Movatterモバイル変換


[0]ホーム

URL:


US20210360009A1 - Centralized controller management and anomaly detection - Google Patents

Centralized controller management and anomaly detection
Download PDF

Info

Publication number
US20210360009A1
US20210360009A1US17/302,936US202117302936AUS2021360009A1US 20210360009 A1US20210360009 A1US 20210360009A1US 202117302936 AUS202117302936 AUS 202117302936AUS 2021360009 A1US2021360009 A1US 2021360009A1
Authority
US
United States
Prior art keywords
controller
security policy
security
malware
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/302,936
Inventor
Tal Efraim Ben David
Assaf Harel
Amiram Dotan
David Barzilai
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Karamba Security Ltd
Original Assignee
Karamba Security Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Karamba Security LtdfiledCriticalKaramba Security Ltd
Priority to US17/302,936priorityCriticalpatent/US20210360009A1/en
Assigned to KARAMBA SECURITY LTD.reassignmentKARAMBA SECURITY LTD.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BARZILAI, DAVID, DAVID, Tal Efraim Ben, DOTAN, Amiram, HAREL, ASSAF
Publication of US20210360009A1publicationCriticalpatent/US20210360009A1/en
Priority to US18/779,391prioritypatent/US20240380763A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

In one implementation, a method for providing security on externally connected controllers includes receiving, at a server system, operation information for a plurality of instances of a controller, the plurality of instances being installed across a plurality of devices; statistically analyzing, by the server system, the operation information; identifying, by the server system, one or more anomalous controller behaviors based on the statistical analysis; and providing, by the server system, information regarding the one or more anomalous controller behaviors on the controller as potential security threats.

Description

Claims (21)

26. A system for providing controller security, the system comprising:
a processor and computer-readable memory, the computer-readable memory comprising instructions that, when executed by the processor, cause the processor to perform security operations comprising:
receiving operation information for a plurality of instances of a controller, the plurality of instances being installed across a plurality of devices;
statistically analyzing the received operation information, wherein the statistically analyzing comprises identifying an operation from the received operation information that is outside of determined normal operations of the controller, the identified operation comprising at least one of:
a processor operation;
a memory operation; or
an input/output operation;
identifying one or more anomalous controller behaviors based on the statistical analysis; and
identifying information regarding the one or more anomalous controller behaviors on the controller as a potential security threat.
32. The system ofclaim 31, wherein the security operations further comprise modifying the security policy by performing at least one of:
removing information corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy;
removing function mappings corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy;
removing an IP address corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy;
removing a network port corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy;
removing a payload content type corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy; or
altering a process map that is part of the security policy.
38. A method for providing controller security, the method comprising:
receiving operation information for a plurality of instances of a controller, the plurality of instances being installed across a plurality of devices;
statistically analyzing the received operation information, wherein the statistically analyzing comprises identifying an operation from the received operation information that is outside of determined normal operations of the controller, the identified operation comprising at least one of:
a processor operation;
a memory operation; or
an input/output operation;
identifying one or more anomalous controller behaviors based on the statistical analysis; and
identifying information regarding the one or more anomalous controller behaviors on the controller as a potential security threat.
41. The method ofclaim 40, further comprising modifying the security policy by performing at least one of:
removing information corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy;
removing function mappings corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy;
removing an IP address corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy;
removing a network port corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy;
removing a payload content type corresponding to the one or more anomalous controller behaviors from one or more whitelists that are part of the security policy; or
altering a process map that is part of the security policy.
US17/302,9362016-04-062021-05-17Centralized controller management and anomaly detectionAbandonedUS20210360009A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US17/302,936US20210360009A1 (en)2016-04-062021-05-17Centralized controller management and anomaly detection
US18/779,391US20240380763A1 (en)2016-04-062024-07-22Centralized controller management and anomaly detection

Applications Claiming Priority (6)

Application NumberPriority DateFiling DateTitle
US201662319178P2016-04-062016-04-06
US201662346895P2016-06-072016-06-07
PCT/IB2017/051967WO2017175160A1 (en)2016-04-062017-04-05Centralized controller management and anomaly detection
US16/012,139US10375092B2 (en)2016-04-062018-06-19Centralized controller management and anomaly detection
US16/441,229US11012451B2 (en)2016-04-062019-06-14Centralized controller management and anomaly detection
US17/302,936US20210360009A1 (en)2016-04-062021-05-17Centralized controller management and anomaly detection

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/441,229ContinuationUS11012451B2 (en)2016-04-062019-06-14Centralized controller management and anomaly detection

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US18/779,391ContinuationUS20240380763A1 (en)2016-04-062024-07-22Centralized controller management and anomaly detection

