Microsoft Corporation
Real-time detection of malicious activity through collaborative filtering
Last updated:
Abstract:
A machine compromised by malicious activity is detected by identifying an anomalous port opened on an entity of a network. The anomalous port is detected through collaborative filtering using usage patterns derived from normal network traffic using open ports of entities on the network. The collaborative filtering employs single value decomposition with alternating least squares to generate a recommendation score identifying whether an entity having a newly-opened port is likely to be used for malicious activity.
Status:
Grant
Type:
Utility
Filling date:
1 Apr 2019
Issue date:
14 Jun 2022