Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anomaly detection using cognitive computing

An abnormal, computer technology used in the field of computer security

Pending Publication Date: 2020-06-26
IBM CORP
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Detecting anomalies and properly understanding and correlating to specific security or threat classifications and responses is a challenging process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anomaly detection using cognitive computing
  • Anomaly detection using cognitive computing
  • Anomaly detection using cognitive computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Aspects of this disclosure relate to computer security, and more particularly to anomaly detection systems. While the disclosure is not necessarily limited to such applications, various aspects of the disclosure can be appreciated by discussing various examples using this context.

[0027] Aspects of the present disclosure relate to compiling heterogeneous network security data (e.g., log data, network data, computer data, application data, user behavior data, hardware data, etc.), converting heterogeneous network security data into isomorphic data, store structured data in arrays, input the arrays to a Hierarchical Just-in-Time Memory (HTM) network, analyze the output of the HTM network, and communicate relevant cybersecurity information to users (e.g., using question-and-answer (Q&A) systems, reports, infographics, charts , messages, alerts, anomaly scores, probabilities, etc.).

[0028] Aspects of the present disclosure exhibit many advantages. As a first example a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An anomaly detection system configured to generate a plurality of tensors based on spatial attributes of a set of cybersecurity data and temporal attributes of the set of cybersecurity data. The set of cybersecurity data comprising numeric data and textual data collected from a plurality of computational sources. The anomaly detection system can provide the plurality of tensors to a Hierarchical Temporal Memory (HTM) network. The HTM network can be configured to generate respective HTM outputs for respective regions of the HTM network. The anomaly detection system can determine that at least one HTM output indicates an anomaly, convert the at least one HTM output to a notification, and provide the notification to a user interface.

Description

technical field [0001] The present disclosure relates to computer security, and more particularly, to anomaly detection systems. Background technique [0002] The anomaly detection system may be used as a component of a cybersecurity system configured to maintain the confidentiality, integrity, and / or availability of data stored in, executed on, and and / or transfer between data processing systems. For example, an anomaly detection system may identify unsafe, unexpected, unusual, suspicious, malicious, and / or unauthorized activity occurring within, between, or throughout portions of a cybersecurity environment. [0003] Identifying abnormal conditions within an information system environment is one of the most effective ways to detect cyberattacks, security incidents, and threats. Detecting this condition is the first step any organization needs to take in order to be able to respond in a timely manner to protect critical information assets in the IT environment from being ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06N5/02
CPCH04L63/1416H04L63/1425G06N3/049G06N5/022G06N5/041G06N5/025G06N20/10G06N3/126G06N20/20G06N5/048G06N3/088G06N3/042G06N5/01G06N7/01G06N3/044G06N3/045G06F21/566G06N20/00
Inventor S·哈格G·格温塔尔
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products