MACHINE-LEARNING TECHNIQUES FOR DETECTION OF UNAUTHORIZED ACCESS OF INTERACTIVE COMPUTING ENVIRONMENT FUNCTIONS

    公开(公告)号:US20230283628A1

    公开(公告)日:2023-09-07

    申请号:US18040627

    申请日:2021-08-04

    Applicant: KOUNT INC.

    CPC classification number: H04L63/1433 H04L63/1416 H04L41/16

    Abstract: An online security analysis system determines a categorical value in an online activity and also determines conversion factors that are associated with the categorical value. Based on the conversion factors, the online security analysis system identifies at least one aggregated value for a numerical feature that is associated with previous online activities for the categorical value. In addition, the online security analysis system generates an embedding vector that describes the aggregated value associated with the categorical value. The embedding vector is provided to an online activity analysis model that is trained to generate prediction data for the online activity, based on the aggregated values associated with the categorical value. The prediction data is transmitted to an online system for use in controlling access of a client device to a function of the online system.

    TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTION

    公开(公告)号:US20220377096A1

    公开(公告)日:2022-11-24

    申请号:US17754854

    申请日:2021-07-14

    Applicant: KOUNT INC.

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.

    TECHNIQUES FOR IDENTITY DATA CHARACTERIZATION FOR DATA PROTECTION

    公开(公告)号:US20230291756A1

    公开(公告)日:2023-09-14

    申请号:US18007268

    申请日:2021-07-29

    Applicant: KOUNT INC.

    CPC classification number: H04L63/1425 H04L63/102 H04L63/105

    Abstract: Certain aspects involve a system, computer-implemented method, and computer-readable medium for identifying attributes associated with a target entity such as a person. A hierarchical characterization system receives an attribute and a request for associated identity data. The system generates an identity graph that includes attribute nodes corresponding to respective attributes and online interaction nodes corresponding to respective online interactions. The system correlates at least a subset of the online interactions and at least a subset of the attributes with a particular entity. The system generates a report indicating an identity of the entity and a behavior of the entity based on the correlated online interactions and the correlated attributes.

    TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTION

    公开(公告)号:US20230254333A1

    公开(公告)日:2023-08-10

    申请号:US18301862

    申请日:2023-04-17

    Applicant: KOUNT INC.

    CPC classification number: H04L63/1425 H04L63/1433 H04L63/1458

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.

Patent Agency Ranking