AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS

Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among cluster...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ROY, Yogesh K, MAZUMDER, Anisha, ZHAI, Haijun, HARIKRISHNAN, Seetharaman, MACE, Daniel Lee
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ROY, Yogesh K
MAZUMDER, Anisha
ZHAI, Haijun
HARIKRISHNAN, Seetharaman
MACE, Daniel Lee
description Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2023102103A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2023102103A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2023102103A13</originalsourceid><addsrcrecordid>eNrjZLB1DA3x93UM8XRWcA9yDPDQdXIMdnVRcHENcXUO8fT3U_B3UwjwD3H1C_F09FEIdnUODfIMiVQI8QhydQwJ5mFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgZGxoYGRoYGxo6GxsSpAgDkCirQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS</title><source>esp@cenet</source><creator>ROY, Yogesh K ; MAZUMDER, Anisha ; ZHAI, Haijun ; HARIKRISHNAN, Seetharaman ; MACE, Daniel Lee</creator><creatorcontrib>ROY, Yogesh K ; MAZUMDER, Anisha ; ZHAI, Haijun ; HARIKRISHNAN, Seetharaman ; MACE, Daniel Lee</creatorcontrib><description>Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230330&amp;DB=EPODOC&amp;CC=US&amp;NR=2023102103A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230330&amp;DB=EPODOC&amp;CC=US&amp;NR=2023102103A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ROY, Yogesh K</creatorcontrib><creatorcontrib>MAZUMDER, Anisha</creatorcontrib><creatorcontrib>ZHAI, Haijun</creatorcontrib><creatorcontrib>HARIKRISHNAN, Seetharaman</creatorcontrib><creatorcontrib>MACE, Daniel Lee</creatorcontrib><title>AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS</title><description>Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLB1DA3x93UM8XRWcA9yDPDQdXIMdnVRcHENcXUO8fT3U_B3UwjwD3H1C_F09FEIdnUODfIMiVQI8QhydQwJ5mFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgZGxoYGRoYGxo6GxsSpAgDkCirQ</recordid><startdate>20230330</startdate><enddate>20230330</enddate><creator>ROY, Yogesh K</creator><creator>MAZUMDER, Anisha</creator><creator>ZHAI, Haijun</creator><creator>HARIKRISHNAN, Seetharaman</creator><creator>MACE, Daniel Lee</creator><scope>EVB</scope></search><sort><creationdate>20230330</creationdate><title>AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS</title><author>ROY, Yogesh K ; MAZUMDER, Anisha ; ZHAI, Haijun ; HARIKRISHNAN, Seetharaman ; MACE, Daniel Lee</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2023102103A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>ROY, Yogesh K</creatorcontrib><creatorcontrib>MAZUMDER, Anisha</creatorcontrib><creatorcontrib>ZHAI, Haijun</creatorcontrib><creatorcontrib>HARIKRISHNAN, Seetharaman</creatorcontrib><creatorcontrib>MACE, Daniel Lee</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ROY, Yogesh K</au><au>MAZUMDER, Anisha</au><au>ZHAI, Haijun</au><au>HARIKRISHNAN, Seetharaman</au><au>MACE, Daniel Lee</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS</title><date>2023-03-30</date><risdate>2023</risdate><abstract>Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2023102103A1
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T04%3A57%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ROY,%20Yogesh%20K&rft.date=2023-03-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2023102103A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true