Mining non-linear dependencies via a neighborhood mixture model

    公开(公告)号:US11281990B2

    公开(公告)日:2022-03-22

    申请号:US15635995

    申请日:2017-06-28

    Abstract: A computer-implemented method for simultaneous metric learning and variable selection in non-linear regression is presented. The computer-implemented method includes introducing a dataset and a target variable, creating a univariate neighborhood probability map for each reference point of the dataset, and determining a pairwise distance between each reference point and other points within the dataset. The computer-implemented method further includes computing a Hessian matrix of a quadratic programming (QP) problem, performing optimization of the QP problem, re-weighing data derived from the optimization of the QP problem, and performing non-linear regression on the re-weighed data.

    Content-aware anomaly detection and diagnosis

    公开(公告)号:US10581665B2

    公开(公告)日:2020-03-03

    申请号:US15793358

    申请日:2017-10-25

    Abstract: Methods and systems for detecting a system fault include determining a network of broken correlations for a current timestamp, relative to a predicted set of correlations, based on a current set of sensor data. The network of broken correlations for the current timestamp is compared to networks of broken correlations for previous timestamps to determine a fault propagation pattern. It is determined whether a fault has occurred based on the fault propagation pattern. A system management action is performed if a fault has occurred.

    Mobile phone with system failure prediction using long short-term memory neural networks

    公开(公告)号:US10296430B2

    公开(公告)日:2019-05-21

    申请号:US15478753

    申请日:2017-04-04

    Abstract: Mobile phones and methods for mobile phone failure prediction include receiving respective log files from one or more mobile phone components, including at least one user application. The log files have heterogeneous formats. A likelihood of failure of one or more mobile phone components is determined based on the received log files by clustering the plurality of log files according to structural log patterns and determining feature representations of the log files based on the log clusters. A user is alerted to a potential failure if the likelihood of component failure exceeds a first threshold. An automatic system control action is performed if the likelihood of component failure exceeds a second threshold.

    Ranking causal anomalies via temporal and dynamical analysis on vanishing correlations

    公开(公告)号:US10289471B2

    公开(公告)日:2019-05-14

    申请号:US15420949

    申请日:2017-01-31

    Abstract: A method is provided for root cause anomaly detection in an invariant network having a plurality of nodes that generate time series data. The method includes modeling anomaly propagation in the network. The method includes reconstructing broken invariant links in an invariant graph based on causal anomaly ranking vectors. Each broken invariant link involves a respective node pair formed from the plurality of nodes such that one of the nodes in the respective node pair has an anomaly. Each causal anomaly ranking vector is for indicating a respective node anomaly status for a given one of the plurality of nodes when paired. The method includes calculating a sparse penalty of the casual anomaly ranking vectors to obtain a set of time-dependent anomaly rankings. The method includes performing temporal smoothing of the set of rankings, and controlling an anomaly-initiating one of the plurality of nodes based on the set of rankings.

    SYSTEM AND METHOD FOR DETECTING SECURITY RISKS IN A COMPUTER SYSTEM

    公开(公告)号:US20190121973A1

    公开(公告)日:2019-04-25

    申请号:US16169081

    申请日:2018-10-24

    Abstract: A system and method are provided for identifying security risks in a computer system. The system includes an event stream generator configured to collect system event data from the computer system. The system further includes a query device configured to receive query requests that specify parameters of a query. Each query request includes at least one anomaly model. The query request and the anomaly model are included in a first syntax in which a system event is expressed as {subject-operation-object}. The system further includes a detection device configured to receive at least one query request from the query device and continuously compare the system event data to the anomaly models of the query requests to detect a system event that poses a security risk. The system also includes a reporting device configured to generate an alert for system events that pose a security risk detected by the detection device.

    MULTIBYTE HETEROGENEOUS LOG PREPROCESSING
    9.
    发明申请

    公开(公告)号:US20180060314A1

    公开(公告)日:2018-03-01

    申请号:US15659131

    申请日:2017-07-25

    CPC classification number: G06F16/1794 G06F16/258

    Abstract: Methods and systems for log management include pre-processing heterogeneous logs and performing a log management action on the pre-processed plurality of heterogeneous logs. Pre-processing the logs includes performing a fixed tokenization of the heterogeneous logs based on a predefined set of symbols, performing a flexible tokenization of the heterogeneous logs based on a user-defined set of rules, converting timestamps in the heterogeneous logs to a single target timestamp format, and performing structural log tokenization of the heterogeneous logs based on user-defined structural information.

Patent Agency Ranking