Publications (1)

Publication NumberPublication Date
US20210360009A1true US20210360009A1 (en)2021-11-18

Family

ID=58548777

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US16/012,139ActiveUS10375092B2 (en)2016-04-062018-06-19Centralized controller management and anomaly detection
US16/441,229ActiveUS11012451B2 (en)2016-04-062019-06-14Centralized controller management and anomaly detection
US17/302,936AbandonedUS20210360009A1 (en)2016-04-062021-05-17Centralized controller management and anomaly detection
US18/779,391PendingUS20240380763A1 (en)2016-04-062024-07-22Centralized controller management and anomaly detection

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US16/012,139ActiveUS10375092B2 (en)2016-04-062018-06-19Centralized controller management and anomaly detection
US16/441,229ActiveUS11012451B2 (en)2016-04-062019-06-14Centralized controller management and anomaly detection

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US18/779,391PendingUS20240380763A1 (en)2016-04-062024-07-22Centralized controller management and anomaly detection

Country Status (3)

CountryLink
US (4)US10375092B2 (en)
EP (2)EP3440819B1 (en)
WO (1)WO2017175160A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11283702B1 (en)*2020-10-212022-03-22Institute For Information IndustryVehicle status detecting apparatus and vehicle status detecting method thereof
DE102023100444A1 (en)2023-01-102024-07-11Giesecke+Devrient Mobile Security Germany Gmbh Method and system for operating an Internet of Things (IoT) device

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1359962B1 (en)2001-02-162016-08-17ResMed LimitedHumidifier with structure to prevent backflow of liquid through the humidifier inlet
ATE517649T1 (en)2003-06-202011-08-15Resmed Ltd BREATHING GAS DEVICE WITH HUMIDIFIER
AU2003903139A0 (en)2003-06-202003-07-03Resmed LimitedBreathable gas apparatus with humidifier
US9485265B1 (en)*2015-08-282016-11-01Palantir Technologies Inc.Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US10492046B2 (en)*2017-04-072019-11-26Servicenow, Inc.System of actions for IoT devices
WO2019021064A1 (en)*2017-07-252019-01-31Aurora Labs LtdConstructing software delta updates for vehicle ecu software and abnormality detection based on toolchain
EP3512179B1 (en)*2018-01-152021-03-03Carrier CorporationCyber security framework for internet-connected embedded devices
EP3541041B1 (en)*2018-03-162022-03-09AcklioMethod and apparatus for processing message data
US20200117442A1 (en)*2018-10-102020-04-16Digital Alert Systems, Inc.Method, system and program product for monitoring and managing emergency alert system devices
US11620295B2 (en)*2018-10-102023-04-04Digital Alert Systems, Inc.Method, system and program product for monitoring EAS devices
JP7350517B2 (en)*2018-10-172023-09-26パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Information processing device, information processing method and program
WO2020079896A1 (en)*2018-10-172020-04-23パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカInformation processing device, information processing method, and program
JP7149888B2 (en)*2018-10-172022-10-07パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Information processing device, information processing method and program
US11263315B2 (en)*2018-12-032022-03-01Ebay Inc.System level function based access control for smart contract execution on a blockchain
US11250125B2 (en)2018-12-032022-02-15Ebay Inc.Highly scalable permissioned block chains
US11405182B2 (en)2018-12-032022-08-02Ebay Inc.Adaptive security for smart contracts using high granularity metrics
EP3909215B1 (en)*2019-01-102024-10-16Signify Holding B.V.A method to provide secure operation of a lighting network
US20230267776A1 (en)*2020-06-252023-08-24Sumitomo Electric Industries, Ltd.Vehicle monitoring program, vehicle-mounted device, and vehicle monitoring method
US20250007935A1 (en)*2021-11-252025-01-02Nippon Telegraph And Telephone CorporationMonitoring device, monitoring method, and monitoring program
EP4293456A1 (en)*2022-06-132023-12-20Abb Schweiz AgMethod and system for anonymization and negotiation for predictive maintenance
US20240028743A1 (en)2022-07-222024-01-25Cisco Technology, Inc.Control flow integrity instruction pointer patching
KR20250086402A (en)*2023-12-062025-06-13현대자동차주식회사Tara(threat analysis and risk assessment) performing apparatus for vehicle cybersecurity and method of thereof

