Accurate real-time identification of malicious BGP hijacks

    公开(公告)号:US10148690B2

    公开(公告)日:2018-12-04

    申请号:US14977261

    申请日:2015-12-21

    IPC分类号: H04L29/06

    摘要: A system and method for detecting malicious hijack events in real-time is provided. The method may include receiving routing data associated with a Border Gateway Protocol (BGP) event from at least one BGP router. The method may further include generating a hijack detection model using a machine learning technique, such as Positive Unlabeled learning. The machine learning technique may include at least one data input and a probability output; wherein, the data input couples to receive a set of historically confirmed BGP hijacking data and the routing data, while the probability output transmits a probability value for the malicious event which may be calculated based upon the data input. Finally, the method may include classifying the BGP event as a malicious event or a benign event using the BGP hijack model and correcting routing tables that have been corrupted by a malicious event.

    Systems and methods for preventing decentralized malware attacks

    公开(公告)号:US11025666B1

    公开(公告)日:2021-06-01

    申请号:US16207431

    申请日:2018-12-03

    IPC分类号: H04L29/06 G06N20/00

    摘要: The disclosed computer-implemented method for preventing decentralized malware attacks may include (i) receiving, by a computing device, node data from a group of nodes over a network, (ii) training a machine learning model by shuffling the node data to generate a set of outputs utilized for predicting malicious data, (iii) calculating a statistical deviation for each output in the set of outputs from an aggregated output for the set of outputs, and (iv) identifying, based on the statistical deviation, an anomalous output in the set of outputs that is associated with one or more of the malicious nodes, the one or more malicious nodes hosting the malicious data. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for malware classification

    公开(公告)号:US11025649B1

    公开(公告)日:2021-06-01

    申请号:US16019166

    申请日:2018-06-26

    IPC分类号: H04L29/06 G06N20/00

    摘要: The disclosed computer-implemented method for malware classification may include receiving dynamic analysis traces that include event descriptions regarding malware programs, and labels regarding classes of malware programs; performing a first mapping of the event descriptions to a first set of vector representations, wherein order of the events is not taken into account by the first mapping; performing a second mapping of the event descriptions to a second set of vector representations, wherein order of the events is taken into account by the second mapping; combining the first set of vector representations and the second set of vector representations into a combined set of vector representations; inputting the combined set of vector representations, along with the labels, into an autoencoder; and training the autoencoder to generate a feature space representation that correlates identified features with classes of malware. Various other methods, systems, and computer-readable media are also disclosed.

    Detecting abnormal user behavior via temporally regularized tensor factorization

    公开(公告)号:US11012454B1

    公开(公告)日:2021-05-18

    申请号:US16230703

    申请日:2018-12-21

    IPC分类号: H04L29/06 G06F8/61

    摘要: Detecting abnormal user behavior via temporally regularized tensor factorization. A method may include obtaining behavioral data of a plurality of users of cloud services to establish a first behavioral baseline; obtaining behavioral data for a particular user of the plurality of users to establish a second behavioral baseline; determining a first variation of behavior between the second and first behavioral baseline to determine an expected behavior; creating a tensor model for a succession of pre-determined time periods comprising multiple three-dimensional tensors; determining a temporal dependence between the multiple three-dimensional tensors; determining a temporal smoothness between the multiple three-dimensional tensors; predicting a future variation in behavior of the particular user based on a combination of the temporal dependence and the temporal smoothness, where the future variation in behavior indicates a potential security threat; and performing a remedial security action on a client device based on the predicted future variation in behavior.

    Systems and methods for evaluating infection risks based on profiled user behaviors

    公开(公告)号:US10367845B1

    公开(公告)日:2019-07-30

    申请号:US16116980

    申请日:2018-08-30

    IPC分类号: H04L29/06 G06F16/901

    摘要: The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that may include labeled profiles (e.g., infected profiles and/or clean profiles) and/or unlabeled profiles, (2) training a classification model to distinguish infected profiles from clean profiles using features and labels of the user-behavior profiles, and (3) using the classification model to predict (a) a likelihood that a computing system of a user will become infected based on a profile of user behaviors of the user and/or (b) a likelihood that a user behavior in the user-behavior profiles will result in a computing-system infection. Various other methods, systems, and computer-readable media are also disclosed.

