In general, managed network or system security programs or platforms are designed to try to detect threats from malicious actors and take actions to address or remediate such threats. However, the volume and frequency of malicious actions or threats is increasing, and new and/or more covert or difficult to detect threats also are being developed at an alarming rate. The actions taken by attackers/malicious actors many times only become recognizable as part of a threat or become apparent in hindsight, and thus often are noticeable/detectible sometime only after security has been initially compromised, and/or with threat/malicious actions frequently changing or modifying their tactics, making it difficult to quickly identify, detect and/or stop malicious actors/attackers from inflicting serious harm.
To try to combat such malicious actors, threat intelligence communities have developed, in which security application developers, vendors and users can share indicators of compromises (IOCs) such as IP addresses, URL's, vulnerabilities, malicious software hashes, analytics, and other information known to be used by or indicative or a potential threats or malicious actors. However, such communities are established on a trust basis and generally rely upon authentication using common methods. As a result, if a threat or malicious actor gains access to the community and/or the information and analytics being exchanged between the members thereof, they can gain a significant tactical advantage by knowing what features or other identifying information is being used and how such information is analyzed by security programs or providers and/or personnel among the community to detect their attacks, and can change their tactics accordingly to help them evade detection.
It therefore can be seen that a need exists for a system and method for data owners to be able to share security data and analytics in a manner to enable the rapid development of new or updated security applications or models for detecting or deterring malicious actors. The present disclosure addresses these and other related and unrelated problems in the art.
Briefly described, the present disclosure is, in one aspect, directed to a security platform or system that enables data controllers or owners, managed security service providers (MSSPs), security analysts, security researchers, security application developers, security incident responders, and/or other entities of a threat intelligence community to share analytical, e.g., statistical or probabilistic, models for accessing and/or detecting possible threats with enhanced security. The threat intelligence community members thus can leverage or utilize the network effect of different members running or applying such shared models on similar data. The format of the analytical model and/or selected expressions or components thereof can be easily shared using an open language format or series of open formats (e.g., PMML, etc.) so as to enable sharing of the model across a variety of software and hardware platforms, while enabling community members to generate and provide secure updates to the derivation or function component(s) of the model to other members of the community without necessarily having to recreate or substantively change the model(s) or the format thereof, as well as make upgrades or modifications of existing analytical models and identified encoded security attributes indicative of malicious or threat activities to enable potential prediction and detection of such malicious activity or attacks, with enhanced efficiency and to substantially reduce response times for addressing such attacks or threats.
The analytic model (or plurality or set of models) created generally can include the application of a fixed input component (i.e., raw security data) and a derivation data schema (DDS) component that is applied to the raw security data to derive/determine the existence of data attributes that are known or are recognized, either alone or in combination with other derived/identified attributes, to indicate or predict the existence of malicious or risk actions or threats to a desired or predetermined level of certainty/probability. The derivation data schema component (and updates thereto) can, for example, utilize or otherwise incorporate machine learning, statistical analysis, name entity recognition or other probabilistic modeling. The derivation data schema component further can be encrypted for transmission to the threat intelligence community members. Thus, regardless of a threat actor gaining access to or knowledge of the model itself and/or the raw security data being analyzed/processed by the model, the derivation data schema to be used by the model (and updates thereto) to derive the attributes used by the threat intelligence community members to predict a malicious act and/or remediate such acts, can be encrypted and securely transmitted. This enables easy and secure sharing of such predictive or analytic models for leveraging the network effect between a plurality of participants, e.g., data developers/owners, using or otherwise accessing such models, thus benefitting from the actions taken/analysis of similar or shared data by a number of shared data owners analyzing and/or applying the security modules/applications to such data in parallel, and/or easily share new or updated security applications or models developed thereby across a variety of different hardware and/or software platforms.
