-
公开(公告)号:US20220377096A1
公开(公告)日:2022-11-24
申请号:US17754854
申请日:2021-07-14
Applicant: KOUNT INC.
Inventor: Joshua Michael JOHNSTON , Matthew Lewis JONES , Nathan Daniel MONNIG , Divyanshu Rohit MURLI
IPC: H04L9/40
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.
-
公开(公告)号:US20230254333A1
公开(公告)日:2023-08-10
申请号:US18301862
申请日:2023-04-17
Applicant: KOUNT INC.
Inventor: Joshua Michael JOHNSTON , Matthew Lewis JONES , Nathan Daniel MONNIG , Divyanshu Rohit MURLI
IPC: H04L9/40
CPC classification number: H04L63/1425 , H04L63/1433 , H04L63/1458
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.
-