TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTION

    公开(公告)号:US20220377096A1

    公开(公告)日:2022-11-24

    申请号:US17754854

    申请日:2021-07-14

    Applicant: KOUNT INC.

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.

    TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTION

    公开(公告)号:US20230254333A1

    公开(公告)日:2023-08-10

    申请号:US18301862

    申请日:2023-04-17

    Applicant: KOUNT INC.

    CPC classification number: H04L63/1425 H04L63/1433 H04L63/1458

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.

Patent Agency Ranking