SG10202002125QA - System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats - Google Patents
System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threatsInfo
- Publication number
- SG10202002125QA SG10202002125QA SG10202002125QA SG10202002125QA SG10202002125QA SG 10202002125Q A SG10202002125Q A SG 10202002125QA SG 10202002125Q A SG10202002125Q A SG 10202002125QA SG 10202002125Q A SG10202002125Q A SG 10202002125QA SG 10202002125Q A SG10202002125Q A SG 10202002125QA
- Authority
- SG
- Singapore
- Prior art keywords
- morphologies
- analysing
- unknown
- detecting data
- data anomalies
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9017—Indexing; Data structures therefor; Storage structures using directory or table look-up
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Mathematical Physics (AREA)
- Computational Linguistics (AREA)
- Databases & Information Systems (AREA)
- Biomedical Technology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biophysics (AREA)
- Molecular Biology (AREA)
- Virology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Priority Applications (15)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG10202002125QA SG10202002125QA (en) | 2020-03-09 | 2020-03-09 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| US16/946,245 US11082441B1 (en) | 2020-03-09 | 2020-06-11 | Systems and methods for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| MYPI2021004142A MY199083A (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| CA3125101A CA3125101A1 (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| JP2021505691A JP7092939B2 (en) | 2020-03-09 | 2020-07-30 | Systems and methods for detecting data anomalies by morphological analysis of known and / or unknown cybersecurity threats |
| EP20753862.0A EP3899770B1 (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| CN202080002105.4A CN113632083B (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analyzing the morphology of known and/or unknown cyber-security threats |
| DK20753862.0T DK3899770T3 (en) | 2020-03-09 | 2020-07-30 | SYSTEM AND METHOD FOR DETECTION OF DATA IRREGULARITIES BY ANALYSIS OF THE MORPHOLOGIES OF KNOWN AND/OR UNKNOWN CYBER SECURITY THREATS |
| KR1020217002942A KR102323290B1 (en) | 2020-03-09 | 2020-07-30 | Systems and methods for detecting data anomalies by analyzing morphologies of known and/or unknown cybersecurity threats |
| PCT/SG2020/050441 WO2021183043A1 (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| AU2020223632A AU2020223632B2 (en) | 2020-03-09 | 2020-07-30 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| NZ767245A NZ767245B2 (en) | 2020-03-09 | 2020-08-20 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| TW109129559A TWI720932B (en) | 2020-03-09 | 2020-08-28 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| IL289367A IL289367B (en) | 2020-03-09 | 2021-12-24 | Systems and methods for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
| SA522440461A SA522440461B1 (en) | 2020-03-09 | 2022-09-08 | System and method for detecting data anomalies by analysing morphologies of cybersecurity threats |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG10202002125QA SG10202002125QA (en) | 2020-03-09 | 2020-03-09 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| SG10202002125QA true SG10202002125QA (en) | 2020-07-29 |
Family
ID=72355657
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| SG10202002125QA SG10202002125QA (en) | 2020-03-09 | 2020-03-09 | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US11082441B1 (en) |
| EP (1) | EP3899770B1 (en) |
| KR (1) | KR102323290B1 (en) |
| CN (1) | CN113632083B (en) |
| AU (1) | AU2020223632B2 (en) |
| SG (1) | SG10202002125QA (en) |
