AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS
Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among cluster...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | ROY, Yogesh K MAZUMDER, Anisha ZHAI, Haijun HARIKRISHNAN, Seetharaman MACE, Daniel Lee |
description | Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2023102103A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2023102103A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2023102103A13</originalsourceid><addsrcrecordid>eNrjZLB1DA3x93UM8XRWcA9yDPDQdXIMdnVRcHENcXUO8fT3U_B3UwjwD3H1C_F09FEIdnUODfIMiVQI8QhydQwJ5mFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgZGxoYGRoYGxo6GxsSpAgDkCirQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS</title><source>esp@cenet</source><creator>ROY, Yogesh K ; MAZUMDER, Anisha ; ZHAI, Haijun ; HARIKRISHNAN, Seetharaman ; MACE, Daniel Lee</creator><creatorcontrib>ROY, Yogesh K ; MAZUMDER, Anisha ; ZHAI, Haijun ; HARIKRISHNAN, Seetharaman ; MACE, Daniel Lee</creatorcontrib><description>Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230330&DB=EPODOC&CC=US&NR=2023102103A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230330&DB=EPODOC&CC=US&NR=2023102103A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ROY, Yogesh K</creatorcontrib><creatorcontrib>MAZUMDER, Anisha</creatorcontrib><creatorcontrib>ZHAI, Haijun</creatorcontrib><creatorcontrib>HARIKRISHNAN, Seetharaman</creatorcontrib><creatorcontrib>MACE, Daniel Lee</creatorcontrib><title>AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS</title><description>Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLB1DA3x93UM8XRWcA9yDPDQdXIMdnVRcHENcXUO8fT3U_B3UwjwD3H1C_F09FEIdnUODfIMiVQI8QhydQwJ5mFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgZGxoYGRoYGxo6GxsSpAgDkCirQ</recordid><startdate>20230330</startdate><enddate>20230330</enddate><creator>ROY, Yogesh K</creator><creator>MAZUMDER, Anisha</creator><creator>ZHAI, Haijun</creator><creator>HARIKRISHNAN, Seetharaman</creator><creator>MACE, Daniel Lee</creator><scope>EVB</scope></search><sort><creationdate>20230330</creationdate><title>AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS</title><author>ROY, Yogesh K ; MAZUMDER, Anisha ; ZHAI, Haijun ; HARIKRISHNAN, Seetharaman ; MACE, Daniel Lee</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2023102103A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>ROY, Yogesh K</creatorcontrib><creatorcontrib>MAZUMDER, Anisha</creatorcontrib><creatorcontrib>ZHAI, Haijun</creatorcontrib><creatorcontrib>HARIKRISHNAN, Seetharaman</creatorcontrib><creatorcontrib>MACE, Daniel Lee</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ROY, Yogesh K</au><au>MAZUMDER, Anisha</au><au>ZHAI, Haijun</au><au>HARIKRISHNAN, Seetharaman</au><au>MACE, Daniel Lee</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS</title><date>2023-03-30</date><risdate>2023</risdate><abstract>Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2023102103A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T04%3A57%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ROY,%20Yogesh%20K&rft.date=2023-03-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2023102103A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |