Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats

A data anomaly and security posture technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve problems such as low entropy of data blocks

Active Publication Date: 2021-11-09
FLEXXON PTE LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] However, due to the way entropy is generated for data blocks, data blocks may return lower entropy values ​​when in fact some parts of the data block may contain small obfuscated malware chunks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats
  • System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats
  • System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention relates to systems and methods for detecting abnormal data files and preventing the detected abnormal data files from being stored in a data storage device. In particular, the system and method divides each data file into a plurality of data blocks, obtains an entropy value for each data block, organizes this information, and then uses it in a machine learning model to determine the data file's Security Level. Files found to be anomalous are then quarantined, while files deemed normal proceed to the next step for analysis of any malware and / or ransomware commands that may be running in the background (even if the file does not contain any data parts ).

[0054] The invention will now be described in detail with reference to several embodiments of the invention as shown in the accompanying drawings. In the following description, numerous specific features are set forth in order to provide a thorough understanding of embodiments of the invention. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This document describes a system and method for detecting anomalous data files and preventing detected anomalous data files from being stored in a data storage. In particular, the system and method detects anomalous data files by dividing each data file into blocks of data whereby entropy values are obtained for each block of data and this information is collated and subsequently used in a machine learning model to ascertain the security level of the data file.

Description

technical field [0001] The present invention relates to systems and methods for detecting abnormal data files and preventing the detected abnormal data files from being stored in a data storage device. In particular, the system and method detect anomalous data files by dividing each data file into data blocks, thereby obtaining an entropy value for each data block, and sorting out this information, which is then used for machine Learning model to determine the security level of data files. Background technique [0002] In today's digital age, computer systems are increasingly exposed to various forms and types of malicious cyber attacks. The purpose of these attacks is to illegally gain access to a computer system and is often carried out through rogue software (also known as "malware") that is installed on a computer system without the system administrator's knowledge of. Malware can be installed in a computer system in a number of ways from a computer network (such as e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06N3/02G06N20/00
CPCH04L9/3247G06F21/562H04L63/1408G06F16/9017G06N3/08G06N20/00G06N3/044G06N3/045G06F21/56G06F21/55G06N3/02H04L63/14H04L63/1425H04L63/1416
Inventor 陈美玲尼扎·布格拉
Owner FLEXXON PTE LTD