[go: up one dir, main page]

DK3660716T3 - Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen - Google Patents

Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen Download PDF

Info

Publication number
DK3660716T3
DK3660716T3 DK18315048.1T DK18315048T DK3660716T3 DK 3660716 T3 DK3660716 T3 DK 3660716T3 DK 18315048 T DK18315048 T DK 18315048T DK 3660716 T3 DK3660716 T3 DK 3660716T3
Authority
DK
Denmark
Prior art keywords
service infrastructure
anomals
predicting
methods
detecting potential
Prior art date
Application number
DK18315048.1T
Other languages
English (en)
Inventor
Olivier Nicol
Original Assignee
Ovh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ovh filed Critical Ovh
Application granted granted Critical
Publication of DK3660716T3 publication Critical patent/DK3660716T3/da

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0775Content or structure details of the error report, e.g. specific table structure, specific error fields
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0787Storage of error reports, e.g. persistent data storage, storage using memory protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Debugging And Monitoring (AREA)
DK18315048.1T 2018-11-30 2018-11-30 Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen DK3660716T3 (da)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP18315048.1A EP3660716B1 (en) 2018-11-30 2018-11-30 Service infrastructure and methods of predicting and detecting potential anomalies at the service infrastructure

Publications (1)

Publication Number Publication Date
DK3660716T3 true DK3660716T3 (da) 2021-01-25

Family

ID=65657186

Family Applications (1)

Application Number Title Priority Date Filing Date
DK18315048.1T DK3660716T3 (da) 2018-11-30 2018-11-30 Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen

Country Status (6)

Country Link
US (1) US11528288B2 (da)
EP (1) EP3660716B1 (da)
CN (1) CN111258796A (da)
CA (1) CA3062346A1 (da)
DK (1) DK3660716T3 (da)
PL (1) PL3660716T3 (da)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231194B (zh) * 2020-12-11 2021-03-19 北京基调网络股份有限公司 一种指标异常根源分析方法、装置及计算机可读存储介质
CN114817273B (zh) * 2022-07-01 2022-09-27 湖南智警公共安全技术研究院有限公司 一种高频人车关联异常的数据识别方法及系统
CN115021942B (zh) * 2022-07-14 2023-08-11 南方联合产权交易中心有限责任公司 一种防篡改的网络数据安全传输方法

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4323241A1 (de) * 1993-07-12 1995-02-02 Ibm Verfahren und Computersystem zur Suche fehlerhafter Zeichenketten in einem Text
US6321338B1 (en) 1998-11-09 2001-11-20 Sri International Network surveillance
DE60130902T2 (de) 2001-11-23 2008-07-17 Protegrity Research & Development Verfahren zum Erkennen des Eindringens in ein Datenbanksystem
US20040111475A1 (en) * 2002-12-06 2004-06-10 International Business Machines Corporation Method and apparatus for selectively identifying misspelled character strings in electronic communications
US9503470B2 (en) 2002-12-24 2016-11-22 Fred Herz Patents, LLC Distributed agent based model for security monitoring and response
US20040193943A1 (en) 2003-02-13 2004-09-30 Robert Angelino Multiparameter network fault detection system using probabilistic and aggregation analysis
US7593013B2 (en) 2005-03-11 2009-09-22 University Of Utah Research Foundation Systems and methods for displaying and querying heterogeneous sets of data
US8776217B2 (en) * 2006-11-03 2014-07-08 Alcatel Lucent Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis
US8850571B2 (en) * 2008-11-03 2014-09-30 Fireeye, Inc. Systems and methods for detecting malicious network content
US8561188B1 (en) * 2011-09-30 2013-10-15 Trend Micro, Inc. Command and control channel detection with query string signature
US9813310B1 (en) 2011-10-31 2017-11-07 Reality Analytics, Inc. System and method for discriminating nature of communication traffic transmitted through network based on envelope characteristics
US9519781B2 (en) 2011-11-03 2016-12-13 Cyphort Inc. Systems and methods for virtualization and emulation assisted malware detection
CN105589570B (zh) * 2014-10-23 2019-04-09 北京搜狗科技发展有限公司 一种处理输入错误的方法和装置
US9043894B1 (en) 2014-11-06 2015-05-26 Palantir Technologies Inc. Malicious software detection in a computing system
EP3245776A4 (en) * 2015-01-18 2018-06-13 Checkmarx Ltd. Rasp for scripting languages
US10242062B2 (en) 2015-02-20 2019-03-26 Threatstop, Inc. Normalization and extraction of log data
US10798114B2 (en) * 2015-06-29 2020-10-06 Argus Cyber Security Ltd. System and method for consistency based anomaly detection in an in-vehicle communication network
US9740858B1 (en) * 2015-07-14 2017-08-22 Trend Micro Incorporated System and method for identifying forged emails
SG11201509818UA (en) * 2015-07-24 2017-03-30 Certis Cisco Security Pte Ltd System and method for high speed threat intelligence management using unsupervised machine learning and prioritization algorithms
US9699205B2 (en) 2015-08-31 2017-07-04 Splunk Inc. Network security system
CN107340880B (zh) * 2016-05-03 2021-11-02 北京搜狗科技发展有限公司 一种联想输入方法、装置及用于实现联想输入的电子设备
US10574681B2 (en) * 2016-09-04 2020-02-25 Palo Alto Networks (Israel Analytics) Ltd. Detection of known and unknown malicious domains
US10075417B2 (en) * 2016-09-12 2018-09-11 International Business Machines Corporation Verifying trustworthiness of redirection targets in a tiered web delivery network
WO2018085732A1 (en) 2016-11-03 2018-05-11 RiskIQ, Inc. Techniques for detecting malicious behavior using an accomplice model
US10887333B1 (en) * 2017-08-03 2021-01-05 Amazon Technologies, Inc. Multi-tenant threat intelligence service
US10897475B2 (en) * 2017-08-10 2021-01-19 Cisco Technology, Inc. DNS metadata-based signaling for network policy control
CN108259482B (zh) * 2018-01-04 2019-05-28 平安科技(深圳)有限公司 网络异常数据检测方法、装置、计算机设备及存储介质
CN108268335B (zh) * 2018-01-31 2022-04-19 努比亚技术有限公司 基于系统服务的重启定位方法、移动终端及存储介质
CN108763059A (zh) * 2018-04-24 2018-11-06 阿里巴巴集团控股有限公司 一种异常检测方法、装置及设备
CN108629174B (zh) * 2018-05-08 2022-06-07 创新先进技术有限公司 字符串校验的方法及装置