| TW (1) | TWI720932B (en) |
| WO (1) | WO2021183043A1 (en) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11711310B2 (en) | 2019-09-18 | 2023-07-25 | Tweenznet Ltd. | System and method for determining a network performance property in at least one network |
| US11716338B2 (en) * | 2019-11-26 | 2023-08-01 | Tweenznet Ltd. | System and method for determining a file-access pattern and detecting ransomware attacks in at least one computer network |
| US11792223B2 (en) | 2020-06-29 | 2023-10-17 | Netapp, Inc. | Systems and methods for detecting malware attacks |
| US11720991B2 (en) * | 2021-05-20 | 2023-08-08 | International Business Machines Corporation | Signing and authentication of digital images and other data arrays |
| US11934667B1 (en) * | 2021-06-30 | 2024-03-19 | Amazon Technologies, Inc. | Encrypted-data-only media operations |
| CN114238983B (en) * | 2021-12-10 | 2025-03-28 | 安天科技集团股份有限公司 | Threat analysis method, device, equipment and storage medium in confidential environment |
| WO2023113772A1 (en) * | 2021-12-13 | 2023-06-22 | Hewlett-Packard Development Company, L.P. | Suspicious activity notifications via canary files |
| US12267299B2 (en) * | 2022-01-12 | 2025-04-01 | Bank Of America Corporation | Preemptive threat detection for an information system |
| CN116933253A (en) * | 2022-03-29 | 2023-10-24 | 华为技术有限公司 | Method for detecting lux software, related system and storage medium |
| US12067113B2 (en) | 2022-04-26 | 2024-08-20 | Bank Of America Corporation | Proactive anti cyber-forensic activity detection and prevention |
| US11647040B1 (en) * | 2022-07-14 | 2023-05-09 | Tenable, Inc. | Vulnerability scanning of a remote file system |
| CN115374075B (en) * | 2022-08-01 | 2023-09-01 | 北京明朝万达科技股份有限公司 | File type identification method and device |
| WO2024065238A1 (en) * | 2022-09-28 | 2024-04-04 | Yu Wenfeng | Systems, methods, and media for protecting application programming interfaces |
| US12524534B1 (en) | 2025-04-17 | 2026-01-13 | R.C.Raven Cloud LTD | Techniques for assessing exploitations in a runtime environment |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9087195B2 (en) * | 2009-07-10 | 2015-07-21 | Kaspersky Lab Zao | Systems and methods for detecting obfuscated malware |
| CN101854404B (en) * | 2010-06-04 | 2013-08-07 | 中国科学院计算机网络信息中心 | Method and device for detecting anomaly of domain name system |
| US11126720B2 (en) * | 2012-09-26 | 2021-09-21 | Bluvector, Inc. | System and method for automated machine-learning, zero-day malware detection |
| US9292688B2 (en) | 2012-09-26 | 2016-03-22 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
| US10713358B2 (en) * | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
| US9465939B2 (en) * | 2014-06-27 | 2016-10-11 | Mcafee, Inc. | Mitigation of malware |
| US20170068816A1 (en) * | 2015-09-04 | 2017-03-09 | University Of Delaware | Malware analysis and detection using graph-based characterization and machine learning |
| US10491627B1 (en) * | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
| US20180248896A1 (en) * | 2017-02-24 | 2018-08-30 | Zitovault Software, Inc. | System and method to prevent, detect, thwart, and recover automatically from ransomware cyber attacks, using behavioral analysis and machine learning |
| US11689557B2 (en) * | 2018-02-20 | 2023-06-27 | Darktrace Holdings Limited | Autonomous report composer |
| KR102075715B1 (en) * | 2018-05-29 | 2020-02-10 | 국방과학연구소 | Apparatus for classifying attack groups and method therefor |
| US11574051B2 (en) * | 2018-08-02 | 2023-02-07 | Fortinet, Inc. | Malware identification using multiple artificial neural networks |
