IMPLEMENTING NETWORK SECURITY MEASURES IN RESPONSE TO A DETECTED CYBER ATTACK

Described herein is a system transmits and combines local models, that individually comprise a set of local parameters computed via stochastic gradient descent (SGD), into a global model that comprises a set of global model parameters. The local models are computed in parallel at different geographi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: MALEKI, Saeed, MYTKOWICZ, Todd D, MUSUVATHI, Madanlal S, DING, Yufei
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator MALEKI, Saeed
MYTKOWICZ, Todd D
MUSUVATHI, Madanlal S
DING, Yufei
description Described herein is a system transmits and combines local models, that individually comprise a set of local parameters computed via stochastic gradient descent (SGD), into a global model that comprises a set of global model parameters. The local models are computed in parallel at different geographic locations (e.g., different instances of computing infrastructure) along with symbolic representations. Network transmission of the local models and the symbolic representations, rather than transmission of the large training data subsets processed to compute the local models and symbolic representations, conserves resources and decreases latency. The global model can then be used as a model to determine a likelihood that at least a portion of current and/or recently received data traffic is illegitimate data traffic that is associated with a cyber attack. In some instances, the system can implement a remedial action to mitigate the effects of the cyber attack on computing infrastructure.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2018367550A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2018367550A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2018367550A13</originalsourceid><addsrcrecordid>eNqNyrEKwjAUBdAsDqL-wwNnobXUusb0qqEmKckL0qkUiZNoof4_OvgBTmc5c2G0aS8wsKztiSz46nxDASp6zR0ZyBA9AmlLX1pnA4gdSarBUIyaVHeAJ8ksVbMUs_vwmNLq50Ksj2B13qTx1adpHG7pmd59DNss3xe7qiwzmRf_rQ_Hqy9b</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>IMPLEMENTING NETWORK SECURITY MEASURES IN RESPONSE TO A DETECTED CYBER ATTACK</title><source>esp@cenet</source><creator>MALEKI, Saeed ; MYTKOWICZ, Todd D ; MUSUVATHI, Madanlal S ; DING, Yufei</creator><creatorcontrib>MALEKI, Saeed ; MYTKOWICZ, Todd D ; MUSUVATHI, Madanlal S ; DING, Yufei</creatorcontrib><description>Described herein is a system transmits and combines local models, that individually comprise a set of local parameters computed via stochastic gradient descent (SGD), into a global model that comprises a set of global model parameters. The local models are computed in parallel at different geographic locations (e.g., different instances of computing infrastructure) along with symbolic representations. Network transmission of the local models and the symbolic representations, rather than transmission of the large training data subsets processed to compute the local models and symbolic representations, conserves resources and decreases latency. The global model can then be used as a model to determine a likelihood that at least a portion of current and/or recently received data traffic is illegitimate data traffic that is associated with a cyber attack. In some instances, the system can implement a remedial action to mitigate the effects of the cyber attack on computing infrastructure.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20181220&amp;DB=EPODOC&amp;CC=US&amp;NR=2018367550A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20181220&amp;DB=EPODOC&amp;CC=US&amp;NR=2018367550A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>MALEKI, Saeed</creatorcontrib><creatorcontrib>MYTKOWICZ, Todd D</creatorcontrib><creatorcontrib>MUSUVATHI, Madanlal S</creatorcontrib><creatorcontrib>DING, Yufei</creatorcontrib><title>IMPLEMENTING NETWORK SECURITY MEASURES IN RESPONSE TO A DETECTED CYBER ATTACK</title><description>Described herein is a system transmits and combines local models, that individually comprise a set of local parameters computed via stochastic gradient descent (SGD), into a global model that comprises a set of global model parameters. The local models are computed in parallel at different geographic locations (e.g., different instances of computing infrastructure) along with symbolic representations. Network transmission of the local models and the symbolic representations, rather than transmission of the large training data subsets processed to compute the local models and symbolic representations, conserves resources and decreases latency. The global model can then be used as a model to determine a likelihood that at least a portion of current and/or recently received data traffic is illegitimate data traffic that is associated with a cyber attack. In some instances, the system can implement a remedial action to mitigate the effects of the cyber attack on computing infrastructure.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyrEKwjAUBdAsDqL-wwNnobXUusb0qqEmKckL0qkUiZNoof4_OvgBTmc5c2G0aS8wsKztiSz46nxDASp6zR0ZyBA9AmlLX1pnA4gdSarBUIyaVHeAJ8ksVbMUs_vwmNLq50Ksj2B13qTx1adpHG7pmd59DNss3xe7qiwzmRf_rQ_Hqy9b</recordid><startdate>20181220</startdate><enddate>20181220</enddate><creator>MALEKI, Saeed</creator><creator>MYTKOWICZ, Todd D</creator><creator>MUSUVATHI, Madanlal S</creator><creator>DING, Yufei</creator><scope>EVB</scope></search><sort><creationdate>20181220</creationdate><title>IMPLEMENTING NETWORK SECURITY MEASURES IN RESPONSE TO A DETECTED CYBER ATTACK</title><author>MALEKI, Saeed ; MYTKOWICZ, Todd D ; MUSUVATHI, Madanlal S ; DING, Yufei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2018367550A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>MALEKI, Saeed</creatorcontrib><creatorcontrib>MYTKOWICZ, Todd D</creatorcontrib><creatorcontrib>MUSUVATHI, Madanlal S</creatorcontrib><creatorcontrib>DING, Yufei</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>MALEKI, Saeed</au><au>MYTKOWICZ, Todd D</au><au>MUSUVATHI, Madanlal S</au><au>DING, Yufei</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>IMPLEMENTING NETWORK SECURITY MEASURES IN RESPONSE TO A DETECTED CYBER ATTACK</title><date>2018-12-20</date><risdate>2018</risdate><abstract>Described herein is a system transmits and combines local models, that individually comprise a set of local parameters computed via stochastic gradient descent (SGD), into a global model that comprises a set of global model parameters. The local models are computed in parallel at different geographic locations (e.g., different instances of computing infrastructure) along with symbolic representations. Network transmission of the local models and the symbolic representations, rather than transmission of the large training data subsets processed to compute the local models and symbolic representations, conserves resources and decreases latency. The global model can then be used as a model to determine a likelihood that at least a portion of current and/or recently received data traffic is illegitimate data traffic that is associated with a cyber attack. In some instances, the system can implement a remedial action to mitigate the effects of the cyber attack on computing infrastructure.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2018367550A1
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title IMPLEMENTING NETWORK SECURITY MEASURES IN RESPONSE TO A DETECTED CYBER ATTACK
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T11%3A00%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=MALEKI,%20Saeed&rft.date=2018-12-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2018367550A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true