In another aspect, the present disclosure can provide a method or process for providing secure propagation or sharing of statistical models. For example, the method/process may include accessing incoming and/or historical raw security data, for example, data ingested, aggregated, or collected from monitoring or otherwise observing one or more networked systems. In addition, or in the alternative, accessed security data can be developed, exchanged and/or shared between participants in one or more threat communities, MSSPs and their clients, security analysts, security researchers, security application developers, security incident responders, partners or like actors, and/or other suitable entities, or combinations thereof. Selected attributes of the raw security data, including one or more measurements that are designed to identify or mitigate known attacks or recognized or identified abnormalities, can then be identified, selected and/or encoded to develop a derivation data schema (DDS) that can be used as a component in a predictive model which can be selected, generated, derived, or otherwise accessed for processing of the raw security data to analyze encoded or selected attributes thereof to predict or identify and/or respond to perceived/detected security threats. The predictive model further can be presented or translated into common exchange formats or other formats (e.g., PMML, etc.) to enable the predictive model to be read or otherwise understood by multiple users or members of one or more threat intelligence communities including users with a variety of differing hardware and/or software systems.
In addition, the analytic or predictive model can be sent out to, or otherwise received by, select entities of one or more threat intelligence communities. The derivation data schema (DDS) component further can be encrypted and sent out to or otherwise received by one or more trusted or verified members of the threat intelligence communities. In addition, an encryption key, or other suitable feature for decrypting the encrypted derivation data schema (DDS), also can be provided to the trusted or verified threat intelligence community member(s). The threat intelligence community member(s) can decrypt the derivation data schema (DDS) and apply the predictive model (or other selected predictive models) to the raw security data using the derivation data schema (DDS) or updated/modified versions thereof. The threat intelligence community member(s) can update or modify the predictive model and/or derivation data schema (DDS) as needed, e.g., to meet their specific requirements and/or as a new attack(s) is detected. The models/derivation data schema (DDS) (and updates thereto) and other/new models or derivation data schema(s) (DDS) can be shared directly between trusted members of the threat community using suitable network communications, e.g., email, file transfer systems, etc., without the requirement of a third-party intermediary.
Various objects, features and advantages of the present disclosure will become apparent to those skilled in the art upon a review of the following detailed description, when taken in conjunction with the accompanying drawings.
It will be appreciated that for simplicity and clarity of illustration, elements illustrated in the figures are not necessarily drawn to scale. For example, the dimensions of some elements may be exaggerated relative to other elements. Embodiments incorporating teachings of the present disclosure are shown and described with respect to the drawings herein, in which:
The use of the same reference symbols in different drawings indicates similar or identical items.
The following description in combination with the Figures is provided to assist in understanding the teachings disclosed herein. The description is focused on specific implementations and embodiments of the teachings, and is provided to assist in describing the teachings. This focus should not be interpreted as a limitation on the scope or applicability of the teachings. As shown in
The security system 10 and/or product(s) 14 can enable the participants, which can include data owners, MSSPs, security analysts, security researchers, security application developers, security incident responders, and/or other entities members of a threat intelligence community to share analytical, e.g., statistical or probabilistic, models with enhanced security. The threat intelligence community members thus can leverage or utilize the network effect of different members running or applying such shared models on similar data, while enabling them to generate and provide secure updates to the derivation or function component(s) of the model to other members of the community without necessarily having to recreate or substantively change the model or the format thereof, as well as to upgrade or modify existing analytical models and identified encoded security attributes indicative of malicious or threat activities to enable potential prediction and detection of such malicious activity or attacks with enhanced efficiency and to substantially reduce response times for addressing such attacks or threats. The format of the analytical model can be easily shared, e.g., between members of the verified, trusted threat intelligence groups/communities 26, using an open language format or series of open formats so as to enable sharing of the model across a variety of software and hardware platforms. The program/product generally can allow the models and components thereof to be securely shared directly between members of the threat communities using common network communications methods, e.g., email, filing sharing services, etc., without the requirement of a third-party intermediary.
For purposes of this disclosure, an information handling system 28 may include any instrumentality or aggregate of instrumentalities operable to compute, calculate, determine, classify, process, transmit, receive, retrieve, originate, switch, store, display, communicate, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system may be a personal computer (e.g., desktop or laptop), tablet computer, mobile device (e.g., personal digital assistant (PDA) or smart phone), server (e.g., blade server or rack server), a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory. Additional components of the information handling system may include one or more disk drives, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, touchscreen and/or a video display. The information handling systems also may include one or more buses operable to transmit communications between the various hardware components. The information handling systems/devices may be structured or otherwise configured based on a Von Newman type architecture, though the information handling systems/devices further can be configured for quantum computing, e.g., can comprise a quantum processor with a plurality of superconducting qubits, or with another suitable architecture, without departing from the present disclosure.