Also Published As

Publication number Publication date
CN111258796A (zh) 2020-06-09
EP3660716A1 (en) 2020-06-03
US20200177609A1 (en) 2020-06-04
PL3660716T3 (pl) 2021-05-31
CA3062346A1 (en) 2020-05-30
US11528288B2 (en) 2022-12-13
EP3660716B1 (en) 2020-12-23

Similar Documents

Publication Publication Date Title
EP3872735A4 (en) Service recommendation method, apparatus and device
DK3566225T3 (da) Metode og apparat til detektering af hoste i baggrunden
DK3805726T3 (da) Inspektionssystem og inspektionsfremgangsmåde
DK3532838T3 (da) Fremgangsmåder og systemer til kromatografidataanalyse
DK3589961T3 (da) Fremgangsmåde til strømmåling og strømmåleindretning
DK3746225T3 (da) Analytiske systemer og fremgangsmåder
IL290612A (en) Systems and methods for protein prediction
EP3571674A4 (en) CUSTOMER SERVICE TIME EVALUATION SYSTEM AND PROCESS
EP3307163A4 (en) SYSTEMS, METHODS AND DEVICES FOR ELECTROCHEMICAL IMAGING ON SITE
EP3913956A4 (en) MEASUREMENT PROCESS AND DEVICE
DK3739968T3 (da) Fremgangsmåde og indretning til at bestemme timerkonfiguration
EP3654609A4 (en) SINGLE ID SERVICE SYSTEM AND PROCESS BASED ON A BLOCKCHAIN
EP3845923A4 (en) DETECTION METHOD, DEVICE AND SYSTEM
PL3554041T3 (pl) Sposób i urządzenie do określania sekwencji
HUE062990T2 (hu) DMVR és BDOF alapú inter predikciós eljárás és készülék
EP3860165A4 (en) SERVICE TRANSMISSION METHOD AND DEVICE
DK3285061T3 (da) Fremgangsmåde og indretning til hårdhedsafprøvning
EP3754683A4 (en) TRAPPED OBJECT DETECTION SWITCH AND TRAPPED OBJECT DETECTION METHOD
DK4008994T3 (da) Fremgangsmåde og system til vejovervågning
EP3926613A4 (en) Advertisement contact determination system, advertisement contact determination device, and program
DK3721267T3 (da) System til detektering med dobbelt felt og fremgangsmåde til detektering
EP4024732A4 (en) TEST METHOD, APPARATUS AND SYSTEM
DK3660716T3 (da) Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen
EP4054246A4 (en) Neighboring cell measurement method and apparatus
EP3832834A4 (en) DEVICE, SYSTEM AND METHOD FOR DISPLAYING INFORMATION AND PROGRAM