Scanning of files in a customer account of a cloud service for cybersecurity

    公开(公告)号:US12130922B1

    公开(公告)日:2024-10-29

    申请号:US17967647

    申请日:2022-10-17

    IPC分类号: G06F21/55 G06F21/56

    摘要: A cloud computing infrastructure hosts a web service with customer accounts. In a customer account, files of the customer account are listed in an index. Files indicated in the index are arranged in groups, with files in each group being scanned using scanning serverless functions in the customer account. The files in the customer account include a compressed tar archive of a software container. Member files of a compressed tar archive in a customer account are randomly-accessed by way of locators that indicate a tar offset, a logical offset, and a decompressor state for a corresponding member file. A member file is accessed by seeking to the tar offset in the compressed tar archive, restoring a decompressor to the decompressor state, decompressing the compressed tar archive using the decompressor, and moving to the logical offset in the decompressed data in memory.

    Privacy protection for customer events logs of cybersecurity events

    公开(公告)号:US12019782B1

    公开(公告)日:2024-06-25

    申请号:US17530680

    申请日:2021-11-19

    IPC分类号: G06F21/62 H04L9/32 H04L9/40

    摘要: System and methods of analyzing customer events logs for cybersecurity with privacy protection are disclosed. Events logs of cybersecurity events are received from customer computers. Customers in the events logs are represented with ring signatures. Candidate features that occur in a group of events are identified in the events logs. A candidate feature is analyzed, based on corresponding ring signatures, to determine if the candidate feature can be attributed to a customer or a limited number of customers. If so, the candidate feature is considered private and is discarded. Otherwise, the candidate feature is retained as public data suitable for use in cybersecurity operations.

    Graph-based anomaly detection for cybersecurity

    公开(公告)号:US11907368B1

    公开(公告)日:2024-02-20

    申请号:US17534727

    申请日:2021-11-24

    发明人: Peng Ye Jingchen Ke

    IPC分类号: G06F21/55

    摘要: Anomalous activities on a computer network are detected from audit or sign-in activity information of a target entity as recorded in an audit or sign-in log. A baseline graph of the target entity is generated using information on activities of the target entity during a collection period. A predict graph of the target entity is generated with information on activities of the target entity during another collection period, which follows and is shorter than the earlier collection period. A residual graph that indicates nodes or edges that are in the predict graph but not in the baseline graph is generated. The residual graph is scored and the score is compared to a threshold to determine whether the target entity has performed an anomalous activity.

    Methods and arrangement for preventing spam comments without application specific changes

    公开(公告)号:US11841918B1

    公开(公告)日:2023-12-12

    申请号:US16554211

    申请日:2019-08-28

    发明人: Chia Li

    摘要: A method for preventing spam comments from populating a web site is provided. The method includes intercepting a HTTP (Hypertext Transfer Protocol) response, which includes a web page with a form for enabling a client's general comments to be published on the web site. The method also includes modifying the web page with the form to create a modified web page with a randomized form. The modifying includes randomly adding a set of randomized variable names to the web page with the form. The set of randomized variable names is a set of randomly generated character strings. The method further includes forwarding the modified web page with the randomized form to the client. The method yet also includes adding the set of randomized variable name to a form database, which is configured for storing data about the modified web page with the randomized form.

    System and method for detecting malicious scripts

    公开(公告)号:US11574053B1

    公开(公告)日:2023-02-07

    申请号:US16239942

    申请日:2019-01-04

    摘要: An endpoint system receives a target file for evaluation for malicious scripts. The original content of the target file is normalized and stored in a normalized buffer. Tokens in the normalized buffer are translated to symbols, which are stored in a tokenized buffer. Strings in the normalized buffer are stored in a string buffer. Tokens that are indicative of syntactical structure of the normalized content are extracted from the normalized buffer and stored in a structure buffer. The content of the tokenized buffer and counts of tokens represented as symbols in the tokenized buffer are compared against heuristic rules indicative of malicious scripts. The contents of the tokenized buffer and string buffer are compared against signatures of malicious scripts. The contents of the tokenized buffer, string buffer, and structure buffer are input to a machine learning model that has been trained to detect malicious scripts.

    Context-aware machine learning system

    公开(公告)号:US11568301B1

    公开(公告)日:2023-01-31

    申请号:US15884660

    申请日:2018-01-31

    IPC分类号: G06N20/00 H04L9/40

    摘要: A machine learning system includes multiple machine learning models. A target object, such as a file, is scanned for machine learning features. Context information of the target object, such as the type of the object and how the object was received in a computer, is employed to select a machine learning model among the multiple machine learning models. The machine learning model is also selected based on threat intelligence, such as census information of the target object. The selected machine learning model makes a prediction using machine learning features extracted from the target object. The target object is allowed or blocked depending on whether or not the prediction indicates that the target object is malicious.

    Decryption of encrypted network traffic using an inline network traffic monitor

    公开(公告)号:US11539755B1

    公开(公告)日:2022-12-27

    申请号:US17208167

    申请日:2021-03-22

    发明人: Kevin G. Boyce

    IPC分类号: H04L9/40 H04L9/08

    摘要: An inline network traffic monitor is deployed inline between two endpoints of a computer network. A particular endpoint of the two endpoints works in conjunction with the inline network traffic monitor to decrypt encrypted network traffic transmitted between the two endpoints. A series of Change Cipher Spec (CCS) messages is exchanged between the inline network traffic monitor and the particular endpoint during a Transport Layer Security (TLS) handshake between the two endpoints. The series of CCS messages allows the particular endpoint and the inline network traffic monitor to detect each other on the computer network. After detecting each other's presence, the particular endpoint sends the inline network traffic monitor a session key that is used by the two endpoints to encrypt their network traffic. The inline network traffic monitor uses the session key to decrypt encrypted data of the network traffic transmitted between the two endpoints.

    Automatic charset and language detection with machine learning

    公开(公告)号:US11449794B1

    公开(公告)日:2022-09-20

    申请号:US16547211

    申请日:2019-08-21

    发明人: Lili Diao

    IPC分类号: G06N20/00 G06F40/16 G06F40/30

    摘要: Language-based machine learning approach for automatically detecting universal charset and the language of a received document is disclosed. The language-based machine learning approach employs a plurality of text document samples in different languages, after converting them to a selected Unicode style (if their original encoding schemes are not the selected Unicode), to generate a plurality of language-based machine learning models during the training stage. During the application stage, vector representations of the received document for different combinations of charsets and their respective applicable languages are tested against the plurality of machine learning models to ascertain the charset and language combination that is most similar to its associated machine learning model, thereby identifying the charset and language of the received document.