Techniques for efficient network security for a web server using anomaly detection

    公开(公告)号:US12192222B2

    公开(公告)日:2025-01-07

    申请号:US18301862

    申请日:2023-04-17

    Applicant: KOUNT INC.

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.

    TECHNIQUES FOR IDENTITY DATA CHARACTERIZATION FOR DATA PROTECTION

    公开(公告)号:US20230291756A1

    公开(公告)日:2023-09-14

    申请号:US18007268

    申请日:2021-07-29

    Applicant: KOUNT INC.

    CPC classification number: H04L63/1425 H04L63/102 H04L63/105

    Abstract: Certain aspects involve a system, computer-implemented method, and computer-readable medium for identifying attributes associated with a target entity such as a person. A hierarchical characterization system receives an attribute and a request for associated identity data. The system generates an identity graph that includes attribute nodes corresponding to respective attributes and online interaction nodes corresponding to respective online interactions. The system correlates at least a subset of the online interactions and at least a subset of the attributes with a particular entity. The system generates a report indicating an identity of the entity and a behavior of the entity based on the correlated online interactions and the correlated attributes.

    TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTION

    公开(公告)号:US20230254333A1

    公开(公告)日:2023-08-10

    申请号:US18301862

    申请日:2023-04-17

    Applicant: KOUNT INC.

    CPC classification number: H04L63/1425 H04L63/1433 H04L63/1458

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.

    PROOF-OF-WORK TECHNIQUES FOR VALIDATING ONLINE ACTIVITIES

    公开(公告)号:US20230229767A1

    公开(公告)日:2023-07-20

    申请号:US18007148

    申请日:2021-07-21

    Applicant: KOUNT INC.

    CPC classification number: G06F21/56 G06F2221/034

    Abstract: Systems and methods for validating online activities through proof-of-work techniques are provided. In one example, a validating computing system receives a request for a proof-of-work instruction from a client device that has submitted an online activity request to an online server system. The validating computing system generates and transmits a proof-of-work instruction for solving a problem to the client device. The validating computing system further receives a response to the proof-of-work instruction from the client device. The validating computing system generates a validity decision based on whether the client device correctly solved the problem, and transmits, to the online server system, the validity decision for use in granting the online activity request to the online server system.

    Techniques for efficient network security for a web server using anomaly detection

    公开(公告)号:US11658994B2

    公开(公告)日:2023-05-23

    申请号:US17754854

    申请日:2021-07-14

    Applicant: KOUNT INC.

    CPC classification number: H04L63/1425 H04L63/1433 H04L63/1458

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.

    NETWORK SECURITY TECHNIQUES COMPARING OBSERVED DISTRIBUTIONS TO BASELINE DISTRIBUTIONS

    公开(公告)号:US20220038481A1

    公开(公告)日:2022-02-03

    申请号:US17389159

    申请日:2021-07-29

    Applicant: KOUNT INC.

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.

    Authenticating users for accurate online audience measurement

    公开(公告)号:US11176573B2

    公开(公告)日:2021-11-16

    申请号:US16513041

    申请日:2019-07-16

    Applicant: Kount Inc.

    Abstract: Online entities oftentimes desire to ascertain information about their audience members. To determine information about audience members and their activities, online transactions including information about transactions performed by audience members are collected. One or more audience analysis processes are applied to the online transactions to determine the collection of online transactions performed by a given audience member. With an accurate assignment of online transaction to the audience member, the audience member and associated transactions may be classified as a legitimate or illegitimate.

    ESTABLISHING UNIQUE SESSIONS FOR DNS SUBSCRIBERS

    公开(公告)号:US20170295133A1

    公开(公告)日:2017-10-12

    申请号:US15633387

    申请日:2017-06-26

    Applicant: Kount Inc.

    Abstract: A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server.

Patent Agency Ranking