[go: up one dir, main page]

GB201904276D0 - Pre-emptive computer security - Google Patents

Pre-emptive computer security

Info

Publication number
GB201904276D0
GB201904276D0 GBGB1904276.1A GB201904276A GB201904276D0 GB 201904276 D0 GB201904276 D0 GB 201904276D0 GB 201904276 A GB201904276 A GB 201904276A GB 201904276 D0 GB201904276 D0 GB 201904276D0
Authority
GB
United Kingdom
Prior art keywords
emptive
computer security
security
computer
emptive computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GBGB1904276.1A
Other versions
GB2582609B (en
GB2582609A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to GB1904276.1A priority Critical patent/GB2582609B/en
Publication of GB201904276D0 publication Critical patent/GB201904276D0/en
Publication of GB2582609A publication Critical patent/GB2582609A/en
Application granted granted Critical
Publication of GB2582609B publication Critical patent/GB2582609B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • G06N3/0455Auto-encoder networks; Encoder-decoder networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/042Knowledge-based neural networks; Logical representations of neural networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/047Probabilistic or stochastic networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/088Non-supervised learning, e.g. competitive learning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • G06N5/022Knowledge engineering; Knowledge acquisition

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Biophysics (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Probability & Statistics with Applications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
GB1904276.1A 2019-03-27 2019-03-27 Pre-emptive computer security Expired - Fee Related GB2582609B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1904276.1A GB2582609B (en) 2019-03-27 2019-03-27 Pre-emptive computer security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1904276.1A GB2582609B (en) 2019-03-27 2019-03-27 Pre-emptive computer security

Publications (3)

Publication Number Publication Date
GB201904276D0 true GB201904276D0 (en) 2019-05-08
GB2582609A GB2582609A (en) 2020-09-30
GB2582609B GB2582609B (en) 2021-10-20

Family

ID=66381328

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1904276.1A Expired - Fee Related GB2582609B (en) 2019-03-27 2019-03-27 Pre-emptive computer security

Country Status (1)

Country Link
GB (1) GB2582609B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112398819A (en) * 2020-11-02 2021-02-23 杭州海康威视数字技术股份有限公司 Method and device for recognizing abnormality

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11449604B2 (en) * 2019-03-27 2022-09-20 British Telecommunications Public Limited Company Computer security
WO2020193332A1 (en) * 2019-03-27 2020-10-01 British Telecommunications Public Limited Company Pre-emptive computer security
US11436320B2 (en) * 2019-03-27 2022-09-06 British Telecommunications Public Limited Company Adaptive computer security

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10382478B2 (en) * 2016-12-20 2019-08-13 Cisco Technology, Inc. Detecting malicious domains and client addresses in DNS traffic
EP3635914B1 (en) * 2017-06-09 2021-04-14 British Telecommunications Public Limited Company Anomaly detection in computer networks
CN109829299B (en) * 2018-11-29 2022-05-10 电子科技大学 An Unknown Attack Recognition Method Based on Deep Autoencoder

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112398819A (en) * 2020-11-02 2021-02-23 杭州海康威视数字技术股份有限公司 Method and device for recognizing abnormality

Also Published As

Publication number Publication date
GB2582609B (en) 2021-10-20
GB2582609A (en) 2020-09-30

Similar Documents

Publication Publication Date Title
GB2570752B (en) Time-bound secure access
GB2554390B (en) Computer security profiling
GB2555759B (en) Data access and ownership management
IL266445B (en) Secure key management
GB2583892B (en) Adaptive computer security
GB201706015D0 (en) Data security
GB201803275D0 (en) Data security
GB2582609B (en) Pre-emptive computer security
PL4061164T3 (en) Security tag
GB201602873D0 (en) Secure data access
GB201714219D0 (en) A security document or token
GB2588765B (en) Security tag
GB2593003B (en) Square computer lock
GB2580714B (en) Security tag
SG11202008538UA (en) Transaction security
IL262653B (en) Hard bouillon tablet
GB2539100B (en) Preventing security threats in a computer network
PL3833458T3 (en) Game engine-based computer security
GB201715073D0 (en) Data security
GB201616788D0 (en) Enhanced computer objects security
GB201904275D0 (en) Computer Security
GB201722299D0 (en) Encrypted data access
AU2015100387A4 (en) A Security Document or Token
GB202103373D0 (en) Computer Security
GB2584623B (en) Security tag

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20250327