Patent Issued for Detection Of Anomalous Computer Behavior (USPTO 10,652,257) - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Advertise
    • Contact
    • Editorial Staff
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
May 26, 2020 Newswires
Share
Share
Post
Email

Patent Issued for Detection Of Anomalous Computer Behavior (USPTO 10,652,257)

Insurance Daily News

2020 MAY 26 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- State Farm Mutual Automobile Insurance Company (Bloomington, Illinois, United States) has been issued patent number 10,652,257, according to news reporting originating out of Alexandria, Virginia, by NewsRx editors.

The patent’s inventors are Shah, Rajiv (Bloomington, IL); Morrison, Shannon (Gilbert, AZ); Cunningham, Jeremy (Bloomington, IL); Smith, Taylor (Addison, TX); Sundararaman, Sripriya (Plano, TX); Wan, Jing (Allen, TX); Hevrin, Jeffrey (Bloomington, IL); Duehr, Ronald (Normal, IL); Sliz, Brad (Normal, IL); Allen, Lucas (East Peoria, IL).

This patent was filed on July 7, 2017 and was published online on May 25, 2020.

From the background information supplied by the inventors, news correspondents obtained the following quote: “Corporations, government offices, universities, colleges, and other organizations may have a large number of computers and file servers that are networked together. Typically, these computers have access to websites on the Internet via proxy servers and firewall servers. Occasionally, one or more computers attempts to access a website which is unexpected, not approved, or nonexistent. This anomalous behavior may be the result of activity of the computer user, malware, viruses, or bots (Internet or web robots) on the machine, computer hardware, firmware, or software misconfiguration, or other circumstances. Scanning a computer’s hard drive and memory for malware, viruses, and bots may detect some malicious programs, but a scanner can only detect programs of which it is aware, so new malware or viruses may not be detected. And, scanning a computer’s hard drive and memory for malware and viruses typically does not detect hardware, firmware, or software misconfigurations. Thus, some anomalous behavior, particularly resulting from misconfigurations, may go undetected.”

Supplementing the background information on this patent, NewsRx reporters also obtained the inventors’ summary information for this patent: “Embodiments of the present technology relate to computer-implemented methods, computing devices, and computer-readable media for detecting anomalous behavior of one or more computers in a large group of computers. In a first aspect, a computer-implemented method for detecting anomalous behavior of one or more computers in a large group of computers may be provided. The method may include, via one or more processors and/or transceivers: (1) receiving log files including a plurality of entries of data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with the actions of one computer and including a plurality of features; (2) executing a first plurality of algorithms to determine a portion of the features which contribute to anomalous computer behavior; and/or (3) executing a second plurality of algorithms utilizing the portion of features to determine the computers which are behaving anomalously. The method may include additional, fewer, or alternative actions, including those discussed elsewhere herein.

“In another aspect, a computer-readable medium for detecting anomalous behavior of one or more computers in a large group of computers may be provided. The computer-readable medium may include an executable program stored thereon, wherein the program instructs a processing element of a computing device to perform the following actions: (1) receiving log files including a plurality of entries of data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with the actions of one computer and including a plurality of features; (2) executing a first plurality of algorithms to determine a portion of the features which contribute to anomalous computer behavior; and/or (3) executing a second plurality of algorithms utilizing the portion of features to determine the computers which are behaving anomalously. The program stored on the computer-readable medium may instruct the processing element to perform additional, fewer, or alternative actions, including those discussed elsewhere herein.

“In yet another aspect, a computing device for detecting anomalous behavior of one or more computers in a large group of computers may be provided. The computing device may include a communication element, a memory element, and a processing element. The communication element may receive and transmit communications to and from a plurality of servers and computers within an organization. The memory element may be electronically coupled to the communication element and may store executable instructions. The processing element may be electronically coupled to the communication element and the memory element. The processing element may be configured to receive log files including a plurality of entries of data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with the actions of one computer and including a plurality of features; execute a first plurality of algorithms to determine a portion of the features which contribute to anomalous computer behavior; and/or execute a second plurality of algorithms utilizing the portion of features to determine the computers which are behaving anomalously. The computing device may include additional, fewer, or alternate components and/or functionality, including that discussed elsewhere herein.