    Identifying evidence of attacks by analyzing log text

    公开(公告)号:US10785243B1

    公开(公告)日:2020-09-22

    申请号:US16147467

    申请日:2018-09-28

    IPC分类号: H04L29/06 G06N3/08

    摘要: Log text is encoded into a low dimensional feature vector. A temporal predictive model is constructed based on the low dimensional feature vector. The temporal predictive model is used to calculate probabilities of the occurrence of security incidents based on signature names from the log text encoded in the low dimensional feature vector. A preventative security action is automatically taken in response to the calculated probability of the occurrence of a specific security incident exceeding a given threshold.

    Security network devices by forecasting future security incidents for a network based on past security incidents

    公开(公告)号:US10547623B1

    公开(公告)日:2020-01-28

    申请号:US15664029

    申请日:2017-07-31

    IPC分类号: G06F21/31 H04L29/06

    摘要: Securing network devices by forecasting future security incidents for a network based on past security incidents. In one embodiment, a method may include constructing past inside-in security features for a network, constructing past outside-in security features for the network, and employing dynamic time warping to generate a similarity score for each security feature pair in the past inside-in security features, in the past outside-in security features, and between the past inside-in security features and the past outside-in security features. The method may further include generating a Coupled Gaussian Latent Variable (CGLV) model based on the similarity scores, forecasting future inside-in security features for the network using the CGLV model, and performing a security action on one or more network devices of the network based on the forecasted future inside-in security features for the network.

    Systems and methods for assessing cyber risks using incident-origin information

    公开(公告)号:US10516680B1

    公开(公告)日:2019-12-24

    申请号:US15189362

    申请日:2016-06-22

    IPC分类号: H04L29/06

    摘要: A computer-implemented method for assessing cyber risks using incident-origin information may include (1) receiving a request for a cyber-risk assessment of an entity of interest, (2) using an Internet-address data source that maps identifiers of entities to public Internet addresses of the entities to translate an identifier of the entity into a set of Internet addresses of the entity, (3) using an incident-origin data source that maps externally-detected security incidents to public Internet addresses from which the security incidents originated to translate the set of Internet addresses into a set of security incidents that originated from the entity, and (4) using the set of security incidents to generate the cyber-risk assessment of the entity. Various other methods, systems, and computer-readable media may have similar features.

    Systems and methods for determining the reputations of unknown files

    公开(公告)号:US10437994B1

    公开(公告)日:2019-10-08

    申请号:US15163720

    申请日:2016-05-25

    IPC分类号: G06F21/00 G06F21/56 G06F21/55

    摘要: The disclosed computer-implemented method for determining the reputations of unknown files may include (1) identifying a file that was downloaded by the computing device from an external file host, (2) creating a node that represents the file in a dynamic file relationship graph, (3) connecting the node in the dynamic file relationship graph with at least one other node that represents an attribute of the external file host, and (4) labeling the node with a reputation score calculated based at least in part on a reputation score of the at least one other node that represents the attribute of the external file host. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for evaluating infection risks based on profiled user behaviors

    公开(公告)号:US10116680B1

    公开(公告)日:2018-10-30

    申请号:US15188956

    申请日:2016-06-21

    IPC分类号: H04L29/06 G06F17/30

    摘要: The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that may include labeled profiles (e.g., infected profiles and/or clean profiles) and/or unlabeled profiles, (2) training a classification model to distinguish infected profiles from clean profiles using features and labels of the user-behavior profiles, and (3) using the classification model to predict (a) a likelihood that a computing system of a user will become infected based on a profile of user behaviors of the user and/or (b) a likelihood that a user behavior in the user-behavior profiles will result in a computing-system infection. Various other methods, systems, and computer-readable media are also disclosed.