Computer security attack detection using distribution departure

    公开(公告)号:US10536482B2

    公开(公告)日:2020-01-14

    申请号:US15469539

    申请日:2017-03-26

    Abstract: Described technologies automatically detect computing system security attacks. Departure of occurrence distributions, which are based on leading digit(s) of digital item occurrence data, from model distributions that correspond to particular data sources, indicates a presence likelihood for particular attack types. Some model distributions exhibit Benford's Phenomenon. Described mechanisms detect security attack types such as ransomware, bitcoin mining, and others, using particular corresponding data sources such as file extensions, processor statistics, etc. Mechanisms detect security attacks without a captured baseline of healthy normal behavior, and without relying on malware code signatures. When an item occurrence distribution departs from a model distribution by at least a predefined degree, the technology electronically raises a security attack alert. Then countermeasures may be asserted for a possible type X security attack on the computing system. Countermeasures may include more computationally intensive tests for determining the precise extent or precise nature of an attack, for instance.

    INTELLIGENT AUTOMATIC MERGING OF SOURCE CONTROL QUEUE ITEMS

    公开(公告)号:US20180314517A1

    公开(公告)日:2018-11-01

    申请号:US15499702

    申请日:2017-04-27

    CPC classification number: G06F8/71 G06F11/3668

    Abstract: Methods for intelligent automatic merging of source control queue items are performed by systems and apparatuses. Project changes are submitted in build requests to a gated check-in build queue requiring successful builds to commit changes to a code repository according to source control. Multiple pending build requests in the build queue are intelligently and automatically merged into a single, pending merged request based on risk factor values associated with the build requests. For merged requests successfully built, files in the build requests are committed and the build requests are removed from the queue. Merged requests unsuccessfully built are divided into equal subsets based on updated risk factor values using information from the unsuccessful build. Successful builds of subsets allow for committing of files and removal from the build queue, while unsuccessful builds are further divided and processed until single build requests are processed to identify root cause errors.

    Intelligent automatic merging of source control queue items

    公开(公告)号:US11500626B2

    公开(公告)日:2022-11-15

    申请号:US16870171

    申请日:2020-05-08

    Abstract: Methods for intelligent automatic merging of source control queue items are performed by systems and apparatuses. Project changes are submitted in build requests to a gated check-in build queue requiring successful builds to commit changes to a code repository according to source control. Multiple pending build requests in the build queue are intelligently and automatically merged into a single, pending merged request based on risk factor values associated with the build requests. For merged requests successfully built, files in the build requests are committed and the build requests are removed from the queue. Merged requests unsuccessfully built are divided into equal subsets based on updated risk factor values using information from the unsuccessful build. Successful builds of subsets allow for committing of files and removal from the build queue, while unsuccessful builds are further divided and processed until single build requests are processed to identify root cause errors.

    Query optimizer for CPU utilization and code refactoring

    公开(公告)号:US10558458B2

    公开(公告)日:2020-02-11

    申请号:US15174688

    申请日:2016-06-06

    Abstract: Methods, systems, apparatuses, and computer program products are provided for increasing an efficiency of queries in program code. A plurality of queries is detected in program code. A laziness is extended by which the queries are evaluated in the program code. The queries are decomposed into a plurality of query components. A ruleset that includes a plurality of rules is applied to the query components to generate a functionally equivalent query set to the plurality of queries that evaluates more efficiently relative to the plurality of queries.

    QUERY OPTIMIZER FOR CPU UTILIZATION AND CODE REFACTORING

    公开(公告)号:US20170351512A1

    公开(公告)日:2017-12-07

    申请号:US15174688

    申请日:2016-06-06

    Abstract: Methods, systems, apparatuses, and computer program products are provided for increasing an efficiency of queries in program code. A plurality of queries is detected in program code. A laziness is extended by which the queries are evaluated in the program code. The queries are decomposed into a plurality of query components. A ruleset that includes a plurality of rules is applied to the query components to generate a functionally equivalent query set to the plurality of queries that evaluates more efficiently relative to the plurality of queries.

    Remediation for ransomware attacks on cloud drive folders

    公开(公告)号:US10715533B2

    公开(公告)日:2020-07-14

    申请号:US15375001

    申请日:2016-12-09

    Abstract: A system for detecting by a cloud service a ransomware attack on a client device is provided. The system monitors changes to files of the client device that are stored by the cloud service. The system assesses whether a change to a file appears to be malicious in that the change may be caused by ransomware. When the change to the file appears to be malicious, the system performs a countermeasure to prevent synchronization of files of the client device with other client devices and with the cloud service to prevent the propagating of files from the client device, which is undergoing a ransomware attack.

    Detecting malicious usage of certificates

    公开(公告)号:US10250587B2

    公开(公告)日:2019-04-02

    申请号:US15282656

    申请日:2016-09-30

    Abstract: The misuse of public key, private key, and public/private key certificates poses significant security challenges to computer networks that are addressed by certificate monitoring. Certificate monitoring allows network administrators to detect and remedy poor security practices related to public key certificates and to detect and combat the malicious use of public key certificates in a centralized environment. Best practices and detection methods and systems are developed over time via machine learning to improve network security, and any detected misuse may be brought to a network administrator's attention or automatically remedied.

    DETECTING MALICIOUS USAGE OF CERTIFICATES
    8.
    发明申请

    公开(公告)号:US20180097803A1

    公开(公告)日:2018-04-05

    申请号:US15282656

    申请日:2016-09-30

    CPC classification number: H04L63/0823 H04L63/0815 H04L63/14

    Abstract: The misuse of public key, private key, and public/private key certificates poses significant security challenges to computer networks that are addressed by certificate monitoring. Certificate monitoring allows network administrators to detect and remedy poor security practices related to public key certificates and to detect and combat the malicious use of public key certificates in a centralized environment. Best practices and detection methods and systems are developed over time via machine learning to improve network security, and any detected misuse may be brought to a network administrator's attention or automatically remedied.

    REMEDIATION FOR RANSOMWARE ATTACKS ON CLOUD DRIVE FOLDERS

    公开(公告)号:US20180034835A1

    公开(公告)日:2018-02-01

    申请号:US15375001

    申请日:2016-12-09

    Abstract: A system for detecting by a cloud service a ransomware attack on a client device is provided. The system monitors changes to files of the client device that are stored by the cloud service. The system assesses whether a change to a file appears to be malicious in that the change may be caused by ransomware. When the change to the file appears to be malicious, the system performs a countermeasure to prevent synchronization of files of the client device with other client devices and with the cloud service to prevent the propagating of files from the client device, which is undergoing a ransomware attack.

    INTELLIGENT AUTOMATIC MERGING OF SOURCE CONTROL QUEUE ITEMS

    公开(公告)号:US20200264871A1

    公开(公告)日:2020-08-20

    申请号:US16870171

    申请日:2020-05-08

    Abstract: Methods for intelligent automatic merging of source control queue items are performed by systems and apparatuses. Project changes are submitted in build requests to a gated check-in build queue requiring successful builds to commit changes to a code repository according to source control. Multiple pending build requests in the build queue are intelligently and automatically merged into a single, pending merged request based on risk factor values associated with the build requests. For merged requests successfully built, files in the build requests are committed and the build requests are removed from the queue. Merged requests unsuccessfully built are divided into equal subsets based on updated risk factor values using information from the unsuccessful build. Successful builds of subsets allow for committing of files and removal from the build queue, while unsuccessful builds are further divided and processed until single build requests are processed to identify root cause errors.

Patent Agency Ranking