MALWARE DETECTION AND MITIGATION SYSTEM AND METHOD

    公开(公告)号:US20230131525A1

    公开(公告)日:2023-04-27

    申请号:US17512015

    申请日:2021-10-27

    Abstract: A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.

    PRIVACY PREFERENCE BASED DEVICE CONTROLS

    公开(公告)号:US20220239657A1

    公开(公告)日:2022-07-28

    申请号:US17687235

    申请日:2022-03-04

    Inventor: Rajarshi Gupta

    Abstract: A method for controlling application enabling includes receiving from a particular user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the particular user to enable a particular application via a computing device is detected. Data permission requirements of the particular application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the particular application. The multidimensional zone is compared to the multidimensional coordinate, and the particular user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the particular user via the computing device, and the particular application is enabled responsive to the affirmation of the request.

    AUTOMATED MALWARE CLASSIFICATION WITH HUMAN-READABLE EXPLANATIONS

    公开(公告)号:US20220237289A1

    公开(公告)日:2022-07-28

    申请号:US17159909

    申请日:2021-01-27

    Abstract: A malware classification is generated for an input data set with a human-readable explanation of the classification. An input data set having a hierarchical structure is received in a neural network that has an architecture based on a schema determined from a plurality of second input data sets and that is trained to classify received input data sets into one or more of a plurality of classes. An explanation is provided with the output of the neural network, the explanation comprising a subset of at least one input data set that caused the at least one input data set to be classified into a certain class using the schema of the generated neural network. The explanation may further be derived from the statistical contribution of one or more features of the input data set that caused the at least one input data set to be classified into a certain class.

    INTRA-LAN NETWORK DEVICE ISOLATION
    16.
    发明申请

    公开(公告)号:US20220231990A1

    公开(公告)日:2022-07-21

    申请号:US17153657

    申请日:2021-01-20

    Abstract: A private network device such as a security device is inserted in a local network and is operable to isolate networked devices on the local network. The networked security device uses Internet Protocol spoofing to intercept network traffic between at least two networked devices on the same local network as the networked security device, and selectively blocks intercepted network traffic between the at least two networked devices on the local network.

    Networked device identification and classification

    公开(公告)号:US11363065B2

    公开(公告)日:2022-06-14

    申请号:US16857924

    申请日:2020-04-24

    Inventor: Dan Martinec

    Abstract: A method of identifying network devices such as a router includes accessing an HTTP server on at least one network device, and evaluating a web page served by the device's HTTP server. The web page is evaluated to determine whether it is similar to a page group from a plurality of page groups, where each of the plurality of page groups comprises a group of web pages similar to other pages in the page group. If the evaluated web page is determined similar to a page group, the page group most similar to the evaluated web page is identified as corresponding to the identity of the network device.

    Gaussian autoencoder detection of network flow anomalies

    公开(公告)号:US11297096B2

    公开(公告)日:2022-04-05

    申请号:US16584552

    申请日:2019-09-26

    Abstract: A method of identifying malicious activity in a computer data sequence includes providing provided the computer data sequence to a network configured to convert the computer data sequence from a high-dimensional space to a low-dimensional space, and processing the computer data sequence in the low-dimensional space to generate an approximately Gaussian distribution. The processed computer data sequence converted to the low dimensional space is evaluated relative to the approximately Gaussian distribution to determine whether the computer data sequence is likely malicious or likely benign, and an output is provided indicating whether the computer data sequence is likely malicious or likely benign.

    DATA SHARING AND STORAGE CONTROL SYSTEM AND METHOD

    公开(公告)号:US20220092198A1

    公开(公告)日:2022-03-24

    申请号:US17028182

    申请日:2020-09-22

    Abstract: A data sharing control method. The method includes detecting a plurality of images on one or more devices operated by a first user, the one or more devices comprising a particular device. A plurality of tags are determined for the plurality of images, and a plurality of settings are received based on the plurality of tags from a second user. A particular image is detected on the particular device. One or more particular tags of the particular image on the particular device are determined, and a sharing action of the particular image by the particular device is blocked based on the plurality of settings and the one or more particular tags.

Patent Agency Ranking