Rule-based annotation service in a cloud platform

    公开(公告)号:US11700221B2

    公开(公告)日:2023-07-11

    申请号:US15982192

    申请日:2018-05-17

    CPC classification number: H04L51/212 H04L51/08 H04L51/18 H04L67/10 H04L67/568

    Abstract: Systems and methods are disclosed for subscribing to messages generated from a plurality of edge devices. One method comprises receiving, at a cloud platform from a plurality of edge devices, a plurality of messages that comply with a common schema and receiving, at the cloud platform from a custom application, an annotation stream request to generate at least one annotation stream and an annotation filter request to generate one or more annotation filters. The at least one annotation stream and the one or more annotation filters are then generated by the cloud platform. Based on the one or more filters, one or more of the plurality of messages are published, by the cloud platform, to the at least one annotation stream.

    SECURITY LOG MINING DEVICES, METHODS, AND SYSTEMS
    2.
    发明申请
    SECURITY LOG MINING DEVICES, METHODS, AND SYSTEMS 有权
    安全采矿设备,方法和系统

    公开(公告)号:US20160149941A1

    公开(公告)日:2016-05-26

    申请号:US14550059

    申请日:2014-11-21

    CPC classification number: H04L63/1425 G06F17/30539 G06F21/552

    Abstract: Devices, methods, and systems for security log mining are described herein. One method includes combining, using a data fusion unit of an access control system, features of structured and non-structured data associated with system access events for a number of users into a combined data set, generating, using an anomaly detection engine of the access control system, a model of behavior for the number of users based on the combined data set, and comparing, using the anomaly detection engine of the access control system, real time behavior for the number of users to the model for the number of users to determine whether the real time behavior for the number of users is anomalous behavior for the number of users.

    Abstract translation: 本文描述了用于安全日志挖掘的设备,方法和系统。 一种方法包括使用访问控制系统的数据融合单元将与多个用户的系统访问事件相关联的结构化和非结构化数据的特征组合成组合数据集,使用访问的异常检测引擎 控制系统,基于组合数据集的用户数的行为模型,并且比较使用访问控制系统的异常检测引擎,用户对于用户数量的模型的实时行为 确定用户数量的实时行为是否是用户数量的异常行为。

Patent Agency Ranking