-
公开(公告)号:US11924048B2
公开(公告)日:2024-03-05
申请号:US16619745
申请日:2018-06-08
发明人: Maximilien Servajean , Yipeng Cheng
CPC分类号: H04L41/142 , G06F18/2193 , G06F18/23 , G06F18/295 , G06N3/047 , H04L63/1425
摘要: A method of anomaly detection for network traffic communicated by devices via a computer network, the method including clustering a set of time series, each time series including a plurality of time windows of data corresponding to network communication characteristics for a device; training an autoencoder for each cluster based on time series in the cluster; generating a set of reconstruction errors for each autoencoder based on testing the autoencoder with data from time windows of at least a subset of the time series; generating a probabilistic model of reconstruction errors for each autoencoder; and generating an aggregation of the probabilistic models for, in use, detecting reconstruction errors for a time series of data corresponding to network communication characteristics for a device as anomalous.
-
公开(公告)号:US20240073241A1
公开(公告)日:2024-02-29
申请号:US18256438
申请日:2021-11-29
发明人: Alfie BEARD , Pushpinder CHOUHAN , Liming CHEN
IPC分类号: H04L9/40
CPC分类号: H04L63/1441 , H04L63/1416
摘要: An intrusion response system (IRS) can include a knowledge-based intrusion response (IR) component configured to use knowledge of prior responses to prior behavior of at least one computer system to determine a first response to behavior of a target computer system; a prediction-based IR component configured to use at least one trained machine learning (ML) model of behavior of the target computer system to predict a second response to the behavior of the target computer system; and a response component configured to determine an output response to the behavior of the target computer system based on at least one of the first response and the second response.
-
公开(公告)号:US11876572B2
公开(公告)日:2024-01-16
申请号:US17759027
申请日:2020-12-09
发明人: Farhad Mehran , Richard Mackenzie
IPC分类号: H04B17/382 , H04B17/391 , H04L5/00
CPC分类号: H04B17/382 , H04B17/3912 , H04L5/0073
摘要: A method of determining performance of a Radio Access Network (RAN) of a telecommunications network is disclosed in which the RAN covers an area that is divided into a plurality of unit cells. The method includes receiving a measured performance value of the RAN within at least one unit cell of the plurality of unit cells; receiving a simulated performance value of the RAN within each of the plurality of unit cells; identifying a unit cell that is associated with both a measured performance value and a simulated performance value; calculating, for the identified unit cell, a difference function between the simulated performance value and the measured performance value; and applying the difference function to the simulated performance value of at least one adjacent unit cell to the identified unit cell to determine a modified simulated performance value for the at least one adjacent unit cell.
-
公开(公告)号:US11856029B2
公开(公告)日:2023-12-26
申请号:US17346987
申请日:2021-06-14
发明人: Daniel Bastos , Fadi Ali El-Moussa , Behnam Azvine
CPC分类号: H04L63/20 , G06F16/2379 , G06N20/00 , H04L63/10
摘要: The present disclosure relates to securing networks against attacks launched via connection of peripheral devices to networked devices. According to one aspect, there is provided a computer-implemented method of automatically updating a network security policy, the method comprising: running a machine learning algorithm to continuously update a plurality of weighting coefficients associated with a respective plurality of threat factors, the threat factors each having values defined for each of a plurality of requests for respective peripheral devices to connect to one or more networked devices which are communicably coupled to a secure network; and automatically updating a security policy associated with the secure network in respect of a particular threat factor when that threat factor's associated weighting coefficient changes by more than a predetermined amount in a predetermined period, wherein requests for peripheral devices to connect to the networked devices are automatically approved or denied in dependence on that policy.
-
公开(公告)号:US11838079B2
公开(公告)日:2023-12-05
申请号:US17250977
申请日:2019-09-13
发明人: Linglong Dai , Bichai Wang , Richard Mackenzie , Mo Hao , Xinyu Gao
IPC分类号: H04B7/0456 , H01Q3/24 , H01Q3/38 , H01Q15/02
CPC分类号: H04B7/0469 , H01Q3/24 , H01Q3/38 , H01Q15/02
摘要: According to the present disclosure there is provided a multiple-input-multiple-output (MIMO) transmitter for transmitting wireless communication signals over a communication channel to a receiver, the transmitter including a digital signal processor configured to perform pre-coding on a plurality Ns of data streams; a plurality NRF of radio-frequency (RF) chains each configured to pass a pre-coded data stream from the digital signal processor to generate a signal representing that data stream; a lens antenna array comprising an array of NT antenna elements; and a selecting unit coupled between the plurality NRF of RF chains and the lens antenna array, the selecting unit including a plurality of separate coupling units each configured to couple a respective RF chain to a selective sub-array of NTBRF antenna elements concurrently for transmitting the signal representing the data stream passed through that RF chain.
