-
公开(公告)号:US11496492B2
公开(公告)日:2022-11-08
申请号:US16540969
申请日:2019-08-14
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Unum Sarfraz , Mohan Parthasarathy , Brijesh Nambiar , Min-Yi Shen , Viswesh Ananthakrishnan
Abstract: Systems and methods are provided for managing false positives in a network anomaly detection system. The methods may include receiving a plurality of anomaly reports; extracting fields, and values for the fields, from each of the anomaly reports; grouping the anomaly reports into a plurality of groups according to association rule learning, wherein each group is defined by a respective rule; for each group, creating a cluster based on common values for the fields; and marking each cluster as a possible false positive anomaly cluster.
-
公开(公告)号:US20200267146A1
公开(公告)日:2020-08-20
申请号:US16278517
申请日:2019-02-18
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Brijesh Nambiar , Manisha Singh
Abstract: An integrated network security enforcement system is provided. Information from a network access control (NAC) device, network analytics engine (NAE) executing on a network analytics server (NAS), and a network controller are used to control network access of a client device and associated user. A login session for the user may be monitored by the NAE. Events based on risk analysis of user-initiated actions are sent to the NAC device and/or the network controller. Events may indicate to take action with respect to the client device (or user). For example, user-initiated actions that cumulatively appear as a security threat on a device (and possibly other devices) may be isolated or forced to re-authenticate. Risk assessment may be reduced if higher levels of authentication are performed by the user. Two-factor, or biometric authentication may allow greater risk (e.g., reduced risk assessment) than a login session using a single password.
-
公开(公告)号:US10657286B2
公开(公告)日:2020-05-19
申请号:US14994954
申请日:2016-01-13
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
公开(公告)号:US11048822B2
公开(公告)日:2021-06-29
申请号:US16875965
申请日:2020-05-15
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
公开(公告)号:US20200279055A1
公开(公告)日:2020-09-03
申请号:US16875965
申请日:2020-05-15
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
-
-
-