As shown in
The arrangement of each monitoring device(s) 36 and/or other devices illustrated in
In addition, one or more of the participants can capture and analyze raw security data and/or can utilize devices such as a sequence analyzer 36 to analyze sequences of events occurring over the network 30 or at one of the information handling systems 28 connected thereto, and log, aggregate or otherwise collect security data based on the sequences of events or features thereof. As shown in
In in one example embodiment, the model (or the components thereof) format or expression can be shared in an open format, enabling ease of sharing and use thereof across disparate device/hardware and/or software platforms. The derivation data schema component 44 of the model will, however, be encrypted for transmission to various or selected participants or verified/trusted members of threat intelligence communities (e.g., 26 in
As shown in
At Step 104, the processor(s) further may encode selected attributes of the security data, including one or more measurements that are designed to identify or mitigate known attacks or recognized or identified abnormalities to generate/develop a derivation data schema (DDS) that can be applied as a component in a selected predictive model for detecting/identifying security threats or malicious/suspicious actors. In one example embodiment, the derivation data schema may be developed/generated using, or otherwise utilizing, machine learning or other probabilistic or statistical analysis, and can encode selected attributes or features of raw security data or sequences thereof to develop encoded attribute data.
A predictive model then can be selected, generated or derived for processing of the encoded attribute data (Step 106). The selected/generated predictive model thereafter can be presented or translated into open or common exchange formats or other formats (e.g., PMML, etc.), to enable the predictive model to be read or otherwise understood by multiple users, participants or members of one or more threat intelligence communities (Step 108).
At Step 118, the threat intelligence community participants or member(s) can use the received encryption key to decrypt the received encrypted derivation data schema and thereafter apply the received predictive model or other suitable predictive model using the decrypted derivation data schema or updated/modified versions thereof to raw security data. For example, the model will be applied to raw security data aggregated or collected by individual participants or members of the threat intelligence community, such as from monitoring or observing one or more networked systems controlled or otherwise accessed thereby.
In one embodiment, the member(s) of the threat intelligence community may modify and/or otherwise update the received and decrypted and/or the underlying model to include specific thresholds or tolerances that satisfy the particular member's specific demands/circumstances. For example, the derivation data schema may be developed/generated by a member/participant that does not frequently use a specific tool, e.g., PSexec or other suitable tool for running remote commands, and thus the developed/generated derivation data schema may encode the use, or an aggregate use or particular sequence of use, of the specific tool as an attribute or feature indicative of a security threat or malicious action. As a result, if another member/participant who commonly utilizes the specific tool, e.g., a PSexec or other suitable tool for running remote commands, receives the derivation data schema, such member/participant might adjust the thresholds for encoding use of the specific tool as indicative of a security threat/malicious actions (or may apply a different model) to reduce false positives by an applied predictive model.
Returning to
The information handling system 700 can include a set of instructions that can be executed to cause the processor to perform any one or more of the methods or computer based functions disclosed herein. The processor 702 may operate as a standalone device or may be connected such as using a network, to other computer systems or peripheral devices.
In a networked deployment, the information handling system 700 may operate in the capacity of a server or as a client user computer in a server-client user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment. The information handling system 700 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a set-top box (STB), a smartphone, a PDA, a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. In a particular embodiment, the computer system 700 can be implemented using electronic devices that provide voice, video or data communication. Further, while a single information handling system 700 is illustrated, the term “system” shall also be taken to include any collection of systems or subsystems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
The disk drive unit 716 or static memory 714 may include a computer-readable medium 722 in which one or more sets of instructions 724 such as software can be embedded. The disk drive unit 716 or static memory 714 also contains space for data storage. Further, the instructions 724 may embody one or more of the methods or logic as described herein. In a particular embodiment, the instructions 724 may reside completely, or at least partially, within the main memory 704, the static memory 706, and/or within the processor 702 during execution by the information handling system 700. The main memory 704 and the processor 702 also may include computer-readable media. The network interface device 720 can provide connectivity to a network 726, e.g., a wide area network (WAN), a local area network (LAN), wireless network (IEEE 702), or other network. The network interface 720 may also interface with macrocellular networks including wireless telecommunications networks such as those characterized as 2G, 3G, 4G, 5G, LTE or similar wireless telecommunications networks similar to those described above. The network interface 720 may be a wireless adapter having antenna systems 732 for various wireless connectivity and radio frequency subsystems 730 for signal reception, transmission, or related processing.
