COGNITIVE INFORMATION SECURITY USING A BEHAVIORAL RECOGNITION SYSTEM
First Claim
1. A method for processing streams of information security data from one or more networked computer systems, the method comprising:
- receiving an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network; and
generating a neuro-linguistic model of the information security data by;
clustering the ordered stream of vectors and assigning a letter to each cluster,outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters,building a dictionary of words from of the ordered output of letters,outputting an ordered stream of words based on the ordered output of letters, andgenerating a plurality of phrases based on the ordered output of words.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
-
Citations
20 Claims
-
1. A method for processing streams of information security data from one or more networked computer systems, the method comprising:
-
receiving an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network; and generating a neuro-linguistic model of the information security data by; clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable storage medium storing instructions, which, when executed on a processor, performs an operation for processing streams of data of one or more networked computer systems, the operation comprising:
-
receiving an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network; and generating a neuro-linguistic model of the information security data by; clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system, comprising:
-
a processor; and a memory storing one or more application programs configured to perform an operation for processing streams of data of one or more networked computer systems, the operation comprising; receiving an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network; and generating a neuro-linguistic model of the information security data by; clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words. - View Dependent Claims (18, 19, 20)
-
Specification