- San Jose CA, US Diana Bess Horn - Roswell GA, US Shirish Shanbhag - Alpharetta GA, US
International Classification:
H04L 29/06 G06N 99/00 G10L 25/51
Abstract:
Presented herein are techniques for detecting cyber-attacks with sonification. A method includes obtaining, at a network security analysis device, a set of features extracted from one or more network traffic flows between a given host in a network and a domain. The set of features are converted to an acoustical waveform representative of the set of features. Audio patterns are detected in the acoustical waveform using acoustical fingerprints and a cyber-attack is identified in the network by identifying an anomalous sequence of the audio patterns.
Jsp .Net Requirements Analysis Enovia V6 Rest C Web Applications Tomcat Ext Js Xslt Json Cad Enovia Smarteam Software Cortical Learning Algorithm Oracle Teamcenter Product Lifecycle Management Html Java Xml Testing Web Services Spring Xpath Javascript J2Ee Application Development C++ Css Software Development Software Project Management Java Enterprise Edition Architecture C# Solution Architecture Integration Mysql Architectures
Certifications:
Data Analysis and Statistical Inference Introduction To Data Science An Introduction To Interactive Programming In Python Computing For Data Analysis Software As A Service Machine Learning License Q4S2Tltbha3D Coursera