Method of anomaly detection for privacy protection in internet of things
An exception and message technology, applied in digital transmission systems, safety communication devices, electrical components, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] Embodiments may provide techniques for detecting cybersecurity events in IoT data traffic that provide improved detection accuracy and privacy protection. Embodiments may use temporal hierarchies such as day of the week, time of day, and part of hour to model metadata information and cluster similarly-behaving devices. Embodiments may use limited, discrete message sizes to allow rigorous behavioral modeling. In contrast to a high variance Gaussian distribution of message sizes, embodiments may identify a relatively small number of different message sizes (each surrounded by a low variance message size distribution) to provide more accurate anomaly detection. The very mission-specific nature of these devices also allows defenders to identify distinct sequences from which any deviations can be counted as anomalies.
[0015] exist figure 1 An exemplary block diagram of an Internet of Things (IoT) system 100 is shown in . In this example, multiple IoT devices 104A-L are ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



