-
公开(公告)号:US11621966B1
公开(公告)日:2023-04-04
申请号:US16794159
申请日:2020-02-18
申请人: DataVisor, Inc.
发明人: Fang Yu , Olivia Wang
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for fraud detection. One of the methods includes partitioning a feature space into a plurality of sub feature spaces, wherein the feature space comprises features associated with user account events for an online service; generating one or more clusters of users for each of one or more sub feature spaces; comparing a feature profile of one or more of the clusters with a global feature profile to determine features of one or more the clusters that have concentrated key values that exceed a respective threshold value; for each of the one or more clusters, scoring the cluster including aggregating the degree to which the key values for features exceed the corresponding threshold values; and based on the scores of the one or more clusters, determining one or more fraud detection actions.
-
公开(公告)号:US11539716B2
公开(公告)日:2022-12-27
申请号:US16526402
申请日:2019-07-30
申请人: DataVisor, Inc.
发明人: Cong A. Meng , Yuetong Wang , Yang Xu , Buodo Li , Ting-Fang Yen , Fang Yu , Yinglian Xie
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for online fraud protection. One of the methods includes receiving a query associated with a user account of an online service provider; providing the query to a deep neural network model to generate a prediction of whether the user account is fraudulent, wherein the deep neural network model is trained using anonymized event data for a collection of users received from one or more online service providers; and providing the prediction to the online service provider.
-
3.
公开(公告)号:US20210117552A1
公开(公告)日:2021-04-22
申请号:US17074463
申请日:2020-10-19
申请人: DataVisor, Inc.
发明人: Alexandros Vlissidis , Nicola Corradi , Fang Yu , Olivia Wang
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting suspicious accounts. One of the methods includes identifying one or more potential clusters of malicious accounts; for each cluster, processing a collection of content associated with each account of the cluster, the processing comprising applying a plurality of models in series to determine whether the collection of content indicates a common pattern; and based on the respective determinations, classifying the accounts of each cluster as ordinary or suspicious.
-
公开(公告)号:US20190207960A1
公开(公告)日:2019-07-04
申请号:US16236976
申请日:2018-12-31
申请人: DataVisor, Inc.
发明人: Kuanyu Chu , Hongyu Cui , Arthur Meng , Zhong Wu , Yunfeng Xi , Yinglian Xie , Ting-Fang Yen , Fang Yu
IPC分类号: H04L29/06 , G06N20/20 , G06F17/18 , G06K9/62 , G06F16/901
CPC分类号: H04L63/1416 , G06F16/9024 , G06F17/18 , G06K9/6215 , G06K9/6218 , G06N20/20 , H04L63/1433
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting network attacks. One of the methods includes obtaining input data associated with a plurality of accounts associated with a particular entity; extracting features from the input data; performing unsupervised attack ring detection using the extracted features, wherein the unsupervised attack ring detection identifies suspicious clusters of accounts that have strong similarity or correlations in the high dimensional feature space; and generating an output for the detected attack rings.
-
公开(公告)号:US20180285745A1
公开(公告)日:2018-10-04
申请号:US15944701
申请日:2018-04-03
申请人: DataVisor Inc.
发明人: Catherine Lu , Patrick Glenn Murray , Ming Qi , Shuo Shan , Yinglian Xie , Fang Yu , Yuhao Zheng
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for rule generation and interaction. A rules engine is provided that does not require manual effort to generate or maintain high-quality rules over time for detecting malicious accounts or events. Rules no longer need to be manually added, tuned, or removed from the system. The system is able to determine the health of each rule and automatically add, tune, and remove rules to maintain a consistent, effective rule set.
-
公开(公告)号:US11522873B2
公开(公告)日:2022-12-06
申请号:US16236976
申请日:2018-12-31
申请人: DataVisor, Inc.
发明人: Kuanyu Chu , Hongyu Cui , Arthur Meng , Zhong Wu , Yunfeng Xi , Yinglian Xie , Ting-Fang Yen , Fang Yu
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting network attacks. One of the methods includes obtaining input data associated with a plurality of accounts associated with a particular entity; extracting features from the input data; performing unsupervised attack ring detection using the extracted features, wherein the unsupervised attack ring detection identifies suspicious clusters of accounts that have strong similarity or correlations in the high dimensional feature space; and generating an output for the detected attack rings.
-
公开(公告)号:US10129288B1
公开(公告)日:2018-11-13
申请号:US14620062
申请日:2015-02-11
申请人: DataVisor Inc.
发明人: Yinglian Xie , Fang Yu
IPC分类号: H04L29/06
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting malicious activities. One of the methods includes obtaining a collection of user event logs or receiving user events through real-time feeds; using data from the user event logs/feeds to determine IP address properties for individual IP addresses and IP address ranges; and for each incoming event, updating the IP address properties for the corresponding IP address and IP prefix properties.
-
公开(公告)号:US20170279845A1
公开(公告)日:2017-09-28
申请号:US15467966
申请日:2017-03-23
申请人: DataVisor Inc.
发明人: Yang-hua Chu , Patrick Glenn Murray , Shuo Shan , Yinglian Xie , Ting-Fang Yen , Fang Yu , Yuhao Zheng , Zilong Zhou
IPC分类号: H04L29/06 , G06F3/0484
CPC分类号: H04L63/1441 , G06F3/0484 , H04L63/1425
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for displaying information about computer network resources identified as engaging in malicious activities. One of the systems includes one or more computers including one or more processors and one or more memory devices, the one or more computers configured to: identify resources associated with an attack, and provide an attach resource dashboard user interface that displays information related to attack resources, wherein the user interface presents resource information comparing behavior of a particular resource at a single online service with behavior of the resource at other online services, and comparing the behavior of that resource with behavior of other resources.
-
公开(公告)号:US11232364B2
公开(公告)日:2022-01-25
申请号:US15944701
申请日:2018-04-03
申请人: DataVisor, Inc.
发明人: Catherine Lu , Patrick Glenn Murray , Ming Qi , Shuo Shan , Yinglian Xie , Fang Yu , Yuhao Zheng
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for rule generation and interaction. A rules engine is provided that does not require manual effort to generate or maintain high-quality rules over time for detecting malicious accounts or events. Rules no longer need to be manually added, tuned, or removed from the system. The system is able to determine the health of each rule and automatically add, tune, and remove rules to maintain a consistent, effective rule set.
-
公开(公告)号:US10110616B1
公开(公告)日:2018-10-23
申请号:US14620029
申请日:2015-02-11
申请人: DataVisor Inc.
发明人: Yinglian Xie , Fang Yu
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting suspicious users. One of the methods includes obtaining a collection of event logs or event feeds associated with a plurality of users to generate a collection of user properties; using the user properties to generate a plurality of groups of events; determining whether one or more groups are suspicious groups; and in response to a determination that one or more groups are suspicious, determining whether there are malicious accounts or events associated with each suspicious group.
-
-
-
-
-
-
-
-
-