| CN109522926A (en) * | 2018-09-28 | 2019-03-26 | 南京航空航天大学 | Method for detecting abnormality based on comentropy cluster |
-
2020
- 2020-03-09 SG SG10202002125QA patent/SG10202002125QA/en unknown
- 2020-06-11 US US16/946,245 patent/US11082441B1/en active Active
- 2020-07-30 AU AU2020223632A patent/AU2020223632B2/en active Active
- 2020-07-30 KR KR1020217002942A patent/KR102323290B1/en active Active
- 2020-07-30 WO PCT/SG2020/050441 patent/WO2021183043A1/en not_active Ceased
- 2020-07-30 CN CN202080002105.4A patent/CN113632083B/en active Active
- 2020-07-30 EP EP20753862.0A patent/EP3899770B1/en active Active
- 2020-08-28 TW TW109129559A patent/TWI720932B/en active
Also Published As
| Publication number | Publication date |
|---|---|
| EP3899770B1 (en) | 2022-10-05 |
| US11082441B1 (en) | 2021-08-03 |
| EP3899770A1 (en) | 2021-10-27 |
| KR102323290B1 (en) | 2021-11-05 |
| CN113632083B (en) | 2022-09-13 |
| TW202134919A (en) | 2021-09-16 |
| CN113632083A (en) | 2021-11-09 |
| TWI720932B (en) | 2021-03-01 |
| AU2020223632A1 (en) | 2021-09-23 |
| EP3899770A4 (en) | 2021-12-08 |
| WO2021183043A1 (en) | 2021-09-16 |
| KR20210114916A (en) | 2021-09-24 |
| AU2020223632B2 (en) | 2021-10-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| SG10202002125QA (en) | System and method for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats | |
| GB2595809B (en) | Method, apparatus, and system for quantitative analysis of seal of trap faults | |
| EP4150421C0 (en) | SYSTEM, APPARATUS AND METHOD FOR DETECTING ABNORMAL DATA POINTS | |
| EP3948628A4 (en) | SYSTEM AND METHOD FOR DETECTION OF CYBER-ELECTRONIC AND COUNTERFEIT COMPONENTS | |
| BR112018007040A2 (en) | method and apparatus for detecting and classifying convulsive activity | |
| EP3803317C0 (en) | SYSTEM AND METHOD FOR ANALYSIS OF PARTICLE CONCENTRATION | |
| SG11202112145PA (en) | Method and system for malware or cybercriminal infrastructure detection | |
| EP2890168A4 (en) | METHOD, SYSTEM AND DEVICE FOR SHARING / ACQUIRING PROFIT OF PACKET DEPTH INSPECTION ANALYSIS RESULT | |
| EP3966606A4 (en) | SYSTEM AND METHOD FOR WELL INTERFERENCE DETECTION AND PREDICTION | |
| EP3857853C0 (en) | SYSTEM AND METHOD FOR AUTOMATIC COMPUTER SECURITY POLICY GENERATION AND ANOMALY DETECTION | |
| EP4067817A4 (en) | SYSTEM AND METHOD FOR SPATIAL POSITIONING OF MAGNETOMETERS | |
| EP4423980A4 (en) | SYSTEMS AND METHODS FOR IMPROVED DETECTION OF NETWORK ATTACKS | |
| GB2626257B (en) | System and method for analysis of specimens | |
| EP3929460A4 (en) | FAULT DETECTION SYSTEM AND FAULT DETECTION METHOD | |
| EP4042536A4 (en) | SYSTEM AND METHOD FOR DETECTION AND ISOLATION OF AN ELECTROMAGNETIC PULSE TO PROTECT A MONITORED INFRASTRUCTURE | |
| EP4494401A4 (en) | SYSTEMS, METHOD AND DEVICES FOR DETECTING OVERLAPKING MEASURING GAPS | |
| EP4270877A4 (en) | DEVICE FOR CALCULATION OF THRESHOLDS, DEVICE FOR DETECTING ANOMALIES, METHOD FOR CALCULATION OF THRESHOLDS AND METHOD FOR DETECTING ANOMALIES | |
| EP4136432A4 (en) | SYSTEM AND METHOD FOR FLUORESCENCE DETECTION | |
| IL289367B (en) | Systems and methods for detecting data anomalies by analysing morphologies of known and/or unknown cybersecurity threats | |
| EP4030984A4 (en) | METHOD AND/OR MONITORING SYSTEM FOR TESTING VISUAL FUNCTION | |
| EP4123488A4 (en) | METHOD, APPARATUS AND SYSTEM FOR MALICIOUS INTRUSION DETECTION, COMPUTER DEVICE, MEDIUM AND PROGRAM | |
| EP3365978A4 (en) | METHOD AND SYSTEM FOR DELETION AND SEPARATION OF RF SIGNALS | |
| SG11202107321QA (en) | A system and a method of performing spectroscopic analysis of a sample | |
| GB2606258B (en) | System for and method of detecting changes | |
| GB201820606D0 (en) | Method of analysing seismic data to detect hydrocarbons |