Log in
Enquire now
‌

US Patent 10372910 Method for predicting and characterizing cyber attacks

Patent 10372910 was granted and assigned to JASK (acquired by Sumo Logic) on August, 2019 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
JASK (acquired by Sumo Logic)
JASK (acquired by Sumo Logic)
0
Current Assignee
JASK (acquired by Sumo Logic)
JASK (acquired by Sumo Logic)
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
103729100
Patent Inventor Names
David Matslofva0
Gregory Martin0
Scott Woods0
Thomas Piscitell, III0
Brian Waskiewicz0
Date of Patent
August 6, 2019
0
Patent Application Number
156285200
Date Filed
June 20, 2017
0
Patent Citations Received
‌
US Patent 12093396 System and method for associating a common vulnerability and exposures (CVE) with a computing device and applying a security patch
0
‌
US Patent 10949534 Method for predicting and characterizing cyber attacks
‌
US Patent 11677770 Data retrieval for anomaly detection
0
‌
US Patent 11853853 Providing human-interpretable explanation for model-detected anomalies
0
‌
US Patent 12069079 Generating synthetic datapoints from observed datapoints for training machine learning models
0
‌
US Patent 12088600 Machine learning system for detecting anomalies in hunt data
0
‌
US Patent 11509674 Generating machine learning data in salient regions of a feature space
Patent Primary Examiner
‌
Noura Zoubair
0
Patent abstract

One variation of a method for predicting and characterizing cyber attacks includes: receiving, from a sensor implementing deep packet inspection to detect anomalous behaviors on the network, a first signal specifying a first anomalous behavior of a first asset on the network at a first time; representing the first signal in a first vector representing frequencies of anomalous behaviors—in a set of behavior types—of the first asset within a first time window; calculating a first malicious score representing proximity of the first vector to malicious vectors defining sets of behaviors representative of security threats; calculating a first benign score representing proximity of the first vector to a benign vector representing an innocuous set of behaviors; and in response to the first malicious score exceeding the first benign score and a malicious threshold score, issuing a first alert to investigate the network for a security threat.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10372910 Method for predicting and characterizing cyber attacks

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us