“Advantages of these and other embodiments will become more apparent to those skilled in the art from the following description of the exemplary embodiments which have been shown and described by way of illustration. As will be realized, the present embodiments described herein may be capable of other and different embodiments, and their details are capable of modification in various respects. Accordingly, the drawings and description are to be regarded as illustrative in nature and not as restrictive.”

The claims supplied by the inventors are:

“We claim:

“1. A computer-implemented method for detecting anomalous behavior of one or more computers in a large group of computers, the computer-implemented method comprising, via one or more processors and/or transceivers: receiving log files including a plurality of entries of anomalous and non-anomalous data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with one event of one of the plurality of computers and including a plurality of fields of data; determining a plurality of features, each feature including one field of data of the plurality of fields of data or a derivation from one or more fields of data of the plurality of fields of data; executing a first set of algorithms generating lists of features, each algorithm generating a list of features of the lists of features which include data indicative of anomalous computer behavior, with a first portion of the first set of algorithms receiving as input first data that occurred over a period of time for the plurality of features and a second portion of the first set of algorithms receiving as input second data regarding traffic between the plurality of computers and the plurality of websites, wherein the first portion is different from the second portion of the first set of algorithms and the first data is different from the second data; and executing a second set of algorithms, each algorithm generating a list of computers which are behaving anomalously, with a first portion of the second set of algorithms receiving as input third data from one of the lists of features and a second portion of the second set of algorithms receiving as input fourth data regarding traffic between the plurality of computers and the plurality of websites, wherein the first portion is different from the second portion of the second set of algorithms and the third data is different from the fourth data.

“2. The computer-implemented method of claim 1, wherein the first set of algorithms includes a seasonal hybrid extreme studentized deviates algorithm and a breakout detection algorithm to determine features which include date recorded over a period of time and is indicative of anomalous computer behavior.

“3. The computer-implemented method of claim 1, wherein the first set of algorithms includes creation of a plurality of traffic dispersion graphs to determine features which are derived from the graphs and include data that is indicative of anomalous computer behavior.

“4. The computer-implemented method of claim 1, wherein the first set of algorithms includes a first autoencoder to determine a plurality of entries that include anomalous data and a random forest regressor to determine a ranking of the features from each entry.

“5. The computer-implemented method of claim 1, wherein the second set of algorithms includes K-means clustering to determine a first group of computers exhibiting potentially anomalous behavior and a density-based spatial clustering of applications with noise algorithm to determine a second group of computers from within the first group of computers, the second group exhibiting anomalous behavior.

“6. The computer-implemented method of claim 1, wherein the second set of algorithms includes creation of a plurality of egonet graphs followed by creation of a heavy vicinity plot and a dominant edge plot for each egonet graph to determine the computers which are behaving anomalously.

“7. The computer-implemented method of claim 1, wherein the second set of algorithms includes a second autoencoder to encode and decode the entries, each entry including only the portion of features, and to determine an error level between each entry before encoding and after decoding, the entries with error levels greater than a first threshold indicating the computers which are behaving anomalously.

“8. A non-transitory computer-readable medium with an executable program stored thereon for detecting anomalous behavior of one or more computers in a large group of computers, wherein the program instructs a processing element of a computing device to perform the following: receiving log files including a plurality of entries of anomalous and non-anomalous data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with one event of one of the plurality of computers and including a plurality of fields of data; determining a plurality of features, each feature including one field of data of the plurality of fields of data or a derivation from one or more fields of data of the plurality of fields of data; executing a first set of algorithms generating lists of features, each algorithm generating a list of features of the lists of features which include data indicative of anomalous computer behavior, with a first portion of the first set of algorithms receiving as input first data that occurred over a period of time for the plurality of features and a second portion of the first set of algorithms receiving as input second data regarding traffic between the plurality of computers and the plurality of websites, wherein the first portion is different from the second portion of the first set of algorithms and the first data is different from the second data; and executing a second set of algorithms, each algorithm generating a list of computers which are behaving anomalously, with a first portion of the second set of algorithms receiving as input third data from one of the lists of features and a second portion of the second set of algorithms receiving as input fourth data regarding traffic between the plurality of computers and the plurality of websites, wherein the first portion is different from the second portion of the second set of algorithms and the third data is different from the fourth data.

