System for determining anomalies associated with a request

    公开(公告)号:US10382461B1

    公开(公告)日:2019-08-13

    申请号:US15165221

    申请日:2016-05-26

    Abstract: Described are techniques for identifying anomalous and non-anomalous requests based on metric values determined from a request. Weights to be associated with particular metric values may be determined based on metric data for those values. The metric data may indicate a total number of accesses by requests having a particular metric value, a frequency of access, or particular access times. Based on the weight values and the metric values for the request, a security score for the request may be determined. The security score may indicate a confidence that the request is anomalous or non-anomalous. Potentially anomalous requests may be determined to be non-anomalous if the metric values correspond to known sets of metric values, determined from previous requests. In some cases, metric data may be normalized prior to use to facilitate faster queries and conserve available data storage.

    Crowdsourced analysis of decontextualized data

    公开(公告)号:US10002177B1

    公开(公告)日:2018-06-19

    申请号:US14028360

    申请日:2013-09-16

    CPC classification number: G06F16/284 G06F16/24575

    Abstract: Techniques are described for employing a crowdsourcing framework to analyze data related to the performance or operations of computing systems, or to analyze other types of data. A question is analyzed to determine data that is relevant to the question. The relevant data may be decontextualized to remove or alter contextual information included in the data, such as sensitive, personal, or business-related data. The question and the decontextualized data may then be presented to workers in a crowdsourcing framework, and the workers may determine an answer to the question based on an analysis or an examination of the decontextualized data. The answers may be combined, correlated, or otherwise processed to determine a processed answer to the question.

    Learning-based data decontextualization
    5.
    发明授权
    Learning-based data decontextualization 有权
    基于学习的数据解密

    公开(公告)号:US09342796B1

    公开(公告)日:2016-05-17

    申请号:US14028396

    申请日:2013-09-16

    CPC classification number: G06N99/005

    Abstract: Techniques are described for employing a crowdsourcing framework to analyze data related to the performance or operations of computing systems, or to analyze other types of data. A question is analyzed to determine data that is relevant to the question. The relevant data may be decontextualized to remove or alter contextual information included in the data, such as sensitive, personal, or business-related data. The question and the decontextualized data may then be presented to workers in a crowdsourcing framework, and the workers may determine an answer to the question based on an analysis or an examination of the decontextualized data. The answers may be combined, correlated, or otherwise processed to determine a processed answer to the question. Machine learning techniques are employed to adjust and refine the decontextualization.

    Abstract translation: 描述了使用众包框架来分析与计算系统的性能或操作相关的数据或分析其他类型的数据的技术。 分析一个问题来确定与问题相关的数据。 相关数据可以被解构化以去除或改变包括在数据中的上下文信息,诸如敏感的,个人的或与业务有关的数据。 然后可以在众包框架中将问题和解构图数据提供给工人,并且工作人员可以基于分析或检验解构数据来确定问题的答案。 答案可以组合,相关或以其他方式处理,以确定问题的处理答案。 机器学习技术被用于调整和完善解构文化。

    Systems and methods identifying and reacting to potentially malicious activity
    7.
    发明授权
    Systems and methods identifying and reacting to potentially malicious activity 有权
    识别和对潜在恶意活动作出反应的系统和方法

    公开(公告)号:US09154515B1

    公开(公告)日:2015-10-06

    申请号:US14134596

    申请日:2013-12-19

    Abstract: Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are systems, methods and devices for enabling a user device to implement functions for dynamically identifying and reacting to potentially malicious activity. In one example, a user device configures a sentinel node to identify potentially malicious behavior by causing the sentinel node to analyze data from selected emitter nodes and selected algorithms. The user device may also specify how the sentinel node reacts to potential malicious activity.

    Abstract translation: 信息安全可能包括防止未经授权的访问,使用,披露,修改,销毁等信息。 这里描述了使得用户设备能够实现用于动态地识别潜在恶意活动并对其进行反应的功能的系统,方法和设备。 在一个示例中,用户设备通过使得前哨节点分析来自所选发射机节点和所选算法的数据来配置哨兵节点以识别潜在的恶意行为。 用户设备还可以指定前哨节点如何对潜在的恶意活动做出反应。

    Adapting decoy data present in a network
    8.
    发明授权
    Adapting decoy data present in a network 有权
    适应网络中存在的诱饵数据

    公开(公告)号:US09152808B1

    公开(公告)日:2015-10-06

    申请号:US13849772

    申请日:2013-03-25

    Abstract: Disclosed are various embodiments for obtaining policy data specifying decoy data eligible to be inserted within a response to an access of a data store. The decoy data is detected in the response among a plurality of non-decoy data based at least upon the policy data. An action associated with the decoy data is initiated in response to the access of the data store meeting a configurable threshold.

    Abstract translation: 公开了用于获得策略数据的各种实施例,该策略数据指定在对数据存储的访问的响应中有资格插入的诱饵数据。 至少基于策略数据,在多个非诱饵数据之间的响应中检测诱饵数据。 响应于满足可配置阈值的数据存储的访问,启动与诱饵数据相关联的动作。

Patent Agency Ranking