SYSTEM AND METHOD FOR DETECTING ANOMALIES IN A CYBER-PHYSICAL SYSTEM IN REAL TIME

    公开(公告)号:US20240333742A1

    公开(公告)日:2024-10-03

    申请号:US18618334

    申请日:2024-03-27

    申请人: AO Kaspersky Lab

    IPC分类号: H04L9/40

    CPC分类号: H04L63/1425

    摘要: Disclosed herein are systems and methods for detection of anomalies in a cyber-physical system in real-time. In one aspect, an exemplary method comprises: obtaining, in real-time, randomly distributed stream of observations of CPS parameters; converting an observation of the CPS parameter to a uniform temporal grid (UTG); when at least a criterion for unloading at least one UTG node of the converted observations is satisfied, unloading the UTG nodes corresponding to the satisfied criterion; for each unloaded UTG node, calculating a value of each output CPS parameter of a set of output CPS parameters; and detecting an anomaly in the CPS based on the values of the output CPS parameters.

    SYSTEM FOR IDENTIFYING PATTERNS AND ANOMALIES IN THE FLOW OF EVENTS FROM A CYBER-PHYSICAL SYSTEM

    公开(公告)号:US20240070444A1

    公开(公告)日:2024-02-29

    申请号:US18361976

    申请日:2023-07-31

    申请人: AO Kaspersky Lab

    IPC分类号: G06N3/049 G06N3/08

    CPC分类号: G06N3/049 G06N3/08

    摘要: Disclosed herein are systems for identifying the structure of patterns and anomalies in flow of events from the cyber-physical system or information system. In one aspect, an exemplary method comprises, using at least one connector, getting event data, generating at least one episode consisting of a sequence of events, and transferring the generated episodes to an event processor; and using the event processor, process episodes using a neurosemantic network, wherein the processing includes recognizing events and patterns previously learned by the neurosemantic network, training the neurosemantic network, identifying a structure of patterns by mapping to the patterns of neurons on a hierarchy of layers of the neurosemantic network, attributing events and patterns corresponding to neurons of the neurosemantic network to an anomaly depending on a number of activations of the corresponding neuron, and storing the state of the neurosemantic network.

    Systems and methods for building a honeypot system

    公开(公告)号:US11916959B2

    公开(公告)日:2024-02-27

    申请号:US17645530

    申请日:2021-12-22

    申请人: AO Kaspersky Lab

    IPC分类号: H04L9/40

    CPC分类号: H04L63/1491

    摘要: Systems and methods for building systems of honeypot resources for the detection of malicious objects in network traffic. A system includes at least two gathering tools for gathering data about the computer system on which it is installed, a building tool configured for building at least two virtual environments, each including an emulation tool configured for emulating the operation of the computer system in the virtual environment, and a distribution tool configured for selecting at least one virtual environment for each computer system and for establishing connection between the computer system and the virtual environment.

    Systems and methods for automatic service activation on a computing device

    公开(公告)号:US11803393B2

    公开(公告)日:2023-10-31

    申请号:US16668144

    申请日:2019-10-30

    申请人: AO Kaspersky Lab

    发明人: Ivan I. Tatarinov

    摘要: Disclosed herein are systems and method for automatic activation of a service on a computing device. In an exemplary aspect, a service activation module may link, using an activation model, user behavioral data to an automated activation of the service based on the detecting a prior activation of the service subsequent to receiving the user behavioral data. The service activation module may receive, at a later time, additional sensor data from a plurality of sensors of a computing device. The service activation module may parse the additional sensor data to generate additional user behavioral data. The service activation module may compute, using the activation model, a degree of similarity between the user behavioral data and the additional user behavioral data, and in response to determining that the degree of similarity is greater than a predetermined threshold value, may automatically activating the service on the computing device.

    SYSTEM AND METHOD FOR IDENTIFYING SPAM EMAIL

    公开(公告)号:US20230342482A9

    公开(公告)日:2023-10-26

    申请号:US16673049

    申请日:2019-11-04

    申请人: AO Kaspersky Lab

    摘要: Disclosed herein are systems and method for spam identification. A spam filter module may receive an email at a client device and may determine a signature of the email. The spam filter module may compare the determined signature with a plurality of spam signatures stored in a database. In response to determining that no match exists between the determined signature and the plurality of spam signatures, the spam filter module may placing the email in quarantine. A spam classifier module may extract header information of the email and determine a degree of similarity between known spam emails and the email. In response to determining that the degree of similarity exceeds a threshold, the spam filter module may transfer the email from the quarantine to a spam repository.

    SYSTEM AND METHOD FOR DETECTING A HARMFUL SCRIPT BASED ON A SET OF HASH CODES

    公开(公告)号:US20230297703A1

    公开(公告)日:2023-09-21

    申请号:US17939071

    申请日:2022-09-07

    申请人: AO Kaspersky Lab

    IPC分类号: G06F21/62 G06F21/56

    摘要: Disclosed herein are systems and methods for detecting harmful scripts. In one aspect, an exemplary method comprises, identifying a file containing a script, wherein the identification of the file is performed by analyzing each file of a plurality of files for a presence of a harmful script, generating a summary of the script based on the identified file, calculating static and dynamic parameters of the generated summary of the script, recognizing a script programming language based on the calculated static parameters and dynamic parameters of the generated summary of the script using at least one language recognition rule, processing the identified file based on the data about the recognized script programming language, generating a set of hash codes based on a processed file using rules for generating hash codes, and detecting the harmful script when the generated set of hash codes is similar to known harmful sets of hash codes.