In an alternative embodiment, dedicated hardware implementations such as application specific integrated circuits, programmable logic arrays and other hardware devices can be constructed to implement one or more of the methods described herein. Applications that may include the apparatus and systems of various embodiments can broadly include a variety of electronic and computer systems. One or more embodiments described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations. In accordance with various embodiments of the present disclosure, the methods described herein may be implemented by software programs executable by a computer system. Further, in an exemplary, non-limited embodiment, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein.
The present disclosure contemplates a computer-readable medium that includes instructions 724 or receives and executes instructions 724 responsive to a propagated signal; so that a device connected to a network 728 can communicate voice, video or data over the network 728. Further, the instructions 724 may be transmitted or received over the network 728 via the network interface device 720. In a particular embodiment, BIOS/FW code 724 reside in memory 704, and include machine-executable code that is executed by processor 702 to perform various functions of information handling system 700.
Information handling system 700 includes one or more application programs 724, and Basic Input/Output System and Firmware (BIOS/FW) code 724. BIOS/FW code 724 functions to initialize information handling system 700 on power up, to launch an operating system, and to manage input and output interactions between the operating system and the other elements of information handling system 700.
In another embodiment (not illustrated), application programs and BIOS/FW code reside in another storage medium of information handling system 700. For example, application programs and BIOS/FW code can reside in drive 716, in a ROM (not illustrated) associated with information handling system 700, in an option-ROM (not illustrated) associated with various devices of information handling system 700, in storage system 707, in a storage system (not illustrated) associated with network channel 720, in another storage medium of the information handling system 700, or a combination thereof. Application programs 724 and BIOS/FW code 724 can each be implemented as single programs, or as separate programs carrying out the various features as described herein.
While the computer-readable medium is shown to be a single medium, the term “computer-readable medium” includes a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. The term “computer-readable medium” shall also include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein.
In a particular non-limiting, exemplary embodiment, the computer-readable medium can include a solid-state memory such as a memory card or other package that houses one or more non-volatile, read-only memories. Further, the computer-readable medium can be a random access memory or other volatile re-writable memory. Additionally, the computer-readable medium can include a magneto-optical or optical medium, such as a disk or tapes or other storage device to store information received via carrier wave signals such as a signal communicated over a transmission medium. Furthermore, a computer readable medium can store information received from distributed network resources such as from a cloud-based environment. A digital file attachment to an e-mail or other self-contained information archive or set of archives may be considered a distribution medium that is equivalent to a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium or a distribution medium and other equivalents and successor media, in which data or instructions may be stored.
In the embodiments described herein, an information handling system includes any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or use any form of information, intelligence, or data for business, scientific, control, entertainment, or other purposes. For example, an information handling system can be a personal computer, a consumer electronic device, a network server or storage device, a switch router, wireless router, or other network communication device, a network connected device (cellular telephone, tablet device, etc.), or any other suitable device, and can vary in size, shape, performance, price, and functionality.
The information handling system can include memory (volatile (such as random-access memory, etc.), nonvolatile (read-only memory, flash memory etc.) or any combination thereof), one or more processing resources, such as a central processing unit (CPU), a graphics processing unit (GPU), hardware or software control logic, or any combination thereof. Additional components of the information handling system can include one or more storage devices, one or more communications ports for communicating with external devices, as well as, various input and output (I/O) devices, such as a keyboard, a mouse, a video/graphic display, or any combination thereof. The information handling system can also include one or more buses operable to transmit communications between the various hardware components. Portions of an information handling system may themselves be considered information handling systems.