Citations (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5440723A (en)*1993-01-191995-08-08International Business Machines CorporationAutomatic immune system for computers and computer networks
US20120167162A1 (en)*2009-01-282012-06-28Raleigh Gregory GSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US20140005880A1 (en)*2012-06-282014-01-02Harman Becker Automotive Systems GmbhTelematics system
US20140258187A1 (en)*2013-03-082014-09-11Oracle International CorporationGenerating database cluster health alerts using machine learning
US20150046155A1 (en)*2013-08-092015-02-12Behavioral Recognition Systems, Inc.Cognitive neuro-linguistic behavior recognition system for multi-sensor data fusion
US20150088375A1 (en)*2013-09-262015-03-26Hyundai Motor CompanySystem for informing functions of vehicle
US20150254172A1 (en)*2014-03-052015-09-10Concurix CorporationSecurity Alerting Using N-Gram Analysis of Program Execution Data
US20150298676A1 (en)*2012-11-242015-10-22Toyota Jidosha Kabushiki KaishaVehicle state determination device, vehicle state determination method, and driving operation diagnosis device
US20150309906A1 (en)*2012-03-132015-10-29Truemetrics LlcSystem and methods for automated testing of functionally complex systems
US20160188396A1 (en)*2014-12-302016-06-30Battelle Memorial InstituteTemporal anomaly detection on automotive networks
US9398039B2 (en)*2013-03-152016-07-19Aruba Networks, Inc.Apparatus, system and method for suppressing erroneous reporting of attacks on a wireless network
US20160292179A1 (en)*2015-04-012016-10-06Dropbox, Inc.Selective synchronization and distributed content item block caching for multi-premises hosting of digital content items
US9479567B1 (en)*2015-10-292016-10-25Dropbox, Inc.Synchronization protocol for multi-premises hosting of digital content items
US20170200088A1 (en)*2016-01-082017-07-13Futurewei Technologies, Inc.System and method for analyzing a root cause of anomalous behavior using hypothesis testing
US20170200323A1 (en)*2015-07-022017-07-13International Business Machines CorporationCooperative Vehicle Monitoring and Anomaly Detection
US9747446B1 (en)*2013-12-262017-08-29Fireeye, Inc.System and method for run-time object classification
US10097404B2 (en)*2014-09-162018-10-09CloudGenix, Inc.Methods and systems for time-based application domain classification and mapping
US20180295147A1 (en)*2015-12-162018-10-11Panasonic Intellectual Property Corporation Of AmericaSecurity processing method and server
US10718813B2 (en)*2012-06-082020-07-21Schneider Electric USA, Inc.Monitoring method for induction motor
US10841839B2 (en)*2009-01-282020-11-17Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8090816B1 (en)2002-02-072012-01-03Mcafee, Inc.System and method for real-time triggered event upload
US8135994B2 (en)*2006-10-302012-03-13The Trustees Of Columbia University In The City Of New YorkMethods, media, and systems for detecting an anomalous sequence of function calls
US8881276B2 (en)*2007-01-092014-11-04Cisco Technology, Inc.Dynamically generated whitelist for high throughput intrusion prevention system (IPS) functionality
US8745703B2 (en)*2008-06-242014-06-03Microsoft CorporationIdentifying exploitation of vulnerabilities using error report
US20100190439A1 (en)*2009-01-292010-07-29Ford Global Technologies, LlcMessage transmission protocol for service delivery network
US8621553B2 (en)2009-03-312013-12-31Microsoft CorporationModel based security for cloud services
US8590045B2 (en)2009-10-072013-11-19F-Secure OyjMalware detection by application monitoring
US8555385B1 (en)2011-03-142013-10-08Symantec CorporationTechniques for behavior based malware analysis
US9027075B2 (en)2011-09-292015-05-05Oracle International CorporationEnforcing security rules at runtime
US20130097660A1 (en)*2011-10-172013-04-18Mcafee, Inc.System and method for whitelisting applications in a mobile network environment
US8646089B2 (en)2011-10-182014-02-04Mcafee, Inc.System and method for transitioning to a whitelist mode during a malware attack in a network environment
WO2013063474A1 (en)*2011-10-282013-05-02Scargo, Inc.Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware
US9047131B2 (en)2012-11-152015-06-02Red Hat Israel, Ltd.Hardware resource allocation and provisioning for composite applications
US9195829B1 (en)*2013-02-232015-11-24Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9536091B2 (en)*2013-06-242017-01-03Fireeye, Inc.System and method for detecting time-bomb malware
US9282110B2 (en)2013-11-272016-03-08Cisco Technology, Inc.Cloud-assisted threat defense for connected vehicles
EP2892199B1 (en)*2014-01-062018-08-22Argus Cyber Security Ltd.Global automotive safety system
WO2016046819A1 (en)*2014-09-252016-03-31Tower-Sec Ltd.Vehicle correlation system for cyber attacks detection and method thereof
US11068580B2 (en)*2015-09-072021-07-20Karamba Security Ltd.Context-based secure controller operation and malware prevention
US9992214B1 (en)*2016-03-282018-06-05Palo Alto Networks, Inc.Generating malware signatures based on developer fingerprints in debug information
US10079845B2 (en)*2016-03-312018-09-18Mcafee, LlcIoT and PoS anti-malware strategy

