-
公开(公告)号:US20220191242A1
公开(公告)日:2022-06-16
申请号:US17120050
申请日:2020-12-11
Applicant: Google LLC
Inventor: Francois Pepin , Andre Lloyd Perlee Harder , Prajakta Joshi , Amitabha Roy , Saila Talagadadeevi , Emil Kiner , Chia- Tung Kuo , Jiayu Ye
Abstract: A method for mitigating network abuse includes obtaining a first set of network traffic messages of network traffic currently received by a network service and determining, via a first model, whether network abuse is occurring based on the first set of network traffic messages. When the network abuse is occurring, the method includes obtaining a second set of current network traffic messages. The method also includes, for each network traffic message in the second set of network traffic messages, labeling, via a second model, the network traffic message as an abusing network traffic message or a non-abusing network traffic message. The method also includes generating, via a third model, at least one network traffic rule. Each network traffic rule, when implemented, reduces an effect of the abusing network traffic messages.
-
公开(公告)号:US11671446B2
公开(公告)日:2023-06-06
申请号:US17120050
申请日:2020-12-11
Applicant: Google LLC
Inventor: Francois Pepin , Andre Lloyd Perlee Harder , Prajakta Joshi , Amitabha Roy , Saila Talagadadeevi , Emil Kiner , Chia-Tung Kuo , Jiayu Ye
IPC: H04L9/40 , H04L41/142
CPC classification number: H04L63/1458 , H04L41/142 , H04L63/0263 , H04L63/1416
Abstract: A method for mitigating network abuse includes obtaining a first set of network traffic messages of network traffic currently received by a network service and determining, via a first model, whether network abuse is occurring based on the first set of network traffic messages. When the network abuse is occurring, the method includes obtaining a second set of current network traffic messages. The method also includes, for each network traffic message in the second set of network traffic messages, labeling, via a second model, the network traffic message as an abusing network traffic message or a non-abusing network traffic message. The method also includes generating, via a third model, at least one network traffic rule. Each network traffic rule, when implemented, reduces an effect of the abusing network traffic messages.
-
3.
公开(公告)号:US20240250958A1
公开(公告)日:2024-07-25
申请号:US18014287
申请日:2021-12-27
Applicant: GOOGLE LLC
Inventor: Amitabha Roy , Nasrin Baratalipour , Vinit Jogani , Pushkarini Agharkar
IPC: H04L9/40 , G06N3/0464
CPC classification number: H04L63/14 , G06N3/0464
Abstract: A method and system for classifying assets by features of individual entities and relations of the individual entities to the assets using a neural network is disclosed herein. The method comprises aggregating, at each of a plurality of aggregator nodes, data regarding features of each node in each distant neighborhood of a multiplicity of distant neighborhoods; updating, at each of the plurality of aggregator nodes, a state of the aggregator node by assigning a weight to each of the features of the corresponding distant neighborhood; updating, at the seed node, a state of the seed node by performing convolutional analysis of each node in a local neighborhood surrounding the seed node; and determining a label of the seed node based on the state of the seed node.
-
公开(公告)号:US20230308476A1
公开(公告)日:2023-09-28
申请号:US18314532
申请日:2023-05-09
Applicant: Google LLC
Inventor: Francois Pepin , Andre Lloyd Perlee Harder , Prajakta Joshi , Amitabha Roy , Saila Talagadadeevi , Emil Kiner , Chia-Tung Kuo , Jiayu Ye
IPC: H04L9/40 , H04L41/142
CPC classification number: H04L63/1458 , H04L41/142 , H04L63/0263 , H04L63/1416
Abstract: A method for mitigating network abuse includes obtaining a first set of network traffic messages of network traffic currently received by a network service and determining, via a first model, whether network abuse is occurring based on the first set of network traffic messages. When the network abuse is occurring, the method includes obtaining a second set of current network traffic messages. The method also includes, for each network traffic message in the second set of network traffic messages, labeling, via a second model, the network traffic message as an abusing network traffic message or a non-abusing network traffic message. The method also includes generating, via a third model, at least one network traffic rule. Each network traffic rule, when implemented, reduces an effect of the abusing network traffic messages.
-
-
-