International business machines corporation (20240106860). IDENTIFYING OUTLIER APPLICATION CONNECTIONS TO SERVICES WITH CONTROLLED CONFIDENCE LEVEL AND IN REAL-TIME simplified abstract

From WikiPatents
Jump to navigation Jump to search

IDENTIFYING OUTLIER APPLICATION CONNECTIONS TO SERVICES WITH CONTROLLED CONFIDENCE LEVEL AND IN REAL-TIME

Organization Name

international business machines corporation

Inventor(s)

Leonid Rodniansky of Allston MA (US)

Tania Butovsky of Needham MA (US)

Mikhail Shpak of New York NY (US)

IDENTIFYING OUTLIER APPLICATION CONNECTIONS TO SERVICES WITH CONTROLLED CONFIDENCE LEVEL AND IN REAL-TIME - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240106860 titled 'IDENTIFYING OUTLIER APPLICATION CONNECTIONS TO SERVICES WITH CONTROLLED CONFIDENCE LEVEL AND IN REAL-TIME

Simplified Explanation

The abstract describes techniques for identifying outlier application connections for computer security. These techniques involve identifying connections between a client application and services over a communication network, switching from an outlier connection learning phase to an outlier connection detection phase based on the identified connections, determining in real-time when to switch to the detection phase, identifying outlier connections, and reducing security risks related to those connections.

  • Identifying outlier application connections for computer security:
 - Techniques involve identifying connections between a client application and services over a communication network.
 - Switching from an outlier connection learning phase to an outlier connection detection phase based on the identified connections.
 - Determining in real-time when to switch to the detection phase.
 - Identifying outlier connections and reducing security risks related to those connections.

Potential Applications

The technology can be applied in various industries where securing application connections is crucial, such as finance, healthcare, and government sectors.

Problems Solved

1. Identifying and mitigating security risks associated with outlier application connections. 2. Enhancing overall computer security by detecting and addressing potential threats in real-time.

Benefits

1. Improved security measures for application connections. 2. Real-time detection and response to outlier connections. 3. Reduced security risks and potential data breaches.

Potential Commercial Applications

Enhancing cybersecurity software for businesses Optimizing network security for government agencies Improving data protection measures for healthcare organizations

Possible Prior Art

One possible prior art could be the use of machine learning algorithms to detect anomalies in network traffic and identify potential security threats.

Unanswered Questions

How does this technology compare to existing outlier detection methods in terms of accuracy and efficiency?

The article does not provide a direct comparison with existing outlier detection methods, leaving the reader to wonder about the effectiveness of this new approach.

What are the specific criteria used to determine when to switch from the outlier connection learning phase to the detection phase?

The article mentions using a confidence level and a number of previously analyzed connections, but it does not delve into the specific criteria or algorithms used for this decision-making process.


Original Abstract Submitted

techniques for identifying outlier application connections for computer security are described. these techniques include identifying one or more connections between a client application and one or more services, over a communication network, and determining to switch from an outlier connection learning phase to an outlier connection detection phase based on the identified or more connections, including determining, in real-time and based on a confidence level and a number of previously analyzed connections, to switch to the outlier connection detection phase. the techniques further include determining, based on the switch to the outlier connection detection phase, that a first connection of the identified one or more connections is an outlier connection, and acting to reduce a security risk relating to the first connection.