When referred to as a “device,” a “module,” or the like, the embodiments described herein can be configured as hardware. For example, a portion of an information handling system device may be hardware such as, for example, an integrated circuit (such as an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), a structured ASIC, or a device embedded on a larger chip), a card (such as a Peripheral Component Interface (PCI) card, a PCI-express card, a Personal Computer Memory Card International Association (PCMCIA) card, or other such expansion card), or a system (such as a motherboard, a system-on-a-chip (SoC), or a stand-alone device).
The device or module can include software, including firmware embedded at a device, such as a Pentium class or PowerPC™ brand processor, or other such device, or software capable of operating a relevant environment of the information handling system. The device or module can also include a combination of the foregoing examples of hardware or software. Note that an information handling system can include an integrated circuit or a board-level product having portions thereof that can also be any combination of hardware and software.
Devices, modules, resources, or programs that are in communication with one another need not be in continuous communication with each other, unless expressly specified otherwise. In addition, devices, modules, resources, or programs that are in communication with one another can communicate directly or indirectly through one or more intermediaries.
Although only a few exemplary embodiments have been described in detail herein, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of the embodiments of the present disclosure. Accordingly, all such modifications are intended to be included within the scope of the embodiments of the present disclosure as defined in the following claims. In the claims, means-plus-function clauses are intended to cover the structures described herein as performing the recited function and not only structural equivalents, but also equivalent structures.
Number | Name | Date | Kind |
---|---|---|---|
5937066 | Gennaro | Aug 1999 | A |
6357010 | Viets et al. | Mar 2002 | B1 |
7269578 | Sweeney | Sep 2007 | B2 |
7331061 | Ramsey et al. | Feb 2008 | B1 |
7548932 | Horvitz et al. | Jun 2009 | B2 |
7555482 | Korkus | Jun 2009 | B2 |
7571474 | Ross et al. | Aug 2009 | B2 |
7594270 | Church et al. | Sep 2009 | B2 |
7606801 | Faitelson et al. | Oct 2009 | B2 |
7613722 | Horvitz et al. | Nov 2009 | B2 |
7770031 | MacKay et al. | Aug 2010 | B2 |
7856411 | Darr | Dec 2010 | B2 |
8079081 | Lavrik et al. | Dec 2011 | B1 |
8122495 | Ramsey et al. | Feb 2012 | B2 |
8156553 | Church et al. | Apr 2012 | B1 |
8327419 | Korablev | Dec 2012 | B1 |
8407335 | Church et al. | Mar 2013 | B1 |
8490193 | Sarraute et al. | Jul 2013 | B2 |
8490196 | Lucangeli et al. | Jul 2013 | B2 |
8522350 | Davenport et al. | Aug 2013 | B2 |
8539575 | Schmitlin et al. | Sep 2013 | B2 |
8578393 | Fisher | Nov 2013 | B1 |
8595170 | Gladstone et al. | Nov 2013 | B2 |
8621618 | Ramsey et al. | Dec 2013 | B1 |
8701176 | Ramsey et al. | Apr 2014 | B2 |
8805881 | Hom et al. | Aug 2014 | B2 |
8832048 | Lim | Sep 2014 | B2 |
8839414 | Mantle et al. | Sep 2014 | B2 |
8909673 | Faitelson et al. | Dec 2014 | B2 |
8931095 | Ramsey et al. | Jan 2015 | B2 |
8938802 | Davenport et al. | Jan 2015 | B2 |
8959115 | Marathe | Feb 2015 | B2 |
8984644 | Oliphant et al. | Mar 2015 | B2 |
9009828 | Ramsey et al. | Apr 2015 | B1 |
9032478 | Ballesteros et al. | May 2015 | B2 |
8928476 | Jerhotova et al. | Jun 2015 | B2 |
9046886 | Chong et al. | Jun 2015 | B2 |
9047336 | Hom et al. | Jun 2015 | B2 |
9069599 | Martinez et al. | Jun 2015 | B2 |
9098702 | Rubin et al. | Aug 2015 | B2 |
9129105 | Donley et al. | Sep 2015 | B2 |
9137262 | Qureshi et al. | Sep 2015 | B2 |
9298895 | Lim | Mar 2016 | B2 |
9319426 | Webb et al. | Apr 2016 | B2 |
9338134 | Yin | May 2016 | B2 |
9338180 | Ramsey et al. | May 2016 | B2 |
9430534 | Bhattacharya et al. | Aug 2016 | B2 |
9438563 | Yin | Sep 2016 | B2 |
9519756 | Bitran et al. | Dec 2016 | B2 |
9544273 | Fleury et al. | Jan 2017 | B2 |
9548994 | Pearcy | Jan 2017 | B2 |
9560062 | Khatri et al. | Jan 2017 | B2 |
9560068 | Figlin et al. | Jan 2017 | B2 |
9596252 | Coates et al. | Mar 2017 | B2 |
9628511 | Ramsey et al. | Apr 2017 | B2 |
9667656 | Banerjee et al. | May 2017 | B2 |
9667661 | Sharma et al. | May 2017 | B2 |
9710672 | Braun | Jul 2017 | B2 |
9742559 | Christodorescu | Aug 2017 | B2 |
9767302 | Lim | Sep 2017 | B2 |
9805202 | Medeiros et al. | Oct 2017 | B2 |
9973524 | Boyer et al. | May 2018 | B2 |
10050992 | Thyni et al. | Aug 2018 | B2 |
10116500 | Long | Oct 2018 | B1 |
10382489 | Das et al. | Aug 2019 | B2 |
10425223 | Roth et al. | Sep 2019 | B2 |
10474820 | Manadhata | Nov 2019 | B2 |
20020129135 | Delany et al. | Sep 2002 | A1 |
20050138204 | Iyer et al. | Jun 2005 | A1 |
20050288939 | Peled et al. | Dec 2005 | A1 |
20060012815 | Ebner | Jan 2006 | A1 |
20060037076 | Roy | Feb 2006 | A1 |
20060195575 | Delany et al. | Aug 2006 | A1 |
20060253447 | Judge | Nov 2006 | A1 |
20070226248 | Darr | Sep 2007 | A1 |
20070226807 | Ginter et al. | Sep 2007 | A1 |
20080077593 | Abrams et al. | Mar 2008 | A1 |
20080219334 | Brainos et al. | Sep 2008 | A1 |
20080255997 | Bluhm | Oct 2008 | A1 |
20080320000 | Gaddam | Dec 2008 | A1 |
20090198682 | Buehler et al. | Aug 2009 | A1 |
20100083374 | Schmitlin et al. | Apr 2010 | A1 |
20100125913 | Davenport et al. | May 2010 | A1 |
20110004771 | Matsushima | Jan 2011 | A1 |
20110179492 | Markopoulou | Jul 2011 | A1 |
20110276604 | Hom et al. | Nov 2011 | A1 |
20120117640 | Ramsey et al. | May 2012 | A1 |
20120185275 | Loghmani | Jul 2012 | A1 |
20120246730 | Raad | Sep 2012 | A1 |
20120260341 | Chan et al. | Oct 2012 | A1 |
20130104191 | Peled et al. | Apr 2013 | A1 |
20130173620 | Takenouchi | Jul 2013 | A1 |
20130226938 | Risher et al. | Aug 2013 | A1 |
20130282746 | Balko | Oct 2013 | A1 |
20130291103 | Davenport et al. | Oct 2013 | A1 |
20130318604 | Coates et al. | Nov 2013 | A1 |
20140041028 | Ramsey et al. | Feb 2014 | A1 |
20140051432 | Gupta | Feb 2014 | A1 |
20140222712 | Samaha | Aug 2014 | A1 |
20140373151 | Webb et al. | Dec 2014 | A1 |
20150040225 | Coates et al. | Feb 2015 | A1 |
20150135287 | Medeiros et al. | May 2015 | A1 |
20150156212 | Khatri et al. | Jun 2015 | A1 |
20150186618 | Poorvin | Jul 2015 | A1 |
