-
公开(公告)号:US11818155B2
公开(公告)日:2023-11-14
申请号:US17568399
申请日:2022-01-04
发明人: Wesley Kenneth Cobb , Ming-Jung Seow , Curtis Edward Cole, Jr. , Cody Shay Falcon , Benjamin A. Konosky , Charles Richard Morgan , Aaron Poffenberger , Thong Toan Nguyen
IPC分类号: H04L9/40 , G06N20/00 , G06F40/30 , G06F40/226 , G06F40/242 , G06F40/289 , G06F40/40 , G06F40/247 , G06F40/253 , G06F40/284
CPC分类号: H04L63/1425 , G06F40/226 , G06F40/242 , G06F40/289 , G06F40/30 , G06N20/00 , H04L63/1408 , G06F40/247 , G06F40/253 , G06F40/284 , G06F40/40
摘要: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
-
公开(公告)号:US10735446B2
公开(公告)日:2020-08-04
申请号:US15978150
申请日:2018-05-13
发明人: Wesley Kenneth Cobb , Ming-Jung Seow , Curtis Edward Cole , Cody Shay Falcon , Benjamin A. Konosky , Charles Richard Morgan , Aaron Poffenberger , Thong Toan Nguyen
IPC分类号: H04L29/06 , G06N20/00 , G06F40/30 , G06F40/226 , G06F40/242 , G06F40/289 , G06F40/40 , G06F40/247 , G06F40/253 , G06F40/284
摘要: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
-