18473373. LOG DETERMINATION DEVICE, LOG DETERMINATION METHOD, LOG DETERMINATION PROGRAM, AND LOG DETERMINATION SYSTEM simplified abstract (DENSO CORPORATION)

From WikiPatents
Jump to navigation Jump to search

LOG DETERMINATION DEVICE, LOG DETERMINATION METHOD, LOG DETERMINATION PROGRAM, AND LOG DETERMINATION SYSTEM

Organization Name

DENSO CORPORATION

Inventor(s)

Tomonori Ikuse of Kariya-city (JP)

Keita Hayakawa of Kariya-city (JP)

LOG DETERMINATION DEVICE, LOG DETERMINATION METHOD, LOG DETERMINATION PROGRAM, AND LOG DETERMINATION SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18473373 titled 'LOG DETERMINATION DEVICE, LOG DETERMINATION METHOD, LOG DETERMINATION PROGRAM, AND LOG DETERMINATION SYSTEM

Simplified Explanation

A log determination device is designed to analyze security logs for false positives by comparing them with predicted occurrence patterns due to maintenance.

  • The device acquires security logs with abnormality and position information.
  • It stores occurrence patterns of security logs expected during maintenance.
  • It compares the logs with the occurrence patterns to identify false positives.

Potential Applications

This technology can be applied in various industries such as cybersecurity, IT maintenance, and network monitoring.

Problems Solved

1. Eliminates the need for manual inspection of security logs for false positives. 2. Reduces the risk of overlooking critical security issues due to an overload of logs.

Benefits

1. Improves efficiency in identifying genuine security threats. 2. Enhances the accuracy of security log analysis. 3. Saves time and resources by automating the detection of false positives.

Potential Commercial Applications

Optimizing Security Log Analysis for False Positives Detection

Possible Prior Art

Prior art in this field may include traditional methods of analyzing security logs manually or using basic automated tools for log analysis.

What are the limitations of the log determination device in handling complex security threats?

The log determination device may struggle with identifying sophisticated security threats that do not follow predictable patterns.

How does the device ensure the accuracy of its predictions for occurrence patterns during maintenance?

The device may need continuous updates and refinement based on new data and patterns to ensure the accuracy of its predictions.


Original Abstract Submitted

A log determination device is configured to acquire a plurality of security logs each including an abnormality information and a position information, store an occurrence pattern of a security log which is predicted to occur due to a maintenance, and compare the plurality of security logs with the occurrence pattern to determine whether or not the plurality of security logs is a false positive log.