Machine learning based anomaly detection

作者: Krishna Narayanaswamy , Steve Malmskog , Ravi Ithal , Abhay Kulkarni , Ariel Faigon

DOI:

关键词:

摘要: The technology disclosed relates to machine learning based anomaly detection. In particular, it constructing activity models on per-tenant and per-user basis using an online streaming learner that transforms unsupervised problem into a supervised by fixing target label regressor without constant or intercept. Further, detecting anomalies in near real-time streams of security-related events one more tenants transforming the categorized features requiring loss function analyzer correlate, essentially through origin, with feature artificially labeled as constant. It further includes determining score for production event calculated likelihood coefficients feature-value pairs prevalencist probability value comprising coded features-value pairs.

参考文章(14)
Kazuhiro Kuwabara, Shotaro Yasunaga, Use of Metadata for Access Control and Version Management in RDF Database Knowledge-Based and Intelligent Information and Engineering Systems. pp. 326- 336 ,(2011) , 10.1007/978-3-642-23851-2_34
Thomas H. DeBenning, Olivier Andre, Ahmed Datoo, Shafaq Abdullah, Waheed Qureshi, Secure execution of enterprise applications on mobile devices ,(2012)
Steve Roberts, Laurent Dupont, Eli Yawo Amesefe, Richard Thomas Oehrle, Keith Eric Schon, Elizabeth B. Charnock, Continuous anomaly detection based on behavior modeling and heterogeneous information analysis ,(2013)
Robert Sadao Unoki, David Charles Wrighton, Generating security validation code automatically ,(2006)
Robert J. Woolridge, Scott A. Libert, Sridhar Krishnamurthy, Alex C. Tran, P. Murugavel, Mark S. Hillebrandt, Baochun Jin, Rajagopal Govindakrishnan, Suhas Joshi, Associative management of multimedia assets and associated resources using multi-domain agent-based communication between heterogeneous peers ,(1999)
Mariemma I. Yagüe, Antonio Maña, Javier Lopez, A metadata‐based access control model for web services Internet Research. ,vol. 15, pp. 99- 116 ,(2005) , 10.1108/10662240510577095
Vaibhav Gowadia, Csilla Farkas, RDF metadata for XML access control workshop on xml security. pp. 39- 48 ,(2003) , 10.1145/968559.968567
Yinglong Xia, Ching-Yung Lin, Wan-Yi Lin, Anni R. Coden, Insider threat prediction ,(2014)
Mark Edmonson Moffitt, Thomas Alan Reid, System and method for securely storing and sharing information ,(2012)