Event-triggered behavior analysis

    公开(公告)号:US11295011B2

    公开(公告)日:2022-04-05

    申请号:US16242396

    申请日:2019-01-08

    Applicant: VMware, Inc.

    Abstract: Certain aspects herein provide a system and method for performing behavior analysis for a computing device by a computing system. In certain aspects, a method includes detecting an event occurring at the computing device at a first time, determining, based on the detecting, an event category of the event, and collecting first one or more behaviors associated with the determined event category occurring on the computing device based. The method also includes comparing the first one or more behaviors with a dataset indicating one or more expected behaviors of the computing device associated with the event. Upon determining that at least one of the first one or more behaviors corresponds to an unexpected behavior based on the comparing, the method further includes taking one or more remedial actions.

    Entropy based security detection system

    公开(公告)号:US10860712B2

    公开(公告)日:2020-12-08

    申请号:US16032349

    申请日:2018-07-11

    Applicant: VMware, Inc.

    Abstract: A virtual computing instance (VCI) is protected against security threats by a security manager, monitoring a behavior of a VCI over an observation period. The method further includes, storing by the security manager a digital profile in a first database, wherein the digital profile comprises information indicative of the behavior. The method further includes, accessing by a detection system, the digital profile from the first database, and accessing by the detection system, an intended state associated with VCI, wherein the intended state comprises information indicative of a behavior from a second VCI. The method further includes, comparing at least part of the digital profile to the at least part of the intended state. The method further includes, determining by the detection system, that the VCI contains a security threat when information indicative of a behavior in the digital profile is an outlier.

    Adaptive anomaly detection for computer systems

    公开(公告)号:US11122065B2

    公开(公告)日:2021-09-14

    申请号:US16103108

    申请日:2018-08-14

    Applicant: VMware, Inc.

    Abstract: Feature vectors are abstracted from data describing application processes. The feature vectors are grouped to define non-anomalous clusters of feature vectors corresponding to normal application behavior. Subsequent feature vectors are considered anomalous if they do not fall within one of the non-anomalous clusters; alerts are issued for anomalous feature vectors. In addition, the subsequent feature vectors may be used to regroup feature vectors to adapt to changes in what constitutes normal application behavior.

    Machine Learning-Based Techniques for Representing Computing Processes as Vectors

    公开(公告)号:US20210027121A1

    公开(公告)日:2021-01-28

    申请号:US16518808

    申请日:2019-07-22

    Applicant: VMware, Inc.

    Abstract: Machine learning-based techniques for representing computing processes as vectors are provided. In one set of embodiments, a computer system can receive a name of a computing process and context information pertaining to the computing process. The computer system can further train a neural network based on the name and the context information, where the training results in determination of weight values for one or more hidden layers of the neural network. The computer system can then generate, based on the weight values, a vector representation of the computing process that encodes the context information and can perform one or more analyses using the vector representation.

    Holo-entropy adaptive boosting based anomaly detection

    公开(公告)号:US11620180B2

    公开(公告)日:2023-04-04

    申请号:US16205138

    申请日:2018-11-29

    Applicant: VMware, Inc.

    Abstract: A computer-implemented method for determining whether data is anomalous includes generating a holo-entropy adaptive boosting model using, at least in part, a set of normal data. The holo-entropy adaptive boosting model includes a plurality of holo-entropy models and associated model weights for combining outputs of the plurality of holo-entropy models. The method further includes receiving additional data, and determining at least one of whether the additional data is normal or abnormal relative to the set of normal data or a score indicative of how abnormal the additional data is using, at least in part, the generated holo-entropy adaptive boosting model.

    Holo-entropy based alarm scoring approach

    公开(公告)号:US11258655B2

    公开(公告)日:2022-02-22

    申请号:US16212170

    申请日:2018-12-06

    Applicant: VMware, Inc.

    Abstract: A method for managing alarms in a virtual machine environment includes receiving alarm data related to a process and storing the alarm data in a database, where the alarm data comprises one or more features. The method further includes retrieving intended state information for the process and comparing the one more features of the alarm data to the intended state information to determine whether the alarm is an outlier. The method also includes computing a normal score for the alarm if the alarm is not an outlier, and computing an abnormal score for the alarm if the alarm is an outlier. The method also includes sending a notification for the alarm and the computed score.

Patent Agency Ranking