Anamoly Detection

CipherWorks provides services for semantically encrypting and decrypting the sensitive data. The encryption and decryption services are supposed to be used only by applications that have privilege to perform encryption and decryption.

Any anomalous (or fraudulent) use is monitored by CwHawk at periodic interval. CwHawk uses Machine Learning (ML) to continuously learn the usage pattern for all encryption and decryption services. CwHawk learns the usage pattern for every Hour Of the Day (HOD) and Day Of the Week (DOW) for all the available usage history. W

hen CwHawk notices any anomaly in usage, it computes a Risk Score and writes to the log file. The log file needs to be monitored by the enterprise system monitoring tools to alert the security administrators.