-
公开(公告)号:US11601452B2
公开(公告)日:2023-03-07
申请号:US16658797
申请日:2019-10-21
Applicant: Verint Systems Ltd.
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US20170104778A1
公开(公告)日:2017-04-13
申请号:US15291331
申请日:2016-10-12
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
CPC classification number: H04L63/1425 , G06F21/552 , G06F2221/034 , G06N20/00 , H04L63/1408 , H04L63/1441
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US20200053114A1
公开(公告)日:2020-02-13
申请号:US16658797
申请日:2019-10-21
Applicant: Verint Systems Ltd.
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US20180260705A1
公开(公告)日:2018-09-13
申请号:US15911223
申请日:2018-03-05
Applicant: Verint Systems Ltd.
Inventor: Rami Puzis , Asaf Shabtai , Gershon Celniker , Liron Rosenfeld , Ziv Katzir , Edita Grolman
CPC classification number: G06N3/08 , G06N3/0454 , G06Q30/02 , H04L67/22 , H04W4/21
Abstract: Methods and systems for analyzing encrypted traffic, such as to identify, or “classify,” the user actions that generated the traffic. Such classification is performed, even without decrypting the traffic, based on features of the traffic. Such features may include statistical properties of (i) the times at which the packets in the traffic were received, (ii) the sizes of the packets, and/or (iii) the directionality of the packets. To classify the user actions, a processor receives the encrypted traffic and ascertains the types (or “classes”) of user actions that generated the traffic. Unsupervised or semi-supervised transfer-learning techniques may be used to perform the classification process. Using transfer-learning techniques facilitates adapting to different runtime environments, and to changes in the patterns of traffic generated in these runtime environments, without requiring the large amount of time and resources involved in conventional supervised-learning techniques.
-
公开(公告)号:US10454958B2
公开(公告)日:2019-10-22
申请号:US15291331
申请日:2016-10-12
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
-
-
-