Microsoft Corporation
Real-time detection of malicious activity through collaborative filtering

Last updated:

Abstract:

A machine compromised by malicious activity is detected by identifying an anomalous port opened on an entity of a network. The anomalous port is detected through collaborative filtering using usage patterns derived from normal network traffic using open ports of entities on the network. The collaborative filtering employs single value decomposition with alternating least squares to generate a recommendation score identifying whether an entity having a newly-opened port is likely to be used for malicious activity.

Status:
Grant
Type:

Utility

Filling date:

1 Apr 2019

Issue date:

14 Jun 2022