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5440723A (en)*1993-01-191995-08-08International Business Machines CorporationAutomatic immune system for computers and computer networks
US20120167162A1 (en)*2009-01-282012-06-28Raleigh Gregory GSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US10841839B2 (en)*2009-01-282020-11-17Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US20150309906A1 (en)*2012-03-132015-10-29Truemetrics LlcSystem and methods for automated testing of functionally complex systems
US10718813B2 (en)*2012-06-082020-07-21Schneider Electric USA, Inc.Monitoring method for induction motor
US20140005880A1 (en)*2012-06-282014-01-02Harman Becker Automotive Systems GmbhTelematics system
US20150298676A1 (en)*2012-11-242015-10-22Toyota Jidosha Kabushiki KaishaVehicle state determination device, vehicle state determination method, and driving operation diagnosis device
US20140258187A1 (en)*2013-03-082014-09-11Oracle International CorporationGenerating database cluster health alerts using machine learning
US9398039B2 (en)*2013-03-152016-07-19Aruba Networks, Inc.Apparatus, system and method for suppressing erroneous reporting of attacks on a wireless network
US20150046155A1 (en)*2013-08-092015-02-12Behavioral Recognition Systems, Inc.Cognitive neuro-linguistic behavior recognition system for multi-sensor data fusion
US20150088375A1 (en)*2013-09-262015-03-26Hyundai Motor CompanySystem for informing functions of vehicle
US9747446B1 (en)*2013-12-262017-08-29Fireeye, Inc.System and method for run-time object classification
US20150254172A1 (en)*2014-03-052015-09-10Concurix CorporationSecurity Alerting Using N-Gram Analysis of Program Execution Data
US10097404B2 (en)*2014-09-162018-10-09CloudGenix, Inc.Methods and systems for time-based application domain classification and mapping
US10083071B2 (en)*2014-12-302018-09-25Battelle Memorial InstituteTemporal anomaly detection on automotive networks
US20160188396A1 (en)*2014-12-302016-06-30Battelle Memorial InstituteTemporal anomaly detection on automotive networks
US20160292179A1 (en)*2015-04-012016-10-06Dropbox, Inc.Selective synchronization and distributed content item block caching for multi-premises hosting of digital content items
US20170200323A1 (en)*2015-07-022017-07-13International Business Machines CorporationCooperative Vehicle Monitoring and Anomaly Detection
US9479567B1 (en)*2015-10-292016-10-25Dropbox, Inc.Synchronization protocol for multi-premises hosting of digital content items
US20180295147A1 (en)*2015-12-162018-10-11Panasonic Intellectual Property Corporation Of AmericaSecurity processing method and server
US20170200088A1 (en)*2016-01-082017-07-13Futurewei Technologies, Inc.System and method for analyzing a root cause of anomalous behavior using hypothesis testing

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11283702B1 (en)*2020-10-212022-03-22Institute For Information IndustryVehicle status detecting apparatus and vehicle status detecting method thereof
DE102023100444A1 (en)2023-01-102024-07-11Giesecke+Devrient Mobile Security Germany Gmbh Method and system for operating an Internet of Things (IoT) device

Also Published As

Publication numberPublication date
EP3440819B1 (en)2020-10-21
US10375092B2 (en)2019-08-06
US11012451B2 (en)2021-05-18
WO2017175160A1 (en)2017-10-12
EP3823242A1 (en)2021-05-19
EP3440819A1 (en)2019-02-13
US20180316698A1 (en)2018-11-01
US20190297100A1 (en)2019-09-26
US20240380763A1 (en)2024-11-14

Similar Documents

PublicationPublication DateTitle
US20240380763A1 (en)Centralized controller management and anomaly detection
US11509666B2 (en)Automated security policy generation for controllers
US20240311481A1 (en)Secure controller operation and malware prevention
US11616792B2 (en)Reporting and processing controller security information
US11790074B2 (en)Context-based secure controller operation and malware prevention
US10057286B2 (en)Automotive ECU controller and data network having security features for protection from malware transmission

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:KARAMBA SECURITY LTD., ISRAEL

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DAVID, TAL EFRAIM BEN;HAREL, ASSAF;DOTAN, AMIRAM;AND OTHERS;REEL/FRAME:056256/0502

Effective date:20190210

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp