SYSTEMS AND METHODS FOR DETECTING ANOMALOUS ACTIVITY OVER A COMPUTER NETWORK
Computing systems and methods for detecting anomalous activity over a computer network are described herein. A computing system receives a real-time stream of electronic messages, each of the electronic messages including a first identifier, wherein a portion of the first identifier includes a secon...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Computing systems and methods for detecting anomalous activity over a computer network are described herein. A computing system receives a real-time stream of electronic messages, each of the electronic messages including a first identifier, wherein a portion of the first identifier includes a second identifier. The computing system applies a detection model to the real-time stream of electronic messages, wherein the detection model is programmed to apply at least one machine learning algorithm trained to detect that a velocity of the electronic messages for a range of first identifiers having a common value second identifier exceeds a threshold. In response to the threshold being exceeded, a time period associated with anomalous activity is identified and an anomalous activity flag is appended to messages initiated during the time period associated with anomalous activity which include a first identifier having the common value in the second identifier. |
---|