Log in
Enquire now
‌

US Patent 11916934 Identifying malware-suspect end points through entropy changes in consolidated logs

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
119169340
Patent Inventor Names
Alejandro Houspanossian0
Gabriel G. Infante-Lopez0
Peter Thayer0
Leandro J. Ferrado0
Date of Patent
February 27, 2024
0
Patent Application Number
177453660
Date Filed
May 16, 2022
0
Patent Citations
‌
US Patent 7831705 Distributed event correlation using horizontally partitioned rulesets
0
‌
US Patent 8099782 Event aggregation in a network
0
‌
US Patent 8401982 Using sequencing and timing information of behavior events in machine learning to detect malware
0
‌
US Patent 8606913 Method for adaptively building a baseline behavior model
0
‌
US Patent 8850571 Systems and methods for detecting malicious network content
0
‌
US Patent 8997229 Anomaly detection for online endorsement event
0
‌
US Patent 9112895 Anomaly detection system for enterprise network security
0
‌
US Patent 9191400 Cyphertext (CT) analytic engine and method for network anomaly detection
0
...
Patent Primary Examiner
‌
Kambiz Zand
0
Patent abstract

Example methods disclosed herein to determine whether a first monitored device is compromised include determining a first entropy value for the first monitored device based on a first number of unique event identifiers included in log entries obtained for the first monitored device, the log entries associated with a first time window. Disclosed example methods also include determining a second entropy value for the first monitored device based on numbers of unique event identifiers included in corresponding groups of log entries obtained for respective ones of a plurality of monitored devices including the first monitored device, the groups of log entries associated with the first time window. Disclosed example methods further include determining whether the first monitored device is compromised based on the first entropy value and the second entropy value, and performing an action in response to a determination that the first monitored device is compromised.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 11916934 Identifying malware-suspect end points through entropy changes in consolidated logs

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us