US 12,032,694 B2
Autonomous machine learning methods for detecting and thwarting ransomware attacks
Purandar Gururaj Das, Lexington, MA (US); and Shanthi Boppana, Boxborough, MA (US)
Assigned to Sotero, Inc., Burlington, MA (US)
Filed by Sotero, Inc., Burlington, MA (US)
Filed on Sep. 14, 2023, as Appl. No. 18/466,986.
Claims priority of provisional application 63/406,288, filed on Sep. 14, 2022.
Prior Publication US 2024/0086532 A1, Mar. 14, 2024
Int. Cl. G06F 21/56 (2013.01); G06F 21/55 (2013.01); G06F 21/60 (2013.01)
CPC G06F 21/564 (2013.01) [G06F 21/552 (2013.01); G06F 21/604 (2013.01)] 25 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, at a processor and from a requestor compute device, a first request that references one of an electronic file or a data set stored in a first memory, the one of the electronic file or the data set having an associated first set of permissions based on a first role;
monitoring, via the processor, a plurality of subsequent requests originating from the requestor compute device, each subsequent request from the plurality of subsequent requests having an associated subsequent role from a plurality of subsequent roles;
causing storage, in a second memory different from the first memory, and in parallel with the monitoring of the plurality of subsequent requests and in response to the plurality of subsequent requests, of a backup copy of a subset of the one of the electronic file or the data set;
identifying, via the processor and based on the monitoring of the plurality of subsequent requests, a detected ransomware type from a plurality of ransomware types, each ransomware type from the plurality of ransomware types being associated with a predefined sequence of actions associated with the one of the electronic file or the data set;
generating, by the processor, a subsequent set of permissions for the plurality of subsequent roles, the subsequent set of permissions being different from the first set of permissions; and
in response to identifying the detected ransomware type, and based on the subsequent set of permissions,
modifying an access control permission associated with the requestor compute device to define a modified access control permission.