“9. The non-transitory computer-readable medium of claim 8, wherein the first set of algorithms includes a seasonal hybrid extreme studentized deviates algorithm and a breakout detection algorithm to determine features which include data recorded over a period of time and is indicative of anomalous computer behavior.

“10. The non-transitory computer-readable medium of claim 8, wherein the first set of algorithms includes creation of a plurality of traffic dispersion graphs to determine features which are derived from the graphs and include data that is indicative of anomalous computer behavior.

“11. The non-transitory computer-readable medium of claim 8, wherein the first set of algorithms includes a first autoencoder to determine a plurality of entries that include anomalous data and a random forest regressor to determine a ranking of the features from each entry.

“12. The non-transitory computer-readable medium of claim 8, wherein the second set of algorithms includes K-means clustering to determine a first group of computers exhibiting potentially anomalous behavior and a density-based spatial clustering of applications with noise algorithm to determine a second group of computers from within the first group of computers, the second group exhibiting anomalous behavior.

“13. The non-transitory computer-readable medium of claim 8, wherein the second set of algorithms includes creation of a plurality of egonet graphs followed by creation of a heavy vicinity plot and a dominant edge plot for each egonet graph to determine the computers which are behaving anomalously and include a second autoencoder to encode and decode the entries, each entry including only the portion of features, and to determine an error level between each entry before encoding and after decoding, the entries with error levels greater than a first threshold indicating the computers which are behaving anomalously.

“14. A computing device for detecting anomalous behavior of one or more computers in a large group of computers, the device comprising: a communication element configured to receive and transmit communications to and from a plurality of servers and computers within an organization; a memory element electronically coupled to the communication element, the memory element configured to store executable instructions; and a processing element electronically coupled to the communication element and the memory element, the processing element configured to: receive log files including a plurality of entries of anomalous and non-anomalous data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with one event of one of the plurality of computers and including a plurality of fields of data; execute a first set of algorithms generating lists of features, each algorithm generating a list of features of the lists of features which include data indicative of anomalous computer behavior, with a first portion of the first set of algorithms receiving as input first data that occurred over a period of time for the plurality of features and a second portion of the first set of algorithms receiving as input second data regarding traffic between the plurality of computers and the plurality of websites, wherein the first portion is different from the second portion of the first set of algorithms and the first data is different from the second data; and execute a second set of algorithms, each algorithm generating a list of computers which are behaving anomalously, with a first portion of the second set of algorithms receiving as input third data from one of the lists of features and a second portion of the second set of algorithms receiving as input fourth data regarding traffic between plurality of computers and the plurality of websites, wherein the first portion is different from the second portion of the second set of algorithms and the third data is different from the fourth data.

“15. The computing device of claim 14, wherein the first set of algorithms includes a seasonal hybrid extreme studentized deviates algorithm and a breakout detection algorithm to determine features which include data recorded over a period of time and is indicative of anomalous computer behavior.

“16. The computing device of claim 14, wherein the first set of algorithms includes creation of a plurality of traffic dispersion graphs to determine features which are derived from the graphs and include data that is indicative of anomalous computer behavior.

“17. The computing device of claim 14, wherein the first set of algorithms includes a first autoencoder to determine a plurality of entries that include anomalous data and a random forest regressor to determine a ranking of the features from each entry.

