| CPC H04L 63/1425 (2013.01) [G06F 21/552 (2013.01); G06N 7/01 (2023.01); H04L 63/1416 (2013.01)] | 15 Claims |

|
1. A system for identifying anomalous network behavior, comprising:
at least a first processor; and
memory coupled to the at least one processor, the memory comprising computer executable instructions that, when executed by the at least one processor, perform:
receiving sensor data for an event representative of a network flow;
extracting characteristics of the sensor data and normalizing the sensor data to generate an evidence vector for the event;
determining a candidate network anomaly by applying the evidence vector to a data analytics model, wherein the determining comprises:
applying the evidence vector to a directional cluster mapping to determine a directional cluster mapping result;
applying the evidence vector to a magnitude cluster mapping to determine a magnitude cluster mapping result; and
combining the directional cluster mapping result and the magnitude cluster mapping result to determine a composite score for the evidence vector, wherein the composite score indicates the probability of the evidence vector representing an anomaly with respect to the event.
|