摘要:
Methods and systems for detecting anomalies in high-frequency time-series are described. The method includes receiving a data stream, detecting one or more candidate anomalies in the data stream via a point anomaly detector, storing the one or more candidate anomalies in a queue to be accessed by a pattern anomaly detector, and determining one or more true anomalies in the data stream via the pattern anomaly detector based at least in part on the one or more candidate anomalies. The one or more true anomalies include a pattern anomaly.
摘要:
Generally speaking, embodiments of the present disclosure include a network security system that can comprise a hardware appliance installed in a vehicle and connected with the busses, networks, communication systems, and other components of the vehicle. This in-vehicle network security appliance can provide an access point to the networks of the vehicle, such as the Controller Area Networks (CANs), Local Interconnect Networks (LINs) and other networks, monitor inbound and outbound traffic on those networks, and provide a firewall between those networks and external networks or systems as well as between different networks and systems within the vehicle. In this way, the network security appliance can protect the vehicle networks from different sources of attack from outside and inside the vehicle via components that are less secure like the infotainment system or diagnostic port.
摘要:
System, methods, and apparatuses enable a network security system to more efficiently process system events. For example, the disclosed approaches may be used to improve the way in which a security service processes events (e.g., network traffic, files, email messages, etc.) in order to detect various types of network security threats (e.g., network intrusion attempts, viruses, spam, and other potential network security issues). A security service generally refers to one or more microservices of a network security system which monitors and performs actions relative to input data items for purposes related to computer network security
摘要:
User device for communicating with an external device A user device for communicating with an external device via a virtual private network is suggested. The user device comprises a processing unit for generating a data packet to be transmitted to the external device, wherein a header of the data packet includes an authentication information of the user device for authenticating the user device, and a communication unit for communicating with the external device by transmitting the data packet to the external device via the virtual private network. Further, an external device for communicating with the user device and a method for a communication between a user device and an external device are suggested. The user device uses as an authentication for the virtual private network the header of the data packet. Thus, no additional authentication at the application layer is required.
摘要:
Determining, by a machine learning model in an isolated operating environment, whether a file is safe for processing by a primary operating environment. The file is provided, when the determining indicates the file is safe for processing, to the primary operating environment for processing by the primary operating environment. When the determining indicates the file is unsafe for processing, the file is prevented from being processed by the primary operating environment. The isolated operating environment can be maintained on an isolated computing system remote from a primary computing system maintaining the primary operating system. The isolating computing system and the primary operating system can communicate over a cloud network.
摘要:
Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to the hosts. The local packet trends are combined to identify network-wide packet trends. The network-wide packet trends are used to detect anomalies or attacks, which in turn informs mitigation actions. The local inspection may be performed by reconfigurable/reprogrammable "smart" network interfaces (NICs) at each of the hosts. Local inspection involves identifying potentially suspect packet features based on statistical prevalence of recurring commonalities among the packets; pre-defined threat patterns are not required. For network-wide coherence, each host/NIC uses the same packet-identifying and occurrence-measuring algorithms. An overlay or control server collects and combines the local occurrence-measures to derive the network-wide occurrence-measures. The network-wide occurrences can be used to automatically detect and mitigate completely new types of attack packets.
摘要:
A data security system, including a security manager remotely monitoring a service that performs data-exchange transactions for end users, operative to temporarily prevent end user access to new transactions by interacting with the service so that the security manager accesses new transactions prior to end users being able to access the new transaction, and a data inspector operative to inspect data of new transactions for security clearance, wherein the security manager is further operative to restore end user access to the new transactions by further interacting with the service so that end users are able to access the new transaction, if the security inspector clears the data, and otherwise to perform a remedial action vis-à-vis the new transactions.
摘要:
Simplified and/or user friendly interfaces can be employed to facilitate administration of a routing platform that couples devices of a local area network (LAN) to an external communication network (e.g., the Internet). In one aspect, the routing platform comprises a firewall that can be employed to perform access control and/or an Internet of Things (IoT) hub that can be employed to control operations of IoT devices of the LAN, for example, based on domain information, user-defined tags and peer-defined criteria to make correlations that are leveraged to implement access control policies. A search and command interface is employable to issue textual (e.g., natural language) commands to configure access control policies, tags for devices and/or websites, and/or search for data.
摘要:
A cross-domain communication system and method is provided. The system comprises a data hub connectable to first domain and to a second domain, wherein the first and second domains are isolated from one another. The data hub may be connected independently to the first domain and to the second domain, such that it is able to receive data from the first domain and transmit data to the second domain. The data hub comprises a processor, and optionally a data diode, the processor being adapted to inspect packet data received from the first domain, and to run a set of user-defined rules, such that commands are applied to the packet data in accordance with the rules. When a command applied to packet data received from the first domain it creates packet data transmittable to the second domain in real time, such that the first and second domains communicate indirectly via the data hub.