Network security system and methods for encoding network connectivity for activity classification

    公开(公告)号:US10749882B2

    公开(公告)日:2020-08-18

    申请号:US15957221

    申请日:2018-04-19

    摘要: Aspects are generally directed to network security systems and methods of monitoring network activity. In one example, a network security system includes and interface to receive a Hypertext Transfer Protocol (HTTP) network log that includes a matrix of data, a feature extraction component configured to extract a connectivity matrix from the HTTP network log based on a recurring pattern within the matrix of data, and a training module configured to provide deep learning architecture training data based on the connectivity matrix. The system may include a deep learning architecture configured to receive and propagate the training data through one or more layers thereof to train the one or more layers, and being configured to generate a general data representation of the HTTP network log. The system may include a behavior analytics component to detect a discordant network activity within the HTTP network log based on the general data representation.

    METHODS AND SYSTEMS FOR ELIMINATING AND REDUCING ATTACK SURFACES THROUGH EVALUATING RECONFIGURATIONS

    公开(公告)号:US20200252418A1

    公开(公告)日:2020-08-06

    申请号:US16444630

    申请日:2019-06-18

    IPC分类号: H04L29/06

    摘要: A method of performing a security assessment of a system includes analyzing a static structure of the system; storing, in a semantic system model, structure information about the static structure of the system; observing the system during a plurality of discrete temporal system states; storing, in the semantic system model, dynamic information about the system during the plurality of discrete temporal system states; performing a semantic composition analysis on the structure information to identify at least one vulnerability of the system; performing a flow analysis on the dynamic information to identify at least one anomalous behavior of the system during at least one of the plurality of discrete temporal system states; and generating, based on the at least one vulnerability of the system and the at least one anomalous behavior of the system, a vulnerability assessment of the system.

    SYSTEM AND METHOD FOR PROTECTING NETWORK-FACING SERVICES

    公开(公告)号:US20200228538A1

    公开(公告)日:2020-07-16

    申请号:US16248211

    申请日:2019-01-15

    IPC分类号: H04L29/06

    摘要: A system for performing security functions in a service-oriented computer system includes a router node configured to forward at least one packet of at least one service request to at least one server computer adapted to process the at least one service request; a first server node configured to execute, for the at least one packet, a first protocol layer of a network protocol stack, determine whether the at least one packet is compliant at the first protocol layer, and provide the at least one packet to a second server node responsive to determining that the at least one packet is compliant at the first protocol layer. The second server node is configured to execute, for the at least one packet, a second protocol layer of the network protocol stack, and determine whether the at least one packet is compliant at the second protocol layer.

    SUPERCONDUCTING MICROWAVE SWITCH
    37.
    发明申请

    公开(公告)号:US20200136612A1

    公开(公告)日:2020-04-30

    申请号:US16558017

    申请日:2019-08-30

    摘要: A microwave switch. In some embodiments, the microwave switch includes a substrate, a signal conductor, a first ground conductor, on a first side of the signal conductor, and a second ground conductor, on a second side of the signal conductor. The signal conductor, the first ground conductor, and the second ground conductor may be planar conductors on a planar top surface of the substrate. The signal conductor may have a first portion composed of a superconducting material, and a second portion having a reduced cross section, a cross-sectional area of the second portion being less than 120 nm.

    NETWORK SECURITY SYSTEM AND METHODS FOR ENCODING NETWORK CONNECTIVITY FOR ACTIVITY CLASSIFICATION

    公开(公告)号:US20190327252A1

    公开(公告)日:2019-10-24

    申请号:US15957221

    申请日:2018-04-19

    IPC分类号: H04L29/06 G06N3/08

    摘要: Aspects are generally directed to network security systems and methods of monitoring network activity. In one example, a network security system includes and interface to receive a Hypertext Transfer Protocol (HTTP) network log that includes a matrix of data, a feature extraction component configured to extract a connectivity matrix from the HTTP network log based on a recurring pattern within the matrix of data, and a training module configured to provide deep learning architecture training data based on the connectivity matrix. The system may include a deep learning architecture configured to receive and propagate the training data through one or more layers thereof to train the one or more layers, and being configured to generate a general data representation of the HTTP network log. The system may include a behavior analytics component to detect a discordant network activity within the HTTP network log based on the general data representation.

    ENHANCED VECTOR-BASED IDENTIFICATION OF CIRCUIT TROJANS

    公开(公告)号:US20190108344A1

    公开(公告)日:2019-04-11

    申请号:US15728469

    申请日:2017-10-09

    摘要: A system and method for detecting Trojans and other intermittent severe defects in a digital circuit design. A simulation of the digital circuit design results in a value change dump file, which is compiled to form a value change summary file containing counts of the numbers of value changes for the signals in the digital circuit design. A discriminative neural network analyzes the value change summary file to determine whether an intermittent severe defect is present. A corpus of digital circuit designs, with and without intermittent severe defects, is used to train the discriminative neural network. The training process may involve dimensionality reduction of the data, enlargement of the data set, and data compression using an autoencoder.

    Holevo capacity achieving joint detection receiver

    公开(公告)号:US10193722B2

    公开(公告)日:2019-01-29

    申请号:US14985099

    申请日:2015-12-30

    发明人: Saikat Guha

    摘要: An optical receiver may include a unitary transformation operator to receive an n-symbol optical codeword associated with a codebook, and to perform a unitary transformation on the received optical codeword to generate a transformed optical codeword, where the unitary transformation is based on the codebook. The optical receiver may further include n optical detectors, where a particular one of the n optical detectors is to detect a particular optical symbol of the transformed optical codeword, and to determine whether the particular optical symbol corresponds to a first optical symbol or a second optical symbol. The optical receiver may also include a decoder to construct a codeword based on the determinations, and to decode the constructed codeword into a message using the codebook. The optical receiver may attain superadditive capacity, and, with an optimal code, may attain the Holevo limit to reliable communication data rates.