SYSTEM, METHOD, AND PROCESS FOR IDENTIFYING AND PROTECTING AGAINST ADVANCED ATTACKS BASED ON CODE, BINARY AND CONTRIBUTORS BEHAVIOR

A method for detecting undesired activity prior to performing a code build, the method including: (a) learning behaviors of each of a plurality of entities so as to train unique models for each of the plurality of entities; (b) monitoring new events of the plurality of entities to detect anomalous b...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Plotnik, Idan, Shalom, Eli, Levy, Ariel, Eldar, Yonatan
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Plotnik, Idan
Shalom, Eli
Levy, Ariel
Eldar, Yonatan
description A method for detecting undesired activity prior to performing a code build, the method including: (a) learning behaviors of each of a plurality of entities so as to train unique models for each of the plurality of entities; (b) monitoring new events of the plurality of entities to detect anomalous behavior relative to corresponding models of the unique models; and (c) executing a workflow for remediation of a detected anomalous behavior. A method for monitoring and protecting a deployment process post build, the method including: receiving source code and a corresponding binary resulting from the build of the source code; comparing the source code to the binary for at least one discrepancy there-between; and halting the deployment process if the at least one discrepancy is detected.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022245240A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022245240A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022245240A13</originalsourceid><addsrcrecordid>eNqNi0EKwjAQRbtxIeodBtxWqFEPME2mbRATyUwLXZUicSVaqDfw4hbRvavP4783T17cstAphRNJ5U0K6Aycg9fEDIUPYA05sUVrXfn7hLR8sETrWABNg06TARRBfWTIkSfyDrQ3lEJuHYb2U2vvJNi8Fh8mjSpsrA_LZHbtb2NcfXeRrAsSXW3i8OjiOPSXeI_PrmaVKaX2B7XPcLv7z3oDzho9cA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEM, METHOD, AND PROCESS FOR IDENTIFYING AND PROTECTING AGAINST ADVANCED ATTACKS BASED ON CODE, BINARY AND CONTRIBUTORS BEHAVIOR</title><source>esp@cenet</source><creator>Plotnik, Idan ; Shalom, Eli ; Levy, Ariel ; Eldar, Yonatan</creator><creatorcontrib>Plotnik, Idan ; Shalom, Eli ; Levy, Ariel ; Eldar, Yonatan</creatorcontrib><description>A method for detecting undesired activity prior to performing a code build, the method including: (a) learning behaviors of each of a plurality of entities so as to train unique models for each of the plurality of entities; (b) monitoring new events of the plurality of entities to detect anomalous behavior relative to corresponding models of the unique models; and (c) executing a workflow for remediation of a detected anomalous behavior. A method for monitoring and protecting a deployment process post build, the method including: receiving source code and a corresponding binary resulting from the build of the source code; comparing the source code to the binary for at least one discrepancy there-between; and halting the deployment process if the at least one discrepancy is detected.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220804&amp;DB=EPODOC&amp;CC=US&amp;NR=2022245240A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220804&amp;DB=EPODOC&amp;CC=US&amp;NR=2022245240A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Plotnik, Idan</creatorcontrib><creatorcontrib>Shalom, Eli</creatorcontrib><creatorcontrib>Levy, Ariel</creatorcontrib><creatorcontrib>Eldar, Yonatan</creatorcontrib><title>SYSTEM, METHOD, AND PROCESS FOR IDENTIFYING AND PROTECTING AGAINST ADVANCED ATTACKS BASED ON CODE, BINARY AND CONTRIBUTORS BEHAVIOR</title><description>A method for detecting undesired activity prior to performing a code build, the method including: (a) learning behaviors of each of a plurality of entities so as to train unique models for each of the plurality of entities; (b) monitoring new events of the plurality of entities to detect anomalous behavior relative to corresponding models of the unique models; and (c) executing a workflow for remediation of a detected anomalous behavior. A method for monitoring and protecting a deployment process post build, the method including: receiving source code and a corresponding binary resulting from the build of the source code; comparing the source code to the binary for at least one discrepancy there-between; and halting the deployment process if the at least one discrepancy is detected.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNi0EKwjAQRbtxIeodBtxWqFEPME2mbRATyUwLXZUicSVaqDfw4hbRvavP4783T17cstAphRNJ5U0K6Aycg9fEDIUPYA05sUVrXfn7hLR8sETrWABNg06TARRBfWTIkSfyDrQ3lEJuHYb2U2vvJNi8Fh8mjSpsrA_LZHbtb2NcfXeRrAsSXW3i8OjiOPSXeI_PrmaVKaX2B7XPcLv7z3oDzho9cA</recordid><startdate>20220804</startdate><enddate>20220804</enddate><creator>Plotnik, Idan</creator><creator>Shalom, Eli</creator><creator>Levy, Ariel</creator><creator>Eldar, Yonatan</creator><scope>EVB</scope></search><sort><creationdate>20220804</creationdate><title>SYSTEM, METHOD, AND PROCESS FOR IDENTIFYING AND PROTECTING AGAINST ADVANCED ATTACKS BASED ON CODE, BINARY AND CONTRIBUTORS BEHAVIOR</title><author>Plotnik, Idan ; Shalom, Eli ; Levy, Ariel ; Eldar, Yonatan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022245240A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><toplevel>online_resources</toplevel><creatorcontrib>Plotnik, Idan</creatorcontrib><creatorcontrib>Shalom, Eli</creatorcontrib><creatorcontrib>Levy, Ariel</creatorcontrib><creatorcontrib>Eldar, Yonatan</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Plotnik, Idan</au><au>Shalom, Eli</au><au>Levy, Ariel</au><au>Eldar, Yonatan</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEM, METHOD, AND PROCESS FOR IDENTIFYING AND PROTECTING AGAINST ADVANCED ATTACKS BASED ON CODE, BINARY AND CONTRIBUTORS BEHAVIOR</title><date>2022-08-04</date><risdate>2022</risdate><abstract>A method for detecting undesired activity prior to performing a code build, the method including: (a) learning behaviors of each of a plurality of entities so as to train unique models for each of the plurality of entities; (b) monitoring new events of the plurality of entities to detect anomalous behavior relative to corresponding models of the unique models; and (c) executing a workflow for remediation of a detected anomalous behavior. A method for monitoring and protecting a deployment process post build, the method including: receiving source code and a corresponding binary resulting from the build of the source code; comparing the source code to the binary for at least one discrepancy there-between; and halting the deployment process if the at least one discrepancy is detected.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2022245240A1
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
HANDLING RECORD CARRIERS
PHYSICS
PRESENTATION OF DATA
RECOGNITION OF DATA
RECORD CARRIERS
title SYSTEM, METHOD, AND PROCESS FOR IDENTIFYING AND PROTECTING AGAINST ADVANCED ATTACKS BASED ON CODE, BINARY AND CONTRIBUTORS BEHAVIOR
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T06%3A40%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Plotnik,%20Idan&rft.date=2022-08-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022245240A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true