“18. The computing device of claim 14, wherein the second set of algorithms includes K-means clustering to determine a first group of computers exhibiting potentially anomalous behavior and a density-based spatial clustering of applications with noise algorithm to determine a second group of computers from within the first group of computers, the second group exhibiting anomalous behavior.

“19. The computing device of claim 14, wherein the second set of algorithms includes creation of a plurality of egonet graphs followed by creation of a heavy vicinity plot and a dominant edge plot for each egonet graph to determine the computers which are behaving anomalously.

“20. The computing device of claim 14, wherein the second set of algorithms includes a second autoencoder to encode and decode the entries, each entry including only the portion of features, and to determine an error level between each entry before encoding and after decoding, the entries with error levels greater than a first threshold indicating the computers which are behaving anomalously.”

For the URL and additional information on this patent, see: Shah, Rajiv; Morrison, Shannon; Cunningham, Jeremy; Smith, Taylor; Sundararaman, Sripriya; Wan, Jing; Hevrin, Jeffrey; Duehr, Ronald; Sliz, Brad; Allen, Lucas. Detection Of Anomalous Computer Behavior. U.S. Patent Number 10,652,257, filed July 7, 2017, and published online on May 25, 2020. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=10,652,257.PN.&OS=PN/10,652,257RS=PN/10,652,257

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Comptroller of the Currency Issues Bulletin on Small-Dollar Lending: Interagency Lending Principles for Offering Responsible Small-Dollar Loans

Advisor News

  • Metlife study finds less than half of US workforce holistically healthy
  • Invigorating client relationships with AI coaching
  • SEC: Get-rich-quick influencer Tai Lopez was running a Ponzi scam
  • Companies take greater interest in employee financial wellness
  • Tax refund won’t do what fed says it will
More Advisor News

Annuity News

  • The structural rise of structured products
  • How next-gen pricing tech can help insurers offer better annuity products
  • Continental General Acquires Block of Life Insurance, Annuity and Health Policies from State Guaranty Associations
  • Lincoln reports strong life/annuity sales, executes with ‘discipline and focus’
  • LIMRA launches the Lifetime Income Initiative
More Annuity News

Health/Employee Benefits News

  • PLAINFIELD, VERMONT MAN SENTENCED TO 2 YEARS OF PROBATION FOR SOCIAL SECURITY DISABILITY FRAUD
  • Broward schools cut coverage of weight-loss drugs to save $12 million
  • WA small businesses struggle to keep up with health insurance hikes
  • OID announces state-based health insurance exchange
  • Cigna plans to lay off 2,000 employees worldwide
More Health/Employee Benefits News

Life Insurance News

  • The structural rise of structured products
  • AM Best Affirms Credit Ratings of Members of Aegon Ltd.’s U.S. Subsidiaries
  • Corporate PACs vs. Silicon Valley: Sharply different fundraising paths for Democratic rivals Mike Thompson, Eric Jones in 4th District race for Congress
  • Continental General Acquires Block of Life Insurance, Annuity and Health Policies from State Guaranty Associations
  • LIMRA launches the Lifetime Income Initiative
Sponsor
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

LIMRA’s Distribution and Marketing Conference
Attend the premier event for industry sales and marketing professionals

Get up to 1,000 turning 65 leads
Access your leads, plus engagement results most agents don’t see.

What if Your FIA Cap Didn’t Reset?
CapLock™ removes annual cap resets for clearer planning and fewer surprises.

Press Releases

  • LIDP Named Top Digital-First Insurance Solution 2026 by Insurance CIO Outlook
  • Finseca & IAQFP Announce Unification to Strengthen Financial Planning
  • Prosperity Life Group Appoints Nick Volpe as Chief Technology Officer
  • Prosperity Life Group appoints industry veteran Rona Guymon as President, Retail Life and Annuity
  • Financial Independence Group Marks 50 Years of Growth, Innovation, and Advisor Support
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Advertise
  • Contact
  • Editorial Staff
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet