-
公开(公告)号:US10469514B2
公开(公告)日:2019-11-05
申请号:US14743875
申请日:2015-06-18
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jisheng Wang , Min-yi Shen , Prasad Palkar , Sriram Ramachandran
Abstract: Collaborative and adaptive threat intelligence. Data collected on a first customer network is received. One or more local models are trained with at least the received data, where the one or more local models are related to security. An amount of data to transmit to a centralized controller is determined based at least on a result of the training one or more local models and the determined amount of data is transmitted to the centralized controller. Result data is received from the centralized controller that is a result of one or more global models trained on the centralized controller using data collected on multiple customer networks including the first customer network. The one or more local models are adjusted using the received result data and the one or more adjusted local models are trained.
-
公开(公告)号:US11048822B2
公开(公告)日:2021-06-29
申请号:US16875965
申请日:2020-05-15
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
公开(公告)号:US20200279055A1
公开(公告)日:2020-09-03
申请号:US16875965
申请日:2020-05-15
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
公开(公告)号:US10657286B2
公开(公告)日:2020-05-19
申请号:US14994954
申请日:2016-01-13
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
-
-