作者: Pushkar Joglekar , Ajit Gaddam , Ara Jermakyan
DOI:
关键词:
摘要: A method and system for protecting access to remote systems, such as resource databases containing sensitive resources, cryptographic keys or personally identifying information, is disclosed. server can receive a plurality of requests from requesting entity. The identify an entity profile corresponding the requests, well machine learning model profile. be used form sequences, which evaluated by model. returns anomaly score that compared threshold. If exceeds threshold, prevent further system, example, revoking credential associated with