COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS
A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Thimmisetty, Charanraj Ananthakrishnan, Viswesh Tiwari, Praveen Nunes Coelho, JR., Claudionor Jose |
description | A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the corresponding values are combined to create a vector representing the entry. Cluster analysis of the vector representations can be performed to determine clusters of similar traffic and outliers indicative of potentially anomalous traffic. The system also generates a formal model representing firewall behavior which comprises formulas generated from the firewall rules. Proposed traffic scenarios not recorded in the logs can be evaluated based on the formulas to determine actions which the firewall would take in the scenarios. The combination of models which implement machine learning and formal techniques facilitates evaluation of both observed and hypothetical network traffic based on the firewall rules. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022385635A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022385635A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022385635A13</originalsourceid><addsrcrecordid>eNrjZPBx9vd18vRzdVHwdXT2ADIUfFwdg_w8_dwVHP1cFNz8g3wdfRRCXJ09_DwDQ12DQSIKfq4h4f5B3gohQY5ubp7OQJWOPpHBnsE8DKxpiTnFqbxQmptB2c01xNlDN7UgPz61uCAxOTUvtSQ-NNjIwMjI2MLUzNjU0dCYOFUAX9ou1g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS</title><source>esp@cenet</source><creator>Thimmisetty, Charanraj ; Ananthakrishnan, Viswesh ; Tiwari, Praveen ; Nunes Coelho, JR., Claudionor Jose</creator><creatorcontrib>Thimmisetty, Charanraj ; Ananthakrishnan, Viswesh ; Tiwari, Praveen ; Nunes Coelho, JR., Claudionor Jose</creatorcontrib><description>A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the corresponding values are combined to create a vector representing the entry. Cluster analysis of the vector representations can be performed to determine clusters of similar traffic and outliers indicative of potentially anomalous traffic. The system also generates a formal model representing firewall behavior which comprises formulas generated from the firewall rules. Proposed traffic scenarios not recorded in the logs can be evaluated based on the formulas to determine actions which the firewall would take in the scenarios. The combination of models which implement machine learning and formal techniques facilitates evaluation of both observed and hypothetical network traffic based on the firewall rules.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20221201&DB=EPODOC&CC=US&NR=2022385635A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76418</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20221201&DB=EPODOC&CC=US&NR=2022385635A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Thimmisetty, Charanraj</creatorcontrib><creatorcontrib>Ananthakrishnan, Viswesh</creatorcontrib><creatorcontrib>Tiwari, Praveen</creatorcontrib><creatorcontrib>Nunes Coelho, JR., Claudionor Jose</creatorcontrib><title>COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS</title><description>A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the corresponding values are combined to create a vector representing the entry. Cluster analysis of the vector representations can be performed to determine clusters of similar traffic and outliers indicative of potentially anomalous traffic. The system also generates a formal model representing firewall behavior which comprises formulas generated from the firewall rules. Proposed traffic scenarios not recorded in the logs can be evaluated based on the formulas to determine actions which the firewall would take in the scenarios. The combination of models which implement machine learning and formal techniques facilitates evaluation of both observed and hypothetical network traffic based on the firewall rules.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPBx9vd18vRzdVHwdXT2ADIUfFwdg_w8_dwVHP1cFNz8g3wdfRRCXJ09_DwDQ12DQSIKfq4h4f5B3gohQY5ubp7OQJWOPpHBnsE8DKxpiTnFqbxQmptB2c01xNlDN7UgPz61uCAxOTUvtSQ-NNjIwMjI2MLUzNjU0dCYOFUAX9ou1g</recordid><startdate>20221201</startdate><enddate>20221201</enddate><creator>Thimmisetty, Charanraj</creator><creator>Ananthakrishnan, Viswesh</creator><creator>Tiwari, Praveen</creator><creator>Nunes Coelho, JR., Claudionor Jose</creator><scope>EVB</scope></search><sort><creationdate>20221201</creationdate><title>COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS</title><author>Thimmisetty, Charanraj ; Ananthakrishnan, Viswesh ; Tiwari, Praveen ; Nunes Coelho, JR., Claudionor Jose</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022385635A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><toplevel>online_resources</toplevel><creatorcontrib>Thimmisetty, Charanraj</creatorcontrib><creatorcontrib>Ananthakrishnan, Viswesh</creatorcontrib><creatorcontrib>Tiwari, Praveen</creatorcontrib><creatorcontrib>Nunes Coelho, JR., Claudionor Jose</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Thimmisetty, Charanraj</au><au>Ananthakrishnan, Viswesh</au><au>Tiwari, Praveen</au><au>Nunes Coelho, JR., Claudionor Jose</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS</title><date>2022-12-01</date><risdate>2022</risdate><abstract>A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the corresponding values are combined to create a vector representing the entry. Cluster analysis of the vector representations can be performed to determine clusters of similar traffic and outliers indicative of potentially anomalous traffic. The system also generates a formal model representing firewall behavior which comprises formulas generated from the firewall rules. Proposed traffic scenarios not recorded in the logs can be evaluated based on the formulas to determine actions which the firewall would take in the scenarios. The combination of models which implement machine learning and formal techniques facilitates evaluation of both observed and hypothetical network traffic based on the firewall rules.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2022385635A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING HANDLING RECORD CARRIERS PHYSICS PRESENTATION OF DATA RECOGNITION OF DATA RECORD CARRIERS |
title | COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A16%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Thimmisetty,%20Charanraj&rft.date=2022-12-01&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022385635A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |