Scanning of files in a customer account of a cloud service for cybersecurity

    公开(公告)号:US12130922B1

    公开(公告)日:2024-10-29

    申请号:US17967647

    申请日:2022-10-17

    IPC分类号: G06F21/55 G06F21/56

    摘要: A cloud computing infrastructure hosts a web service with customer accounts. In a customer account, files of the customer account are listed in an index. Files indicated in the index are arranged in groups, with files in each group being scanned using scanning serverless functions in the customer account. The files in the customer account include a compressed tar archive of a software container. Member files of a compressed tar archive in a customer account are randomly-accessed by way of locators that indicate a tar offset, a logical offset, and a decompressor state for a corresponding member file. A member file is accessed by seeking to the tar offset in the compressed tar archive, restoring a decompressor to the decompressor state, decompressing the compressed tar archive using the decompressor, and moving to the logical offset in the decompressed data in memory.

    Privacy protection for customer events logs of cybersecurity events

    公开(公告)号:US12019782B1

    公开(公告)日:2024-06-25

    申请号:US17530680

    申请日:2021-11-19

    IPC分类号: G06F21/62 H04L9/32 H04L9/40

    摘要: System and methods of analyzing customer events logs for cybersecurity with privacy protection are disclosed. Events logs of cybersecurity events are received from customer computers. Customers in the events logs are represented with ring signatures. Candidate features that occur in a group of events are identified in the events logs. A candidate feature is analyzed, based on corresponding ring signatures, to determine if the candidate feature can be attributed to a customer or a limited number of customers. If so, the candidate feature is considered private and is discarded. Otherwise, the candidate feature is retained as public data suitable for use in cybersecurity operations.

    Graph-based anomaly detection for cybersecurity

    公开(公告)号:US11907368B1

    公开(公告)日:2024-02-20

    申请号:US17534727

    申请日:2021-11-24

    发明人: Peng Ye Jingchen Ke

    IPC分类号: G06F21/55

    摘要: Anomalous activities on a computer network are detected from audit or sign-in activity information of a target entity as recorded in an audit or sign-in log. A baseline graph of the target entity is generated using information on activities of the target entity during a collection period. A predict graph of the target entity is generated with information on activities of the target entity during another collection period, which follows and is shorter than the earlier collection period. A residual graph that indicates nodes or edges that are in the predict graph but not in the baseline graph is generated. The residual graph is scored and the score is compared to a threshold to determine whether the target entity has performed an anomalous activity.