白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Using neural networks to process forensics and generate threat intelligence information

專利號(hào)
US11888895B2
公開日期
2024-01-30
申請人
Proofpoint, Inc.(US CA Sunnyvale)
發(fā)明人
Zachary Mitchell Abzug; Kevin Patrick Blissett; Brian Sanford Jones
IPC分類
G06F7/04; H04L9/40; G06N3/08; G06N3/045
技術(shù)領(lǐng)域
campaign,platform,neural,or,may,forensics,threat,compromise,networks,threats
地域: CA CA Sunnyvale

摘要

Aspects of the disclosure relate to generating threat intelligence information. A computing platform may receive forensics information corresponding to message attachments. For each message attachment, the computing platform may generate a feature representation. The computing platform may input the feature representations into a neural network, which may result in a numeric representation for each message attachments. The computing platform may apply a clustering algorithm to cluster each message attachments based on the numeric representations, which may result in clustering information. The computing platform may extract, from the clustering information, one or more indicators of compromise indicating that one or more attachments corresponds to a threat campaign. The computing platform may send, to an enterprise user device, user interface information comprising the one or more indicators of compromise, which may cause the enterprise user device to display a user interface identifying the one or more indicators of compromise.

說明書

Additionally or alternatively, the campaign identification platform 110 may train the one or more neural networks to learn and apply a vocabulary of sub words and/or pieces of words that are adapted to threat identification and clustering. For example, the campaign identification platform 110 may use sub-word embedding to train the one or more neural networks (e.g., when applying the one or more neural networks to text data) rather than applying the one or more neural networks to every letter individually and/or word separately. As an example, in using sub-word embedding to train the one or more neural networks, the campaign identification platform 110 may feed strings of characters that often fall together in training data (e.g., “.com”) into the one or more neural networks as sub words.

By training the one or more neural networks to use both metric learning and sub-word embeddings to produce numerical representations, the campaign identification platform 110 may continuously adapt to—and thereby address—technical challenges presented by the constantly changing nature of the threat landscape. For example, features of different threats may be constantly changing (e.g., the filenames of files that threats may create, the URLs that threats may attempt to communicate with, and/or objects may change). Similarly, the labels that may be applied to different threats may be constantly changing (e.g., due to the temporal nature of campaigns). As a result of these challenges, conventional supervised machine learning (which may e.g., attempt to find an association between features and labels) might not work to address the technical problems addressed herein. One or more aspects of the disclosure, however, may provide various advantages over these conventional approaches, for instance, by providing the capability to continuously adapt to changing threats, as noted above.

權(quán)利要求

1
微信群二維碼
意見反饋