Creating and Extracting Training Data from Storage Systems to Train Machine Learning Models for Ransomware Detection
Summary
The USPTO published patent application US20260099597A1 on April 9, 2026, describing methods for generating machine learning training data from storage systems to train ransomware detection models. The invention creates snapshots of storage volumes, generates ransomware traces using hidden volumes and benign traces from regular volumes, extracts features into an advanced features table, and trains ML models using the generated training data. The application was filed on October 4, 2024, under Application No. 18907467.
What changed
The USPTO published patent application US20260099597A1 describing systems and methods for generating machine learning training data to train ransomware detection models. The invention involves creating snapshots of storage volumes, generating ransomware traces using hidden volumes and benign traces from regular volumes, extracting features into an advanced features table, and training ML models on the generated training data.\n\nPatent application publications do not create compliance obligations for affected parties. The document provides intellectual property protection for the disclosed methods and establishes a priority date of October 4, 2024. Organizations developing cybersecurity or ML-based detection systems may review this application for prior art considerations.
Archived snapshot
Apr 17, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
CREATING AND EXTRACTING TRAINING DATA FROM STORAGE SYSTEMS TO TRAIN MACHINE LEARNING MODELS FOR RANSOMWARE DETECTION
Application US20260099597A1 Kind: A1 Apr 09, 2026
Inventors
Dionysios Diamantopoulos, Roman Alexander Pletka, Slavisa Sarafijanovic, Nicolás Hernán Reátegui Rodríguez, Charalampos Pozidis, Yves Alexandre Beraldo dos Santos, Andrew D. Walls
Abstract
A first snapshot of a first volume is created and a hidden volume is instantiated using the first snapshot. Ransomware traces are generated using the hidden volume and benign traces using the first volume. An advanced features table is generated based on the ransomware traces and the benign traces, where the advanced features table provides a summary of features extracted from the ransomware traces and the benign traces. Training data is generated based on the advanced features table and a machine learning model is trained using the training data.
CPC Classifications
G06F 21/56 G06N 20/00 G06F 2221/034
Filing Date
2024-10-04
Application No.
18907467
Related changes
Get daily alerts for USPTO Patent Applications - AI & Computing (G06N)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from USPTO.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when USPTO Patent Applications - AI & Computing (G06N) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.