Collaborative and adaptive threat intelligence for computer security
First Claim
1. A method for collaborative and adaptive threat intelligence, comprising:
- receiving data collected on a first customer network;
training one or more local models with at least the received data, wherein the one or more local models are related to security;
determining an amount of data to transmit to a centralized controller based at least on a result of the training one or more local models;
transmitting the determined amount of data to the centralized controller;
receiving, from the centralized controller, result data that is a result of one or more global models trained on the centralized controller using data collected on a plurality of customer networks including the first customer network;
adjusting the one or more local models using the received result data, wherein the result data includes information specifying a feature modification of a feature of the one or more local models, and wherein adjusting the one or more local models includes modifying the feature of the one or more local models in accordance with the specified feature modification;
training the one or more adjusted local models; and
prior to transmitting the determined amount of data to the centralized controller, anonymizing at least a portion of that determined amount of data;
wherein anonymizing at least a portion of the determined amount of data includes removing or obfuscating one or more of the following attributes in the data;
username, Internet Protocol (IP) address, home address, social security number, credit card number, email address, and name.
3 Assignments
0 Petitions
Accused Products
Abstract
Collaborative and adaptive threat intelligence. Data collected on a first customer network is received. One or more local models are trained with at least the received data, where the one or more local models are related to security. An amount of data to transmit to a centralized controller is determined based at least on a result of the training one or more local models and the determined amount of data is transmitted to the centralized controller. Result data is received from the centralized controller that is a result of one or more global models trained on the centralized controller using data collected on multiple customer networks including the first customer network. The one or more local models are adjusted using the received result data and the one or more adjusted local models are trained.
53 Citations
15 Claims
-
1. A method for collaborative and adaptive threat intelligence, comprising:
-
receiving data collected on a first customer network; training one or more local models with at least the received data, wherein the one or more local models are related to security; determining an amount of data to transmit to a centralized controller based at least on a result of the training one or more local models; transmitting the determined amount of data to the centralized controller; receiving, from the centralized controller, result data that is a result of one or more global models trained on the centralized controller using data collected on a plurality of customer networks including the first customer network; adjusting the one or more local models using the received result data, wherein the result data includes information specifying a feature modification of a feature of the one or more local models, and wherein adjusting the one or more local models includes modifying the feature of the one or more local models in accordance with the specified feature modification; training the one or more adjusted local models; and prior to transmitting the determined amount of data to the centralized controller, anonymizing at least a portion of that determined amount of data; wherein anonymizing at least a portion of the determined amount of data includes removing or obfuscating one or more of the following attributes in the data;
username, Internet Protocol (IP) address, home address, social security number, credit card number, email address, and name. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory machine-readable storage medium that provides instructions that, if executed by a processor, will cause said processor to perform operations comprising:
-
receiving data collected on a first customer network; training one or more local models with at least the received data, wherein the one or more local models are related to security; determining an amount of data to transmit to a centralized controller based at least on a result of the training one or more local models; transmitting the determined amount of data to the centralized controller; receiving, from the centralized controller, result data that is a result of one or more global models trained on the centralized controller using data collected on a plurality of customer networks including the first customer network; adjusting the one or more local models using the received result data, wherein the result data includes information specifying a feature modification of a feature of the one or more local models, and wherein adjusting the one or more local models includes modifying the feature of the one or more local models in accordance with the specified feature modification; training the one or more adjusted local models; and prior to transmitting the determined amount of data to the centralized controller, anonymizing at least a portion of that determined amount of data; wherein anonymizing at least a portion of the determined amount of data includes removing or obfuscating one or more of the following attributes in the data;
username, Internet Protocol (IP) address, home address, social security number, credit card number, email address, and name. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An apparatus for collaborative and adaptive threat intelligence, comprising:
-
a processor; and a non-transitory machine-readable storage medium containing instructions executable by said processor whereby said apparatus is operative to; receive data collected on a first customer network; train one or more local models with at least the received data, wherein the one or more local models are related to security; determine an amount of data to transmit to a centralized controller based at least on a result of the training one or more local models; transmit the determined amount of data to the centralized controller; receive, from the centralized controller, result data that is a result of one or more global models trained on the centralized controller using data collected on a plurality of customer networks including the first customer network; adjust the one or more local models using the received result data, wherein the result data includes information specifying a feature modification of a feature of the one or more local models, and wherein adjusting the one or more local models includes modifying the feature of the one or more local models in accordance with the specified feature modification; train the one or more adjusted local models; and wherein prior to transmission of the determined amount of data to the centralized controller, the apparatus is further operative to anonymize at least a portion of that determined amount of data; wherein anonymization of at least a portion of the determined amount of data includes removal or obfuscation of one or more of the following attributes in the data;
username, Internet Protocol (IP) address, home address, social security number, credit card number, email address, and name. - View Dependent Claims (12, 13, 14, 15)
-
Specification