-
公开(公告)号:US20230379355A1
公开(公告)日:2023-11-23
申请号:US18247128
申请日:2021-09-29
IPC分类号: H04L9/40
CPC分类号: H04L63/1441 , H04L63/1416 , G16Y30/10
摘要: A computer implemented security method for a set of internet-of-things (IoT) devices, the set of devices comprising network-connected sensors and actuators, wherein a data repository stores data about the devices, actions performable by each of the devices and one or more network attacks to which at least a subset of the devices are susceptible, the method comprising: defining, for each network attack, one or more responsive actions for the attack, each responsive action identifying one or more performable actions for performance by one or more devices to mitigate the attack; detecting a device in a compromised state, the compromised state being determined based on a threshold number of occurrences of an attack perpetrated against the device; selecting responsive actions for the perpetrated attack; and triggering the responsive actions to mitigate the perpetrated attack.
-
公开(公告)号:US11812320B2
公开(公告)日:2023-11-07
申请号:US17597851
申请日:2020-06-09
IPC分类号: H04W36/00 , H04W36/24 , G06V10/764 , G06V20/00 , H04W36/08
CPC分类号: H04W36/24 , G06V10/764 , G06V20/00 , H04W36/08
摘要: This disclosure provides a method, and a network node for implementing the method, of initiating a transfer in a cellular telecommunications network, wherein the cellular telecommunications network comprises a User Equipment (UE) and a base station, wherein the UE includes a camera, the method including storing visual data including a visual representation of at least a part of the base station; receiving visual data captured by the camera of the UE; performing a computer vision operation, trained on the stored visual data, on the captured visual data to determine that the visual representation of the base station or part thereof is present in the captured visual data; and, initiating a transfer of the UE to the base station.
-
公开(公告)号:US20230353452A1
公开(公告)日:2023-11-02
申请号:US18309935
申请日:2023-05-01
IPC分类号: H04L41/082 , G06F8/65 , H04L67/00 , H04L67/12
CPC分类号: H04L41/082 , G06F8/65 , H04L67/34 , H04L67/12
摘要: A method of managing a network of connected network devices can include detecting that a device descriptor file for a first network device has been updated and stored to a data store managed by a peer-to-peer network of computing systems; analyzing the updated device descriptor file stored to the data store; analyzing historical information stored in the data store regarding other device descriptor file updates related to the first network device or related to other network devices; performing predictive analytics processing on the results of the analyzing and generating a result; and storing the result of the performing predictive analytics processing to the data store.
-
公开(公告)号:US20230344501A1
公开(公告)日:2023-10-26
申请号:US18254431
申请日:2021-10-12
发明人: Farhad MEHRAN , Richard MACKENZIE
CPC分类号: H04B7/0695 , H04W52/143 , H04W52/283
摘要: A network node for a wireless telecommunications network, and a method of operating a network node, are disclosed. The wireless telecommunications network includes a first access point having a first transmitter configured to transmit in a first coverage area, and the method can include receiving, from a sensor, data indicative of an object within the first coverage area of the first access point's first transmitter; determining, from the data, that the object is an illegitimate user; and, in response, causing a modification of the first access point so that the object cannot successfully receive a transmission from the first transmitter.
-
公开(公告)号:US11775653B2
公开(公告)日:2023-10-03
申请号:US16762283
申请日:2018-10-11
发明人: Mark Shackleton , Fadi El-Moussa
IPC分类号: G06F21/57 , G06F21/54 , G06N20/00 , G06F9/455 , G06F18/214
CPC分类号: G06F21/577 , G06F9/45558 , G06F18/214 , G06F21/54 , G06N20/00 , G06F2009/45587
摘要: A computer implemented method to determine a security configuration for a target virtual machine (VM) in a virtualized computing environment, the method including training a machine learning algorithm to determine a vector of security vulnerabilities for the target VM based on a vector of configuration characteristics for the target VM, the machine learning algorithm being trained using training examples each including a configuration for a training VM and an associated vulnerability vector based on an observed security occurrence at the training VM, wherein each training example further includes an identification of one of set of security configurations for the training VM; selecting at least a subset of the set of security configurations and, for each security configuration in the subset, executing the machine learning algorithm with the vector of configuration characteristics for the target VM and an identification of the security configuration, so as to generate a set of vulnerability vectors including a vulnerability vector for each security configuration in the selected subset; and selecting a security configuration for the target VM based on the set of vulnerability vectors.
-
-
-
-
-
-
-
-
-