ACTIVITY MODEL FOR DETECTING SUSPICIOUS USER ACTIVITY
    2.
    发明申请
    ACTIVITY MODEL FOR DETECTING SUSPICIOUS USER ACTIVITY 审中-公开
    用于检测可疑用户活动的活动模型

    公开(公告)号:WO2016115182A1

    公开(公告)日:2016-07-21

    申请号:PCT/US2016/013118

    申请日:2016-01-13

    IPC分类号: G06F21/55 G06F21/31

    摘要: Embodiments are directed to generating an account process profile based on meta-events and to detecting account behavior anomalies based on account process profiles. In one scenario, a computer system accesses an indication of which processes were initiated by an account over a specified period of time. The computer system analyzes at least some of the processes identified in the indication to extract features associated with the processes. The computer system assigns the processes to meta-events based on the extracted features, where each meta-event is a representation of how the processes are executed within the computer system. The computer system then generates an account process profile for the account based on the meta-events, where the account process profile provides a comprehensive view of the account's behavior over the specified period of time. This account process profile can be used to identify anomalies in process execution.

    摘要翻译: 实施例涉及基于元事件来生成帐户流程简档,并且基于帐户流程简档来检测帐户行为异常。 在一种情况下,计算机系统访问在特定时间段内帐户启动哪些进程的指示。 计算机系统分析指示中识别的至少一些进程以提取与进程相关联的特征。 计算机系统基于提取的特征将进程分配给元事件,其中每个元事件是如何在计算机系统内执行进程的表示。 计算机系统然后基于元事件生成帐户的帐户流程简档,其中帐户流程简档提供了在指定时间段内账户行为的综合视图。 此帐户流程配置文件可用于识别流程执行中的异常。

    AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS

    公开(公告)号:WO2023048921A1

    公开(公告)日:2023-03-30

    申请号:PCT/US2022/042279

    申请日:2022-09-01

    摘要: Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.

    SERVICE ACCOUNT PREDICTION USING USER NAME
    4.
    发明申请

    公开(公告)号:WO2020068231A1

    公开(公告)日:2020-04-02

    申请号:PCT/US2019/039654

    申请日:2019-06-28

    IPC分类号: H04L29/06

    摘要: Systems are provided for using machine learning to identify service accounts and/or for distinguishing service accounts from user accounts based on the user names of the accounts. Machine learning tools can be trained on user name label data for service accounts and user accounts. The trained machine learning tool can then be applied to user names of accounts to determine whether the user names correspond to service accounts or not and, in some instances, without referencing tables or other structures that explicitly identify and distinguish the service/user accounts and/or conventions for identifying service accounts. Then, the systems can respond appropriately, based on the determination. The machine learning tool can also be shared with other systems to make the same determinations for their accounts without having to share confidential or proprietary account information.