US 12,238,130 B2
Method for detecting anomalies in data traffic generated by peripheral devices simulating human-like patterns
Alessandro Cavallaro Corti, Varese (IT); Luca Cremona, Venegono Inferiore (IT); Alessandro Di Pinto, Malnate (IT); Alessandro Valente, Castelfranco Veneto (IT); and Alessandro Zamberletti, Luxembourg (LU)
Assigned to Nozomi Networks Sagl, Mendrisio (CH)
Filed by Nozomi Networks Sagl, Mendrisio (CH)
Filed on Nov. 28, 2022, as Appl. No. 18/058,985.
Prior Publication US 2024/0179163 A1, May 30, 2024
Int. Cl. H04L 9/40 (2022.01); G06N 3/02 (2006.01); H04L 41/14 (2022.01); H04L 41/16 (2022.01)
CPC H04L 63/1425 (2013.01) [G06N 3/02 (2013.01); H04L 41/145 (2013.01); H04L 41/16 (2013.01)] 11 Claims
 
1. A method for detecting anomalies in data traffic generated by peripheral devices simulating human-like patterns comprising:
retrieving, by computerized data processing means, all data packets sent by a peripheral device to a computer;
identifying, by said computerized data processing means, a data communication as a plurality of said data packets in a predetermined timeframe;
parsing, by said computerized data processing means, the content of each of said data packets of said data communication to extract a plurality of communication features of said data communication;
classifying, by said computerized data processing means, said communication features through a set of absolute classifiers of the binary type comprising two or more absolute classifiers and through a set of majority classifiers of the binary type comprising an odd number of majority classifiers; and
signalling, by said computerized data processing means, an anomaly of said data communication when at least the majority in said set of majority classifiers or at least one in said set of absolute classifiers marks said communication features as anomalous;
wherein said communication features comprise words or key combinations, and
wherein said set of absolute classifiers comprises a deny list classifier which marks said data communication as anomalous if said communication features are comprised in a predetermined list of anomalous words or key combinations.