Dimensionality reduction for intrusion detection systems in multi-data streams—A review and proposal of unsupervised feature selection scheme

NY Almusallam, Z Tari, P Bertok, AY Zomaya - Emergent Computation: a …, 2017 - Springer
Abstract An Intrusion Detection System (IDS) is a security mechanism that is intended to
dynamically inspect traffic in order to detect any suspicious behaviour or launched attacks …

Automatic generation of training data for anomaly detection using other user's data samples

SN Chari, IM Molloy, Y Park - US Patent 10,147,049, 2018 - Google Patents
A method (and structure) generates a classifier for an anomalous detection monitor for a
target user on a system or application used by a plurality of users and includes providing an …

Modular deep learning model

Y Huang, C Liu, K Kumar, KP Kalgaonkar… - US Patent …, 2019 - Google Patents
The technology described herein uses a modular model to process speech. A deep learning
based acoustic model com prises a stack of different types of neural network layers. The sub …

Cold start mechanism to prevent compromise of automatic anomaly detection systems

F Flacher, G Mermoud, JP Vasseur… - US Patent …, 2017 - Google Patents
In one embodiment, a device in a network analyzes data indicative of a behavior of a
network using a supervised anomaly detection model. The device determines whether the …

Clustering and outlier detection in anomaly and causation detection for computing environments

S Dodson, T Veasey - US Patent 11,621,969, 2023 - Google Patents
Clustering and outlier detection in anomaly and causation detection for computing
environments is disclosed. An example method includes receiving an input stream having …

Quantitative unified analytic neural networks

KLA Lim - US Patent 10,691,795, 2020 - Google Patents
This document describes a system and method for quantitatively unifying and assimilating
all unstructured, unlabelled and/or fragmented real-time and non-real-time cyber threat data …

Facilitating detection of suspicious access to resources

G Apostolopoulos, INB Corrales - US Patent 11,271,939, 2022 - Google Patents
Embodiments of the present invention are directed to facili tating detection of suspicious
access to resources. In accor dance with aspects of the present disclosure, an access graph …

Word embeddings for anomaly classification from event logs

A Pande, V Ahuja - US Patent 10,530,795, 2020 - Google Patents
In a first aspect, a method for training and applying a model to detect and classify anomalies
in event logs is disclosed. The method comprises: building a vocabulary of one or more …

Cold start mechanism to prevent compromise of automatic anomaly detection systems

F Flacher, G Mermoud, JP Vasseur… - US Patent …, 2019 - Google Patents
Primary Examiner—Khalil Naghdali (74) Attorney, Agent, or Firm—Parker Ibrahim & Berg
LLP; James M. Behmke; Stephen D. LeBarron (57) ABSTRACT In one embodiment, a …

Cybersecurity incident response and security operation system employing playbook generation through custom machine learning

DV Forte, M Zambelli, V Letal - US Patent 10,439,884, 2019 - Google Patents
A new cybersecurity incident is registered at a security incident response platform. At a
playbook generation system, details are received of the new cybersecurity incident from the …