Mapping between raw anomaly scores and transformed anomaly scores

    公开(公告)号:US11263104B2

    公开(公告)日:2022-03-01

    申请号:US16426850

    申请日:2019-05-30

    IPC分类号: G06F11/30 G06K9/62 G06F11/34

    摘要: In some examples, a system is to, given an anomaly score threshold over which at least one anomalous point is to be observed in a test set of points with a specified probability, determine, using raw anomaly scores for a training set of points, a first mapping between raw anomaly scores in a first range and first transformed anomaly scores using a first transformation technique. The system is to determine, using the raw anomaly scores for the training set of points, a second mapping between raw anomaly scores in a second range greater than the first range and second transformed anomaly scores using a second transformation technique different from the first transformation technique. The system is to use the first mapping and the second mapping to detect an anomaly in a computing environment based on the test set of points.

    RISK SCORES FOR ENTITIES
    3.
    发明申请

    公开(公告)号:US20180336353A1

    公开(公告)日:2018-11-22

    申请号:US15596041

    申请日:2017-05-16

    摘要: In some examples, a system receives anomaly scores regarding an entity from a plurality of detectors, produces a weighted anomaly score for the entity based on the anomaly scores and respective weights assigned to the plurality of detectors, the weights based on historical performance of the plurality of detectors, determines an impact based on a context of the entity, wherein the impact is indicative of an effect that the entity would have on a computing environment if the entity were to exhibit anomalous behavior, and computes a risk score for the entity based on the weighted anomaly score and the determined impact.

    MAPPING BETWEEN RAW ANOMALY SCORES AND TRANSFORMED ANOMALY SCORES

    公开(公告)号:US20200379863A1

    公开(公告)日:2020-12-03

    申请号:US16426850

    申请日:2019-05-30

    IPC分类号: G06F11/30 G06F11/34 G06K9/62

    摘要: In some examples, a system is to, given an anomaly score threshold over which at least one anomalous point is to be observed in a test set of points with a specified probability, determine, using raw anomaly scores for a training set of points, a first mapping between raw anomaly scores in a first range and first transformed anomaly scores using a first transformation technique. The system is to determine, using the raw anomaly scores for the training set of points, a second mapping between raw anomaly scores in a second range greater than the first range and second transformed anomaly scores using a second transformation technique different from the first transformation technique. The system is to use the first mapping and the second mapping to detect an anomaly in a computing environment based on the test set of points.

    ANOMALOUS ENTITY DETERMINATIONS
    6.
    发明申请

    公开(公告)号:US20180337935A1

    公开(公告)日:2018-11-22

    申请号:US15596042

    申请日:2017-05-16

    IPC分类号: H04L29/06

    摘要: In some examples, a system generates a graphical representation of entities associated with a computing environment, and derives features for the entities represented by the graphical representation, the features comprising neighborhood features and link-based features, a neighborhood feature for a first entity of the entities derived based on entities that are neighbors of the first entity in the graphical representation, and a link-based feature for the first entity derived based on relationships of other entities in the graphical representation with the first entity. The system determines, using a plurality of anomaly detectors based on respective features of the derived features, whether the first entity is exhibiting anomalous behavior.

    EXTRACTING FEATURES FOR AUTHENTICATION EVENTS

    公开(公告)号:US20190065762A1

    公开(公告)日:2019-02-28

    申请号:US15689045

    申请日:2017-08-29

    IPC分类号: G06F21/60 H04L29/06 G06F17/30

    摘要: In some examples, for a given authentication event between a plurality of devices in a network, a system identifies a set of events, at the devices, that are temporally related to the given authentication event. The system extracts features from the set of events by aggregating event data of the set of events. The system provides the extracted features to a classifier that detects unauthorized authentication events.

    UNAUTHORIZED AUTHENTICATION EVENTS
    10.
    发明申请

    公开(公告)号:US20190065739A1

    公开(公告)日:2019-02-28

    申请号:US15689043

    申请日:2017-08-29

    摘要: In some examples, for a given authentication event between a plurality of devices in a network, a system identifies a set of events, at the devices, that are temporally related to the given authentication event. The system applies a classifier on a collection of features associated with the set of events, and determines, based on an output of the classifier, whether the given authentication event is an unauthorized authentication event.