Private-learned IDS
    12.
    发明授权

    公开(公告)号:US10708284B2

    公开(公告)日:2020-07-07

    申请号:US15643573

    申请日:2017-07-07

    Abstract: In one embodiment, a device in a network maintains a plurality of machine learning-based detectors for an intrusion detection system. Each detector is associated with a different portion of a feature space of traffic characteristics assessed by the intrusion detection system. The device provides data regarding the plurality of detectors to a user interface. The device receives an adjustment instruction from the user interface based on the data provided to the user interface regarding the plurality of detectors. The device adjusts the portions of the feature space associated with the plurality of detectors based on the adjustment instruction received from the user interface.

    Discovering yet unknown malicious entities using relational data

    公开(公告)号:US10320823B2

    公开(公告)日:2019-06-11

    申请号:US14844379

    申请日:2015-09-03

    Abstract: Data is collected from a database arrangement about behavior of observed entities, wherein the collected data includes one or more features associated with the observed entities. A probabilistic model is determined that correlates the one or more features with malicious and/or benign behavior of the observed entities. Data is collected from the database arrangement for unobserved entities that have at least one common feature with at least one of the observed entities. One of the unobserved entities is determined to be a malicious entity based on the at least one common feature and the probabilistic model. Network policies are applied to packets sent from the malicious entity.

    Detection of malicious executable files using hierarchical models

    公开(公告)号:US11113397B2

    公开(公告)日:2021-09-07

    申请号:US16413880

    申请日:2019-05-16

    Abstract: In one embodiment, a device disassembles an executable file into assembly instructions. The device maps each of the assembly instructions to a fixed length instruction vector using one-hot encoding and an instruction vocabulary and forms vector representations of blocks of a control flow graph for corresponding functions of the executable file by embedding and aggregating bags of the instruction vectors. The device generates, based on the vector representations of the blocks of the control flow graph, a call graph model of the functions in the executable file. The device forms a vector representation of the executable file based in part on the call graph model. The device determines, based on the vector representation of the executable file, whether the executable file is malware.

    Identifying malicious executables by analyzing proxy logs

    公开(公告)号:US09992216B2

    公开(公告)日:2018-06-05

    申请号:US15040285

    申请日:2016-02-10

    Abstract: Identifying malicious executables by analyzing proxy logs includes, at a server having connectivity to the Internet, retrieving sets of proxy logs from a plurality of proxy servers. Each proxy server of the plurality of proxy servers is associated with a network and generates network traffic logs for one or more nodes included in the network. Then, a set of executables hosted by each of the one or more nodes associated with each of the plurality of proxy servers is determined. Each set of executables is analyzed to detect a specific executable and portions of each of the network traffic logs that are associated with the specific executable are identified. An alert is generated indicating the portions of each of the network traffic logs as likely to be associated with the specific executable.

    LEARNING INDICATORS OF COMPROMISE WITH HIERARCHICAL MODELS

    公开(公告)号:US20180063163A1

    公开(公告)日:2018-03-01

    申请号:US15248252

    申请日:2016-08-26

    CPC classification number: H04L67/02 H04L63/1425

    Abstract: Presented herein are techniques for classifying devices as being infected with malware based on learned indicators of compromise. A method includes receiving at a security analysis device, traffic flows from a plurality of entities destined for a plurality of users, aggregating the traffic flows into discrete bags of traffic, wherein the bags of traffic comprise a plurality of flows of traffic for a given user over a predetermined period of time, extracting features from the bags of traffic and aggregating the features into per-flow feature vectors, aggregating the per-flow feature vectors into per-destination domain aggregated vectors, combining the per-destination-domain aggregated vectors into a per-user aggregated vector, and classifying a computing device used by a given user as infected with malware when indicators of compromise detected in the bags of traffic indicate that the per-user aggregated vector for the given user includes suspicious features among the extracted features.

    IDENTIFYING MALICIOUS EXECUTABLES BY ANALYZING PROXY LOGS

    公开(公告)号:US20170230388A1

    公开(公告)日:2017-08-10

    申请号:US15040285

    申请日:2016-02-10

    Abstract: Identifying malicious executables by analyzing proxy logs includes, at a server having connectivity to the Internet, retrieving sets of proxy logs from a plurality of proxy servers. Each proxy server of the plurality of proxy servers is associated with a network and generates network traffic logs for one or more nodes included in the network. Then, a set of executables hosted by each of the one or more nodes associated with each of the plurality of proxy servers is determined. Each set of executables is analyzed to detect a specific executable and portions of each of the network traffic logs that are associated with the specific executable are identified. An alert is generated indicating the portions of each of the network traffic logs as likely to be associated with the specific executable.

    DISCOVERING YET UNKNOWN MALICIOUS ENTITIES USING RELATIONAL DATA
    20.
    发明申请
    DISCOVERING YET UNKNOWN MALICIOUS ENTITIES USING RELATIONAL DATA 审中-公开
    使用关系数据发现未知的恶意软件

    公开(公告)号:US20160337389A1

    公开(公告)日:2016-11-17

    申请号:US14844379

    申请日:2015-09-03

    CPC classification number: H04L63/1425 G06Q50/01 H04L63/1441

    Abstract: Data is collected from a database arrangement about behavior of observed entities, wherein the collected data includes one or more features associated with the observed entities. A probabilistic model is determined that correlates the one or more features with malicious and/or benign behavior of the observed entities. Data is collected from the database arrangement for unobserved entities that have at least one common feature with at least one of the observed entities. One of the unobserved entities is determined to be a malicious entity based on the at least one common feature and the probabilistic model. Network policies are applied to packets sent from the malicious entity.

    Abstract translation: 从关于观察到的实体的行为的数据库布置中收集数据,其中所收集的数据包括与所观察到的实体相关联的一个或多个特征。 确定将一个或多个特征与观察到的实体的恶意和/或良性行为相关联的概率模型。 从与观察到的实体中的至少一个具有至少一个共同特征的未观察实体的数据库布置中收集数据。 基于至少一个共同特征和概率模型,将未观察实体之一确定为恶意实体。 网络策略适用于从恶意实体发送的数据包。

Patent Agency Ranking