DK3660716T3 - Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen - Google Patents
Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen Download PDFInfo
- Publication number
- DK3660716T3 DK3660716T3 DK18315048.1T DK18315048T DK3660716T3 DK 3660716 T3 DK3660716 T3 DK 3660716T3 DK 18315048 T DK18315048 T DK 18315048T DK 3660716 T3 DK3660716 T3 DK 3660716T3
- Authority
- DK
- Denmark
- Prior art keywords
- service infrastructure
- anomals
- predicting
- methods
- detecting potential
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0709—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0775—Content or structure details of the error report, e.g. specific table structure, specific error fields
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0787—Storage of error reports, e.g. persistent data storage, storage using memory protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/079—Root cause analysis, i.e. error or fault diagnosis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/90335—Query processing
- G06F16/90344—Query processing by using string matching techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Computational Linguistics (AREA)
- Biomedical Technology (AREA)
- Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18315048.1A EP3660716B1 (en) | 2018-11-30 | 2018-11-30 | Service infrastructure and methods of predicting and detecting potential anomalies at the service infrastructure |
Publications (1)
Publication Number | Publication Date |
---|---|
DK3660716T3 true DK3660716T3 (da) | 2021-01-25 |
Family
ID=65657186
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK18315048.1T DK3660716T3 (da) | 2018-11-30 | 2018-11-30 | Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen |
Country Status (6)
Country | Link |
---|---|
US (1) | US11528288B2 (da) |
EP (1) | EP3660716B1 (da) |
CN (1) | CN111258796A (da) |
CA (1) | CA3062346A1 (da) |
DK (1) | DK3660716T3 (da) |
PL (1) | PL3660716T3 (da) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112231194B (zh) * | 2020-12-11 | 2021-03-19 | 北京基调网络股份有限公司 | 一种指标异常根源分析方法、装置及计算机可读存储介质 |
CN114817273B (zh) * | 2022-07-01 | 2022-09-27 | 湖南智警公共安全技术研究院有限公司 | 一种高频人车关联异常的数据识别方法及系统 |
CN115021942B (zh) * | 2022-07-14 | 2023-08-11 | 南方联合产权交易中心有限责任公司 | 一种防篡改的网络数据安全传输方法 |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4323241A1 (de) * | 1993-07-12 | 1995-02-02 | Ibm | Verfahren und Computersystem zur Suche fehlerhafter Zeichenketten in einem Text |
US6321338B1 (en) | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
DE60130902T2 (de) | 2001-11-23 | 2008-07-17 | Protegrity Research & Development | Verfahren zum Erkennen des Eindringens in ein Datenbanksystem |
US20040111475A1 (en) * | 2002-12-06 | 2004-06-10 | International Business Machines Corporation | Method and apparatus for selectively identifying misspelled character strings in electronic communications |
US9503470B2 (en) | 2002-12-24 | 2016-11-22 | Fred Herz Patents, LLC | Distributed agent based model for security monitoring and response |
US20040193943A1 (en) | 2003-02-13 | 2004-09-30 | Robert Angelino | Multiparameter network fault detection system using probabilistic and aggregation analysis |
US7593013B2 (en) | 2005-03-11 | 2009-09-22 | University Of Utah Research Foundation | Systems and methods for displaying and querying heterogeneous sets of data |
US8776217B2 (en) * | 2006-11-03 | 2014-07-08 | Alcatel Lucent | Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis |
US8850571B2 (en) * | 2008-11-03 | 2014-09-30 | Fireeye, Inc. | Systems and methods for detecting malicious network content |
US8561188B1 (en) * | 2011-09-30 | 2013-10-15 | Trend Micro, Inc. | Command and control channel detection with query string signature |
US9813310B1 (en) | 2011-10-31 | 2017-11-07 | Reality Analytics, Inc. | System and method for discriminating nature of communication traffic transmitted through network based on envelope characteristics |
US9519781B2 (en) | 2011-11-03 | 2016-12-13 | Cyphort Inc. | Systems and methods for virtualization and emulation assisted malware detection |
CN105589570B (zh) * | 2014-10-23 | 2019-04-09 | 北京搜狗科技发展有限公司 | 一种处理输入错误的方法和装置 |
US9043894B1 (en) | 2014-11-06 | 2015-05-26 | Palantir Technologies Inc. | Malicious software detection in a computing system |
EP3245776A4 (en) * | 2015-01-18 | 2018-06-13 | Checkmarx Ltd. | Rasp for scripting languages |
US10242062B2 (en) | 2015-02-20 | 2019-03-26 | Threatstop, Inc. | Normalization and extraction of log data |
