Methods and apparatus to identify malicious activity in a network

作者: Baris Coskun

DOI:

关键词: Data miningReference groupFeature (computer vision)Reduction (complexity)Mathematics

摘要: Methods, apparatus, systems and articles of manufacture are disclosed to learn malicious activity. An example method includes assigning weights a distance function respective statistical features; iteratively calculating, with processor, the adjust (1) cause reduction in first calculated according for pair entities reference group associated activity (2) an increase second one included entity not group; determining whether feature is indicative based on adjusted weight determined after calculating number iterations.

参考文章(35)
Patrick Droz, Andreas Kind, Robert Haas, Operating a network monitoring entity ,(2007)
Wilfried Teiken, Ian M. Molloy, Youngja Park, Suresh N. Chari, Detecting Anomalous User Behavior Using Generative Models of User Actions ,(2013)
Christopher Petersen, Phillip Villella, Log collection, structuring and processing ,(2006)
Craig S. Etchegoyen, Device reputation management ,(2014)
David Rowell, Jack Kohn, Gunes Aybay, Tracking fragmented data flows ,(2009)