System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats
A data anomaly and security posture technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve problems such as low entropy of data blocks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] The present invention relates to systems and methods for detecting abnormal data files and preventing the detected abnormal data files from being stored in a data storage device. In particular, the system and method divides each data file into a plurality of data blocks, obtains an entropy value for each data block, organizes this information, and then uses it in a machine learning model to determine the data file's Security Level. Files found to be anomalous are then quarantined, while files deemed normal proceed to the next step for analysis of any malware and / or ransomware commands that may be running in the background (even if the file does not contain any data parts ).
[0054] The invention will now be described in detail with reference to several embodiments of the invention as shown in the accompanying drawings. In the following description, numerous specific features are set forth in order to provide a thorough understanding of embodiments of the invention. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


