×

Techniques for customer-derived training of intrusion management systems

  • US 10,686,811 B1
  • Filed: 11/21/2014
  • Issued: 06/16/2020
  • Est. Priority Date: 11/21/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • one ormore processors; and

    memory including instructions that, as a result of execution by the one or more processors, cause the system to;

    generate a security model that characterizes network data by applying attack classifications;

    determine that a security test is to be performed to a target endpoint by a client device associated with a customer of a computing resource service provider, the target endpoint being a virtual computer system hosted by the computing resource service provider;

    obtain, from the customer via the client device, a plurality of attributes of the security test, wherein the plurality of attributes include a first identifier of the client device, second identifier of the target endpoint, and a length of time specified for performing the security test;

    modify, based at least in part on the plurality of attributes of the security test, the security model to produce a modified security model to be usable in determining traffic profiles from ingestion of network traffic between the client device and the target endpoint;

    determine, based at least in part on the plurality of attributes of the security test and the security model, a subset of the network traffic between the client device and the target endpoint in connection with the security test, the subset of the network traffic conforming to the plurality of attributes of the security test;

    process, by at least utilizing the modified security model, the subset of the network traffic to determine a traffic profile;

    process the traffic profile using the attack classifications to generate training data; and

    update, based at least in part on the training data, the modified security model by at least generating a new attack classification that matches the traffic profile with a higher confidence level than the attack classifications used to generate the training data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×