DENSITY ESTIMATION NETWORK FOR UNSUPERVISED ANOMALY DETECTION

    公开(公告)号:US20190124045A1

    公开(公告)日:2019-04-25

    申请号:US16169012

    申请日:2018-10-24

    Abstract: Systems and methods for preventing cyberattacks using a Density Estimation Network (DEN) for unsupervised anomaly detection, including constructing the DEN using acquired network traffic data by performing end-to-end training. The training includes generating low-dimensional vector representations of the network traffic data by performing dimensionality reduction of the network traffic data, predicting mixture membership distribution parameters for each of the low-dimensional representations by performing density estimation using a Gaussian Mixture Model (GMM) framework, and formulating an objective function to estimate an energy and determine a density level of the low-dimensional representations for anomaly detection, with an anomaly being identified when the energy exceeds a pre-defined threshold. Cyberattacks are prevented by blocking transmission of network flows with identified anomalies by directly filtering out the flows using a network traffic monitor.

    NETWORK ENDPOINT SPOOFING DETECTION AND MITIGATION

    公开(公告)号:US20190098049A1

    公开(公告)日:2019-03-28

    申请号:US16101815

    申请日:2018-08-13

    Abstract: Endpoint security systems and methods include a distance estimation module configured to calculate a travel distance between a source Internet Protocol (IP) address and an IP address for a target network endpoint system from a received packet received by the target network endpoint system based on time-to-live (TTL) information from the received packet. A machine learning model is configured to estimate an expected travel distance between the source IP address and the target network endpoint system IP address based on a sparse set of known source/target distances. A spoof detection module is configured to determine that the received packet has a spoofed source IP address based on a comparison between the calculated travel distance and the expected travel distance. A security module is configured to perform a security action at the target network endpoint system responsive to the determination that the received packet has a spoofed source IP address.

    Network management
    44.
    发明授权
    Network management 有权
    网络管理

    公开(公告)号:US09253042B2

    公开(公告)日:2016-02-02

    申请号:US14041102

    申请日:2013-09-30

    CPC classification number: H04L41/12 H04L43/0876 H04L43/10 Y02D30/30

    Abstract: A method implemented in a network apparatus used in a network is disclosed. The method includes sensing network topology and network utilization, receiving a request from an application, deciding path setup requirement using network state information obtained from the network topology and the network utilization, and translating the path setup requirement into a rule to be installed. Other methods, apparatuses, and systems also are disclosed.

    Abstract translation: 公开了一种在网络中使用的网络装置中实现的方法。 该方法包括感知网络拓扑和网络利用率,从应用接收请求,使用从网络拓扑获得的网络状态信息和网络利用率确定路径设置要求,以及将路径设置要求转换为要安装的规则。 还公开了其它方法,装置和系统。

    Policy-Aware Based Method for Deployment of Enterprise Virtual Tenant Networks
    45.
    发明申请
    Policy-Aware Based Method for Deployment of Enterprise Virtual Tenant Networks 有权
    基于策略的企业虚拟租户网络部署方法

    公开(公告)号:US20130185438A1

    公开(公告)日:2013-07-18

    申请号:US13740229

    申请日:2013-01-13

    Abstract: A method for policy-aware mapping of an enterprise virtual tenant network includes receiving inputs from a hosting network and tenants, translating resource demand and policies of the tenants into a network topology and bandwidth demand on each link in the network; pre-arranging a physical resource of a physical topology for clustering servers on the network to form an allocation unit before a VTN allocation; allocating resources of the hosting network to satisfy demand of the tenants in response to a VTN demand request; and conducting a policy aware VTN mapping for enumerating all feasibly resource mappings, bounded by a predetermined counter for outputting optimal mapping with policy-compliant routing paths in the hosting network.

    Abstract translation: 一种用于企业虚拟租户网络的策略感知映射的方法包括从主机网络和租户接收输入,将租户的资源需求和策略转换为网络中每个链路上的网络拓扑和带宽需求; 预先布置物理拓扑的物理资源,用于网络上的聚类服务器,以在VTN分配之前形成分配单元; 分配主机网络的资源以满足VTN需求请求响应租户的需求; 以及执行策略感知VTN映射,用于枚举所有可行的资源映射,其由预定计数器限定,用于在主机网络中输出具有策略兼容路由路径的最佳映射。

    Ordinal time series classification with missing information

    公开(公告)号:US12242542B2

    公开(公告)日:2025-03-04

    申请号:US17408852

    申请日:2021-08-23

    Abstract: A method classifies missing labels. The method computes, using a neural network model trained on training data, rank-based statistics of a feature of a time series segment to attempt to select two candidate labels from the training data that the segment most likely belongs to. The method classifies the segment using k-NN-based classification applied to the training data, responsive to the two candidate labels being present in the training data. The method classifies the segment by hypothesis testing, responsive to only one candidate label being present in the training data. The method classifies the segment into a class with higher values of the rank-based statistics from among a plurality of classes with different values of the rank-based statistics, responsive to no candidate labels being present in the training data. The method corrects a prediction by an applicable one of the classifying steps by majority voting with time windows.

    COMPACT REPRESENTATION AND TIME SERIES SEGMENT RETRIEVAL THROUGH DEEP LEARNING

    公开(公告)号:US20220012538A1

    公开(公告)日:2022-01-13

    申请号:US17364125

    申请日:2021-06-30

    Abstract: Systems and methods for retrieving similar multivariate time series segments are provided. The systems and methods include extracting a long feature vector and a short feature vector from a time series segment, converting the long feature vector into a long binary code, and converting the short feature vector into a short binary code. The systems and methods further include obtaining a subset of long binary codes from a binary dictionary storing dictionary long codes based on the short binary codes, and calculating similarity measure for each pair of the long feature vector with each dictionary long code. The systems and methods further include identifying a predetermined number of dictionary long codes having the similarity measures indicting a closest relationship between the long binary codes and dictionary long codes, and retrieving a predetermined number of time series segments associated with the predetermined number of dictionary long codes.

Patent Agency Ranking