20150222652 | Ramsey et al. | Aug 2015 | A1 |
20150271047 | McLean | Sep 2015 | A1 |
20150324467 | McLean | Nov 2015 | A1 |
20160014140 | Akireddy | Jan 2016 | A1 |
20160139886 | Perdriau | May 2016 | A1 |
20160182546 | Coates et al. | Jun 2016 | A1 |
20160241591 | Ramsey et al. | Aug 2016 | A1 |
20160313709 | Biesdorf | Oct 2016 | A1 |
20160337400 | Gupta | Nov 2016 | A1 |
20160342805 | Lim | Nov 2016 | A1 |
20170098087 | Li | Apr 2017 | A1 |
20170111379 | Khatri et al. | Apr 2017 | A1 |
20170140295 | Bandara | May 2017 | A1 |
20170142149 | Coates et al. | May 2017 | A1 |
20170169154 | Lin et al. | Jun 2017 | A1 |
20170171228 | McLean | Jun 2017 | A1 |
20170201381 | Kinder et al. | Jul 2017 | A1 |
20170201431 | Kinder et al. | Jul 2017 | A1 |
20170201490 | Kinder et al. | Jul 2017 | A1 |
20170201548 | Kinder et al. | Jul 2017 | A1 |
20170243004 | Kinder et al. | Aug 2017 | A1 |
20170243005 | Kinder et al. | Aug 2017 | A1 |
20170244734 | Kinder et al. | Aug 2017 | A1 |
20170244750 | Kinder et al. | Aug 2017 | A1 |
20170244754 | Kinder et al. | Aug 2017 | A1 |
20170244762 | Kinder et al. | Aug 2017 | A1 |
20170318034 | Holland | Nov 2017 | A1 |
20180089574 | Goto | Mar 2018 | A1 |
20180091306 | Antonopoulos | Mar 2018 | A1 |
20180124073 | Scherman | May 2018 | A1 |
20180124085 | Frayman | May 2018 | A1 |
20180152480 | Kinder et al. | May 2018 | A1 |
20180181599 | Crabtree | Jun 2018 | A1 |
20180367550 | Musuvathi | Dec 2018 | A1 |
20190014149 | Cleveland et al. | Jan 2019 | A1 |
20190050554 | Fiske | Feb 2019 | A1 |
20190095801 | Saillet | Mar 2019 | A1 |
20190130009 | McLean | May 2019 | A1 |
20190141079 | Vidas | May 2019 | A1 |
20190342296 | Anandam et al. | Nov 2019 | A1 |
Number | Date | Country |
---|---|---|
WO2007002749 | Jan 2007 | WO |
WO2007090605 | Aug 2007 | WO |
WO2010059843 | May 2010 | WO |
Entry |
---|
Buyukkayhan, Ahmet Bali; Oprea, Alina; Li, Zhou; and Robertson, William; “Lens on the endpoint; Hunting for malicious software through endpoint data analysis”; International Symposium on Research in Attacks, Intrusions, and Defenses; RAID 2017: Research in Attacks, Intrusions, and Defenses Proceedings; pp. 73-79; Sep. 18-20, 2017; Atlanta, GA, USA. |
https://en.wikipedia.org/wiki/Predictive_Model_Language; Predictive Model Markup Language (PMML); Jul. 17, 2017 (page last edited). |
https://en.wikipedia.org/wiki/XML; Extensible Markup Language (XML); Jul. 6, 2017 (page last edited). |
https://en.wikipedia.org/wiki/predictive_modelling; Predictive modeling; Jun. 29, 2017 (page last edited). |
https://en.wikipedia.org/wiki/Statistical_model; Statistical model; Jul. 31, 2017 (page last edited). |
https://en.wikipedia.org/wiki/Predictive_analytics; Predictive analytics; Jul. 2, 2017 (page last edited). |
Data Mining Group; What is PFA for?; https://dmg.org/pfa/docs/motivation/; Jan. 19, 2016 (available). |
Secureworks—Log Management—Protect your infrastructure from known and emerging threats; www.secureworks.com/resources/ds-log˜management; 2015 (available). |
Sofya Raskhodnikova & Adam Smith; CSE 598A Algorithmic Challenges in Data Privacy; Lecture 2; Jan. 19, 2010. |
Number | Date | Country | |
---|---|---|---|
20190149564 A1 | May 2019 | US |