G06F16/906

Systems and methods for dynamic aggregation of data and minimization of data loss
11579999 · 2023-02-14 · ·

A computer-implemented system for dynamic aggregation of data and minimization of data loss is disclosed. The system may be configured to perform instructions for: aggregating information from a plurality of networked systems by collecting a set of data from the networked systems, the set of data comprising data associated with a predetermined period of time and comprising one or more central variables that are included in data associated with more than one networked systems of the plurality of networked systems and one or more associated variables that describe one or more aspects of the central variables; retrieving one or more data transformation rules based on a relational map among the central variables and the associated variables; and aggregating the first set of data into one or more master data structures corresponding to the central variables based on the data transformation rules.

Systems and methods for dynamic aggregation of data and minimization of data loss
11579999 · 2023-02-14 · ·

A computer-implemented system for dynamic aggregation of data and minimization of data loss is disclosed. The system may be configured to perform instructions for: aggregating information from a plurality of networked systems by collecting a set of data from the networked systems, the set of data comprising data associated with a predetermined period of time and comprising one or more central variables that are included in data associated with more than one networked systems of the plurality of networked systems and one or more associated variables that describe one or more aspects of the central variables; retrieving one or more data transformation rules based on a relational map among the central variables and the associated variables; and aggregating the first set of data into one or more master data structures corresponding to the central variables based on the data transformation rules.

Machine-learning training service for synthetic data

Various embodiments, methods and systems for implementing a distributed computing system machine-learning training service are provided. Initially a machine learning model is accessed. A plurality of synthetic data assets are accessed, where a synthetic data asset is associated with asset-variation parameters that are programmable for machine-learning. The machine learning model is retrained using the plurality of synthetic data assets. The machine-learning training service is further configured for executing real-time calls to generate an on-the-fly-generated synthetic data asset such that the on-the-fly-generated synthetic data asset is rendered in real-time to preclude pre-rendering and storing the on-the-fly-generated synthetic data asset. The machine-learning training service further supports hybrid-based machine learning training, where the machine learning model is trained based on a combination of the plurality of synthetic data assets, a plurality of non-synthetic data assets, and synthetic data asset metadata associated with the plurality of synthetic data assets.

Machine-learning training service for synthetic data

Various embodiments, methods and systems for implementing a distributed computing system machine-learning training service are provided. Initially a machine learning model is accessed. A plurality of synthetic data assets are accessed, where a synthetic data asset is associated with asset-variation parameters that are programmable for machine-learning. The machine learning model is retrained using the plurality of synthetic data assets. The machine-learning training service is further configured for executing real-time calls to generate an on-the-fly-generated synthetic data asset such that the on-the-fly-generated synthetic data asset is rendered in real-time to preclude pre-rendering and storing the on-the-fly-generated synthetic data asset. The machine-learning training service further supports hybrid-based machine learning training, where the machine learning model is trained based on a combination of the plurality of synthetic data assets, a plurality of non-synthetic data assets, and synthetic data asset metadata associated with the plurality of synthetic data assets.

Factor analysis device, factor analysis method, and storage medium on which program is stored
11580414 · 2023-02-14 · ·

Provided is a factor analysis device capable of obtaining more useful knowledge relating to the degree of influence of pieces of data. A factor analysis device according to one embodiment of the present invention is provided with: a classification unit for classifying a type of data into a first group or a second group; and an influence degree calculation unit for calculating, as the degree of influence on target data, the degree of influence of the data of the type classified into the second group on the data of the first group type.

Factor analysis device, factor analysis method, and storage medium on which program is stored
11580414 · 2023-02-14 · ·

Provided is a factor analysis device capable of obtaining more useful knowledge relating to the degree of influence of pieces of data. A factor analysis device according to one embodiment of the present invention is provided with: a classification unit for classifying a type of data into a first group or a second group; and an influence degree calculation unit for calculating, as the degree of influence on target data, the degree of influence of the data of the type classified into the second group on the data of the first group type.

Automated honeypot creation within a network

Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.

Automated honeypot creation within a network

Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.

Tactic tracking, evaluation and identification engine apparatuses, methods and systems

The Tactic Tracking, Evaluation and Identification Engine Apparatuses, Methods and Systems (“TTEIE”) transforms subscription request, tick notification request inputs via TTEIE components into subscription response, identified tactic store request, user interface update notification outputs. A subscription request datastructure from a client is obtained. A set of tactic definition datastructures is retrieved. A tick notification comprising tick data for a tick associated with a target is obtained. A contact datastructure corresponding to each retrieved tactic definition datastructure is added to a tracking list of contact datastructures for the target. The tick data for the tick is appended for each contact datastructure in the tracking list. A contact datastructure's time series of ticks is evaluated with regard to the respective contact datastructure's corresponding time series of rules to classify the respective contact datastructure, for each contact datastructure in the tracking list. The client is notified regarding identified tactic contact datastructures.

Tactic tracking, evaluation and identification engine apparatuses, methods and systems

The Tactic Tracking, Evaluation and Identification Engine Apparatuses, Methods and Systems (“TTEIE”) transforms subscription request, tick notification request inputs via TTEIE components into subscription response, identified tactic store request, user interface update notification outputs. A subscription request datastructure from a client is obtained. A set of tactic definition datastructures is retrieved. A tick notification comprising tick data for a tick associated with a target is obtained. A contact datastructure corresponding to each retrieved tactic definition datastructure is added to a tracking list of contact datastructures for the target. The tick data for the tick is appended for each contact datastructure in the tracking list. A contact datastructure's time series of ticks is evaluated with regard to the respective contact datastructure's corresponding time series of rules to classify the respective contact datastructure, for each contact datastructure in the tracking list. The client is notified regarding identified tactic contact datastructures.