COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS

A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Thimmisetty, Charanraj, Ananthakrishnan, Viswesh, Tiwari, Praveen, Nunes Coelho, JR., Claudionor Jose
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Thimmisetty, Charanraj
Ananthakrishnan, Viswesh
Tiwari, Praveen
Nunes Coelho, JR., Claudionor Jose
description A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the corresponding values are combined to create a vector representing the entry. Cluster analysis of the vector representations can be performed to determine clusters of similar traffic and outliers indicative of potentially anomalous traffic. The system also generates a formal model representing firewall behavior which comprises formulas generated from the firewall rules. Proposed traffic scenarios not recorded in the logs can be evaluated based on the formulas to determine actions which the firewall would take in the scenarios. The combination of models which implement machine learning and formal techniques facilitates evaluation of both observed and hypothetical network traffic based on the firewall rules.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022385635A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022385635A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022385635A13</originalsourceid><addsrcrecordid>eNrjZPBx9vd18vRzdVHwdXT2ADIUfFwdg_w8_dwVHP1cFNz8g3wdfRRCXJ09_DwDQ12DQSIKfq4h4f5B3gohQY5ubp7OQJWOPpHBnsE8DKxpiTnFqbxQmptB2c01xNlDN7UgPz61uCAxOTUvtSQ-NNjIwMjI2MLUzNjU0dCYOFUAX9ou1g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS</title><source>esp@cenet</source><creator>Thimmisetty, Charanraj ; Ananthakrishnan, Viswesh ; Tiwari, Praveen ; Nunes Coelho, JR., Claudionor Jose</creator><creatorcontrib>Thimmisetty, Charanraj ; Ananthakrishnan, Viswesh ; Tiwari, Praveen ; Nunes Coelho, JR., Claudionor Jose</creatorcontrib><description>A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the corresponding values are combined to create a vector representing the entry. Cluster analysis of the vector representations can be performed to determine clusters of similar traffic and outliers indicative of potentially anomalous traffic. The system also generates a formal model representing firewall behavior which comprises formulas generated from the firewall rules. Proposed traffic scenarios not recorded in the logs can be evaluated based on the formulas to determine actions which the firewall would take in the scenarios. The combination of models which implement machine learning and formal techniques facilitates evaluation of both observed and hypothetical network traffic based on the firewall rules.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20221201&amp;DB=EPODOC&amp;CC=US&amp;NR=2022385635A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76418</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20221201&amp;DB=EPODOC&amp;CC=US&amp;NR=2022385635A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Thimmisetty, Charanraj</creatorcontrib><creatorcontrib>Ananthakrishnan, Viswesh</creatorcontrib><creatorcontrib>Tiwari, Praveen</creatorcontrib><creatorcontrib>Nunes Coelho, JR., Claudionor Jose</creatorcontrib><title>COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS</title><description>A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the corresponding values are combined to create a vector representing the entry. Cluster analysis of the vector representations can be performed to determine clusters of similar traffic and outliers indicative of potentially anomalous traffic. The system also generates a formal model representing firewall behavior which comprises formulas generated from the firewall rules. Proposed traffic scenarios not recorded in the logs can be evaluated based on the formulas to determine actions which the firewall would take in the scenarios. The combination of models which implement machine learning and formal techniques facilitates evaluation of both observed and hypothetical network traffic based on the firewall rules.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPBx9vd18vRzdVHwdXT2ADIUfFwdg_w8_dwVHP1cFNz8g3wdfRRCXJ09_DwDQ12DQSIKfq4h4f5B3gohQY5ubp7OQJWOPpHBnsE8DKxpiTnFqbxQmptB2c01xNlDN7UgPz61uCAxOTUvtSQ-NNjIwMjI2MLUzNjU0dCYOFUAX9ou1g</recordid><startdate>20221201</startdate><enddate>20221201</enddate><creator>Thimmisetty, Charanraj</creator><creator>Ananthakrishnan, Viswesh</creator><creator>Tiwari, Praveen</creator><creator>Nunes Coelho, JR., Claudionor Jose</creator><scope>EVB</scope></search><sort><creationdate>20221201</creationdate><title>COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS</title><author>Thimmisetty, Charanraj ; Ananthakrishnan, Viswesh ; Tiwari, Praveen ; Nunes Coelho, JR., Claudionor Jose</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022385635A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><toplevel>online_resources</toplevel><creatorcontrib>Thimmisetty, Charanraj</creatorcontrib><creatorcontrib>Ananthakrishnan, Viswesh</creatorcontrib><creatorcontrib>Tiwari, Praveen</creatorcontrib><creatorcontrib>Nunes Coelho, JR., Claudionor Jose</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Thimmisetty, Charanraj</au><au>Ananthakrishnan, Viswesh</au><au>Tiwari, Praveen</au><au>Nunes Coelho, JR., Claudionor Jose</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS</title><date>2022-12-01</date><risdate>2022</risdate><abstract>A system generates vector representations of entries of traffic logs generated by a firewall. A first model learns contexts of values recorded in the logs during training, and the system extracts vector representations of the values from the trained model. For each log entry, vectors created for the corresponding values are combined to create a vector representing the entry. Cluster analysis of the vector representations can be performed to determine clusters of similar traffic and outliers indicative of potentially anomalous traffic. The system also generates a formal model representing firewall behavior which comprises formulas generated from the firewall rules. Proposed traffic scenarios not recorded in the logs can be evaluated based on the formulas to determine actions which the firewall would take in the scenarios. The combination of models which implement machine learning and formal techniques facilitates evaluation of both observed and hypothetical network traffic based on the firewall rules.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2022385635A1
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
HANDLING RECORD CARRIERS
PHYSICS
PRESENTATION OF DATA
RECOGNITION OF DATA
RECORD CARRIERS
title COMBINED MACHINE LEARNING AND FORMAL TECHNIQUES FOR NETWORK TRAFFIC ANALYSIS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A16%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Thimmisetty,%20Charanraj&rft.date=2022-12-01&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022385635A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true