analysis for compromised scope identification |
Country Status (18)
Country | Link |
---|---|
US (2) | US10491616B2 (ko) |
EP (1) | EP3552138B1 (ko) |
JP (1) | JP7108365B2 (ko) |
KR (1) | KR102433425B1 (ko) |
CN (1) | CN110366727B (ko) |
AU (1) | AU2018219369B2 (ko) |
BR (1) | BR112019014366A2 (ko) |
CA (1) | CA3050321A1 (ko) |
CL (1) | CL2019002189A1 (ko) |
CO (1) | CO2019008341A2 (ko) |
IL (1) | IL268231B (ko) |
MX (1) | MX2019009505A (ko) |
NZ (1) | NZ755115A (ko) |
PH (1) | PH12019550134A1 (ko) |
RU (1) | RU2768562C2 (ko) |
SG (1) | SG11201907140UA (ko) |
WO (1) | WO2018148657A1 (ko) |
ZA (1) | ZA201904963B (ko) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10713442B1 (en) | 2017-02-17 | 2020-07-14 | Narrative Science Inc. | Applied artificial intelligence technology for interactive story editing to support natural language generation (NLG) |
US10943069B1 (en) | 2017-02-17 | 2021-03-09 | Narrative Science Inc. | Applied artificial intelligence technology for narrative generation based on a conditional outcome framework |
US20190038934A1 (en) * | 2017-08-03 | 2019-02-07 | International Business Machines Corporation | Cognitive advisory system of structured assessments through iot sensors |
US11042713B1 (en) * | 2018-06-28 | 2021-06-22 | Narrative Scienc Inc. | Applied artificial intelligence technology for using natural language processing to train a natural language generation system |
US11012421B2 (en) | 2018-08-28 | 2021-05-18 | Box, Inc. | Predicting user-file interactions |
KR102049829B1 (ko) * | 2018-12-05 | 2019-11-28 | 주식회사 뷰노 | 피검체의 위험도를 평가하여 상기 위험도에 따라 상기 피검체를 분류하는 방법 및 이를 이용한 장치 |
US11487873B2 (en) * | 2019-01-22 | 2022-11-01 | EMC IP Holding Company LLC | Risk score generation utilizing monitored behavior and predicted impact of compromise |
EP3963519A1 (en) * | 2019-04-29 | 2022-03-09 | JPMorgan Chase Bank, N.A. | Systems and methods for data-driven infrastructure controls |
US11799890B2 (en) * | 2019-10-01 | 2023-10-24 | Box, Inc. | Detecting anomalous downloads |
US11449548B2 (en) | 2019-11-27 | 2022-09-20 | Elasticsearch B.V. | Systems and methods for enriching documents for indexing |
US11768945B2 (en) * | 2020-04-07 | 2023-09-26 | Allstate Insurance Company | Machine learning system for determining a security vulnerability in computer software |
US12058148B2 (en) * | 2020-05-01 | 2024-08-06 | Amazon Technologies, Inc. | Distributed threat sensor analysis and correlation |
US12041094B2 (en) | 2020-05-01 | 2024-07-16 | Amazon Technologies, Inc. | Threat sensor deployment and management |
US11704185B2 (en) * | 2020-07-14 | 2023-07-18 | Microsoft Technology Licensing, Llc | Machine learning-based techniques for providing focus to problematic compute resources represented via a dependency graph |
CN112700060B (zh) * | 2021-01-08 | 2023-06-13 | 佳源科技股份有限公司 | 站所终端负荷预测方法和预测装置 |
US11902330B1 (en) * | 2021-06-16 | 2024-02-13 | Juniper Networks, Inc. | Generating a network security policy based on a user identity associated with malicious behavior |
WO2022269786A1 (ja) * | 2021-06-23 | 2022-12-29 | 日本電信電話株式会社 | 通信データ識別装置およびその方法 |
US20230099241A1 (en) * | 2021-09-27 | 2023-03-30 | Bank Of America Corporation | Systems and methods for identifying malicious events using deviations in user activity for enhanced network and data security |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2003223379A1 (en) * | 2002-03-29 | 2003-10-13 | Global Dataguard, Inc. | Adaptive behavioral intrusion detection systems and methods |
US7784099B2 (en) * | 2005-02-18 | 2010-08-24 | Pace University | System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning |
US8122122B1 (en) * | 2005-11-08 | 2012-02-21 | Raytheon Oakley Systems, Inc. | Event monitoring and collection |
US8490194B2 (en) * | 2006-01-31 | 2013-07-16 | Robert Moskovitch | Method and system for detecting malicious behavioral patterns in a computer, using machine learning |
US7739082B2 (en) * | 2006-06-08 | 2010-06-15 | Battelle Memorial Institute | System and method for anomaly detection |
US7908660B2 (en) * | 2007-02-06 | 2011-03-15 | Microsoft Corporation | Dynamic risk management |
US20080295172A1 (en) * | 2007-05-22 | 2008-11-27 | Khushboo Bohacek | Method, system and computer-readable media for reducing undesired intrusion alarms in electronic communications systems and networks |
JP5046836B2 (ja) * | 2007-10-02 | 2012-10-10 | Kddi株式会社 | 不正検知装置、プログラム、および記録媒体 |
US8321938B2 (en) | 2009-02-12 | 2012-11-27 | Raytheon Bbn Technologies Corp. | Multi-tiered scalable network monitoring |
CN101547129B (zh) * | 2009-05-05 | 2011-05-04 | 中国科学院计算技术研究所 | 分布式拒绝服务攻击的检测方法及系统 |
US20100293103A1 (en) | 2009-05-12 | 2010-11-18 | Microsoft Corporation | Interaction model to migrate states and data |
US8793151B2 (en) * | 2009-08-28 | 2014-07-29 | Src, Inc. | System and method for organizational risk analysis and reporting by mapping detected risk patterns onto a risk ontology |
US8712596B2 (en) * | 2010-05-20 | 2014-04-29 | Accenture Global Services Limited | Malicious attack detection and analysis |
CN103403685B (zh) * | 2010-12-30 | 2015-05-13 | 艾新顿公司 | 在线隐私管理 |
WO2013043170A1 (en) * | 2011-09-21 | 2013-03-28 | Hewlett-Packard Development Company L.P. | Automated detection of a system anomaly |
US9529777B2 (en) * | 2011-10-28 | 2016-12-27 | Electronic Arts Inc. | User behavior analyzer |
US9117076B2 (en) * | 2012-03-14 | 2015-08-25 | Wintermute, Llc | System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity |
US9832211B2 (en) * | 2012-03-19 | 2017-11-28 | Qualcomm, Incorporated | Computing device to detect malware |
CN105378790B (zh) * | 2013-03-15 | 2020-06-12 | 索库里公司 | 使用社交联网数据的风险评估 |
US9558347B2 (en) * | 2013-08-27 | 2017-01-31 | Globalfoundries Inc. | Detecting anomalous user behavior using generative models of user actions |
US9338187B1 (en) * | 2013-11-12 | 2016-05-10 | Emc Corporation | Modeling user working time using authentication events within an enterprise network |
US20150235152A1 (en) * | 2014-02-18 | 2015-08-20 | Palo Alto Research Center Incorporated | System and method for modeling behavior change and consistency to detect malicious insiders |
CN103853841A (zh) * | 2014-03-19 | 2014-06-11 | 北京邮电大学 | 一种社交网用户异常行为的分析方法 |
US9565203B2 (en) * | 2014-11-13 | 2017-02-07 | Cyber-Ark Software Ltd. | Systems and methods for detection of anomalous network behavior |
US9690933B1 (en) * | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US9654485B1 (en) * | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
US20160308725A1 (en) | 2015-04-16 | 2016-10-20 | Nec Laboratories America, Inc. | Integrated Community And Role Discovery In Enterprise Networks |
WO2016177437A1 (en) * | 2015-05-05 | 2016-11-10 | Balabit S.A. | Computer-implemented method for determining computer system security threats, security operations center system and computer program product |
US9699205B2 (en) * | 2015-08-31 | 2017-07-04 | Splunk Inc. | Network security system |
US9888024B2 (en) * | 2015-09-30 | 2018-02-06 | Symantec Corporation | Detection of security incidents with low confidence security events |
MA44828A (fr) | 2016-02-16 | 2018-12-26 | Morpho Bv | Procédé, système, dispositif, et produit-programme informatique, destinés à l'autorisation à distance d'un utilisateur de services numériques |
US10372910B2 (en) * | 2016-06-20 | 2019-08-06 | Jask Labs Inc. | Method for predicting and characterizing cyber attacks |
-
2017
- 2017-02-13 US US15/431,391 patent/US10491616B2/en active Active
-
2018
- 2018-02-12 RU RU2019127797A patent/RU2768562C2/ru active
- 2018-02-12 MX MX2019009505A patent/MX2019009505A/es unknown
- 2018-02-12 CA CA3050321A patent/CA3050321A1/en active Pending
- 2018-02-12 SG SG11201907140UA patent/SG11201907140UA/en unknown
- 2018-02-12 AU AU2018219369A patent/AU2018219369B2/en active Active
- 2018-02-12 EP EP18707813.4A patent/EP3552138B1/en active Active
- 2018-02-12 KR KR1020197023658A patent/KR102433425B1/ko active IP Right Grant