US10798114B2 (en) * | 2015-06-29 | 2020-10-06 | Argus Cyber Security Ltd. | System and method for consistency based anomaly detection in an in-vehicle communication network |
US9740858B1 (en) * | 2015-07-14 | 2017-08-22 | Trend Micro Incorporated | System and method for identifying forged emails |
SG11201509818UA (en) * | 2015-07-24 | 2017-03-30 | Certis Cisco Security Pte Ltd | System and method for high speed threat intelligence management using unsupervised machine learning and prioritization algorithms |
US9699205B2 (en) | 2015-08-31 | 2017-07-04 | Splunk Inc. | Network security system |
CN107340880B (zh) * | 2016-05-03 | 2021-11-02 | 北京搜狗科技发展有限公司 | 一种联想输入方法、装置及用于实现联想输入的电子设备 |
US10574681B2 (en) * | 2016-09-04 | 2020-02-25 | Palo Alto Networks (Israel Analytics) Ltd. | Detection of known and unknown malicious domains |
US10075417B2 (en) * | 2016-09-12 | 2018-09-11 | International Business Machines Corporation | Verifying trustworthiness of redirection targets in a tiered web delivery network |
WO2018085732A1 (en) | 2016-11-03 | 2018-05-11 | RiskIQ, Inc. | Techniques for detecting malicious behavior using an accomplice model |
US10887333B1 (en) * | 2017-08-03 | 2021-01-05 | Amazon Technologies, Inc. | Multi-tenant threat intelligence service |
US10897475B2 (en) * | 2017-08-10 | 2021-01-19 | Cisco Technology, Inc. | DNS metadata-based signaling for network policy control |
CN108259482B (zh) * | 2018-01-04 | 2019-05-28 | 平安科技(深圳)有限公司 | 网络异常数据检测方法、装置、计算机设备及存储介质 |
CN108268335B (zh) * | 2018-01-31 | 2022-04-19 | 努比亚技术有限公司 | 基于系统服务的重启定位方法、移动终端及存储介质 |
CN108763059A (zh) * | 2018-04-24 | 2018-11-06 | 阿里巴巴集团控股有限公司 | 一种异常检测方法、装置及设备 |
CN108629174B (zh) * | 2018-05-08 | 2022-06-07 | 创新先进技术有限公司 | 字符串校验的方法及装置 |
-
2018
- 2018-11-30 DK DK18315048.1T patent/DK3660716T3/da active
- 2018-11-30 PL PL18315048T patent/PL3660716T3/pl unknown
- 2018-11-30 EP EP18315048.1A patent/EP3660716B1/en active Active
-
2019
- 2019-11-21 US US16/691,475 patent/US11528288B2/en active Active
- 2019-11-22 CA CA3062346A patent/CA3062346A1/en active Pending
- 2019-12-02 CN CN201911213000.9A patent/CN111258796A/zh active Pending
Also Published As
Publication number | Publication date |
---|---|
CN111258796A (zh) | 2020-06-09 |
EP3660716A1 (en) | 2020-06-03 |
US20200177609A1 (en) | 2020-06-04 |
PL3660716T3 (pl) | 2021-05-31 |
CA3062346A1 (en) | 2020-05-30 |
US11528288B2 (en) | 2022-12-13 |
EP3660716B1 (en) | 2020-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3872735A4 (en) | Service recommendation method, apparatus and device | |
DK3566225T3 (da) | Metode og apparat til detektering af hoste i baggrunden | |
DK3805726T3 (da) | Inspektionssystem og inspektionsfremgangsmåde | |
DK3532838T3 (da) | Fremgangsmåder og systemer til kromatografidataanalyse | |
DK3589961T3 (da) | Fremgangsmåde til strømmåling og strømmåleindretning | |
DK3746225T3 (da) | Analytiske systemer og fremgangsmåder | |
IL290612A (en) | Systems and methods for protein prediction | |
EP3571674A4 (en) | CUSTOMER SERVICE TIME EVALUATION SYSTEM AND PROCESS | |
EP3307163A4 (en) | SYSTEMS, METHODS AND DEVICES FOR ELECTROCHEMICAL IMAGING ON SITE | |
EP3913956A4 (en) | MEASUREMENT PROCESS AND DEVICE | |
DK3739968T3 (da) | Fremgangsmåde og indretning til at bestemme timerkonfiguration | |
EP3654609A4 (en) | SINGLE ID SERVICE SYSTEM AND PROCESS BASED ON A BLOCKCHAIN | |
EP3845923A4 (en) | DETECTION METHOD, DEVICE AND SYSTEM | |
PL3554041T3 (pl) | Sposób i urządzenie do określania sekwencji | |
HUE062990T2 (hu) | DMVR és BDOF alapú inter predikciós eljárás és készülék | |
EP3860165A4 (en) | SERVICE TRANSMISSION METHOD AND DEVICE | |
DK3285061T3 (da) | Fremgangsmåde og indretning til hårdhedsafprøvning | |
EP3754683A4 (en) | TRAPPED OBJECT DETECTION SWITCH AND TRAPPED OBJECT DETECTION METHOD | |
DK4008994T3 (da) | Fremgangsmåde og system til vejovervågning | |
EP3926613A4 (en) | Advertisement contact determination system, advertisement contact determination device, and program | |
DK3721267T3 (da) | System til detektering med dobbelt felt og fremgangsmåde til detektering | |
EP4024732A4 (en) | TEST METHOD, APPARATUS AND SYSTEM | |
DK3660716T3 (da) | Tjenesteinfrastruktur og fremgangsmåder til at forudsige og detektere potentielle anomalier hos tjenesteinfrastrukturen | |
EP4054246A4 (en) | Neighboring cell measurement method and apparatus | |
EP3832834A4 (en) | DEVICE, SYSTEM AND METHOD FOR DISPLAYING INFORMATION AND PROGRAM |