Dimensionality reduction for intrusion detection systems in multi-data streams—A review and proposal of unsupervised feature selection scheme
Abstract An Intrusion Detection System (IDS) is a security mechanism that is intended to
dynamically inspect traffic in order to detect any suspicious behaviour or launched attacks …
dynamically inspect traffic in order to detect any suspicious behaviour or launched attacks …
Automatic generation of training data for anomaly detection using other user's data samples
A method (and structure) generates a classifier for an anomalous detection monitor for a
target user on a system or application used by a plurality of users and includes providing an …
target user on a system or application used by a plurality of users and includes providing an …
Modular deep learning model
Y Huang, C Liu, K Kumar, KP Kalgaonkar… - US Patent …, 2019 - Google Patents
The technology described herein uses a modular model to process speech. A deep learning
based acoustic model com prises a stack of different types of neural network layers. The sub …
based acoustic model com prises a stack of different types of neural network layers. The sub …
Cold start mechanism to prevent compromise of automatic anomaly detection systems
F Flacher, G Mermoud, JP Vasseur… - US Patent …, 2017 - Google Patents
In one embodiment, a device in a network analyzes data indicative of a behavior of a
network using a supervised anomaly detection model. The device determines whether the …
network using a supervised anomaly detection model. The device determines whether the …
Clustering and outlier detection in anomaly and causation detection for computing environments
S Dodson, T Veasey - US Patent 11,621,969, 2023 - Google Patents
Clustering and outlier detection in anomaly and causation detection for computing
environments is disclosed. An example method includes receiving an input stream having …
environments is disclosed. An example method includes receiving an input stream having …
Quantitative unified analytic neural networks
KLA Lim - US Patent 10,691,795, 2020 - Google Patents
This document describes a system and method for quantitatively unifying and assimilating
all unstructured, unlabelled and/or fragmented real-time and non-real-time cyber threat data …
all unstructured, unlabelled and/or fragmented real-time and non-real-time cyber threat data …
Facilitating detection of suspicious access to resources
G Apostolopoulos, INB Corrales - US Patent 11,271,939, 2022 - Google Patents
Embodiments of the present invention are directed to facili tating detection of suspicious
access to resources. In accor dance with aspects of the present disclosure, an access graph …
access to resources. In accor dance with aspects of the present disclosure, an access graph …
Word embeddings for anomaly classification from event logs
In a first aspect, a method for training and applying a model to detect and classify anomalies
in event logs is disclosed. The method comprises: building a vocabulary of one or more …
in event logs is disclosed. The method comprises: building a vocabulary of one or more …
Cold start mechanism to prevent compromise of automatic anomaly detection systems
F Flacher, G Mermoud, JP Vasseur… - US Patent …, 2019 - Google Patents
Primary Examiner—Khalil Naghdali (74) Attorney, Agent, or Firm—Parker Ibrahim & Berg
LLP; James M. Behmke; Stephen D. LeBarron (57) ABSTRACT In one embodiment, a …
LLP; James M. Behmke; Stephen D. LeBarron (57) ABSTRACT In one embodiment, a …
Cybersecurity incident response and security operation system employing playbook generation through custom machine learning
DV Forte, M Zambelli, V Letal - US Patent 10,439,884, 2019 - Google Patents
A new cybersecurity incident is registered at a security incident response platform. At a
playbook generation system, details are received of the new cybersecurity incident from the …
playbook generation system, details are received of the new cybersecurity incident from the …