- 2018-02-12 BR BR112019014366-1A patent/BR112019014366A2/pt unknown
- 2018-02-12 WO PCT/US2018/017817 patent/WO2018148657A1/en unknown
- 2018-02-12 NZ NZ755115A patent/NZ755115A/en unknown
- 2018-02-12 CN CN201880011573.0A patent/CN110366727B/zh active Active
- 2018-02-12 JP JP2019543201A patent/JP7108365B2/ja active Active
-
2019
- 2019-07-22 PH PH12019550134A patent/PH12019550134A1/en unknown
- 2019-07-23 IL IL268231A patent/IL268231B/en unknown
- 2019-07-29 ZA ZA2019/04963A patent/ZA201904963B/en unknown
- 2019-07-30 CO CONC2019/0008341A patent/CO2019008341A2/es unknown
- 2019-08-02 CL CL2019002189A patent/CL2019002189A1/es unknown
- 2019-11-21 US US16/690,982 patent/US11233810B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
WO2018148657A1 (en) | 2018-08-16 |
NZ755115A (en) | 2023-06-30 |
IL268231B (en) | 2022-05-01 |
KR20190117526A (ko) | 2019-10-16 |
CN110366727A (zh) | 2019-10-22 |
US20200092318A1 (en) | 2020-03-19 |
IL268231A (en) | 2019-09-26 |
EP3552138B1 (en) | 2023-07-12 |
RU2019127797A3 (ko) | 2021-07-05 |
AU2018219369B2 (en) | 2022-01-06 |
JP2020509478A (ja) | 2020-03-26 |
RU2019127797A (ru) | 2021-03-15 |
CA3050321A1 (en) | 2018-08-16 |
BR112019014366A2 (pt) | 2020-02-27 |
AU2018219369A1 (en) | 2019-07-25 |
CL2019002189A1 (es) | 2019-12-27 |
ZA201904963B (en) | 2020-11-25 |
JP7108365B2 (ja) | 2022-07-28 |
US10491616B2 (en) | 2019-11-26 |
US11233810B2 (en) | 2022-01-25 |
CO2019008341A2 (es) | 2019-08-20 |
KR102433425B1 (ko) | 2022-08-17 |
MX2019009505A (es) | 2019-10-02 |
RU2768562C2 (ru) | 2022-03-24 |
PH12019550134A1 (en) | 2020-06-01 |
US20180234442A1 (en) | 2018-08-16 |
CN110366727B (zh) | 2023-09-19 |
EP3552138A1 (en) | 2019-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201907140UA (en) | Multi-signal analysis for compromised scope identification | |
SG11201906575QA (en) | Continuous learning for intrusion detection | |
SG11201811343SA (en) | System and methods for detecting online fraud | |
SG11201903190PA (en) | A light detection and ranging (lidar) device having multiple receivers | |
SG11201809913PA (en) | Methods for detecting target nucleic acids in a sample | |
SG11201902981RA (en) | Iot provisioning service | |
SG11201907605YA (en) | Light detection systems and methods for using thereof | |
SG11201909410VA (en) | Machine learned decision guidance for alerts originating from monitoring systems | |
SG11201804190YA (en) | Method and system for blockchain variant using digital signatures | |
SG11201806723PA (en) | Security system | |
SG11201810922VA (en) | Methods and systems for detecting environmental information of a vehicle | |
SG11201907592XA (en) | Methods and systems using networked phased-array antennae applications to detect and/or monitor moving objects | |
SG11201908288XA (en) | Configurable annotations for privacy-sensitive user content | |
SG11201903715XA (en) | High sensitivity repeater defect detection | |
SG11201908489XA (en) | De novo synthesized combinatorial nucleic acid libraries | |
SG11201900509YA (en) | Simultaneous capturing of overlay signals from multiple targets | |
SG11201806595UA (en) | Using cell-free dna fragment size to determine copy number variations | |
SG11201804518TA (en) | A method to design geophysical surveys using full wavefield inversion point-spread function analysis | |
SG11201710238QA (en) | Autonomic incident triage prioritization by performance modifier and temporal decay parameters | |
SG11201811426UA (en) | Distributed electronic record and transaction history | |
SG11201908509TA (en) | Biosensors for biological or chemical analysis and methods of manufacturing the same | |
SG11201807030TA (en) | Radar mounting estimation with unstructured data | |
SG11201810890RA (en) | Situation aware personal assistant | |
SG11201805906WA (en) | Diagnostic and prognostic methods for cardiovascular diseases and events | |
SG11201909685RA (en) | Methods and apparatus for characterising the environment of a user platform |