Patents by Inventor David Lopes Pegna

David Lopes Pegna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10050985
    Abstract: Disclosed is an approach to detect insider threats, by tracking unusual access activity for a specific user or computer with regard to accessing key assets over time. In this way, malicious activity and the different preparation phases of attacks can be identified.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: August 14, 2018
    Assignee: Vectra Networks, Inc.
    Inventors: Himanshu Mhatre, David Lopes Pegna, Oliver Brdiczka
  • Patent number: 10033752
    Abstract: A method and system for identifying insider threats within an organization is provided. The approach constructs an internal connectivity graph to identify communities of hosts/users, and checks for abnormal behavior relative to past behaviors.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: July 24, 2018
    Assignee: Vectra Networks, Inc.
    Inventors: David Lopes Pegna, Himanshu Mhatre, Oliver Brdiczka
  • Patent number: 9985979
    Abstract: An approach for detecting network threats is disclosed, that may involve receiving network traffic, plotting the network traffic in a n-dimensional feature space to form a network map, generating a client signature at least by placing new client points in the map, setting a threshold, and generating an alarm if one or more client activity points exceed the threshold. In some embodiments, the network map and the client signature are updated using sliding windows and distance calculations.
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: May 29, 2018
    Assignee: VECTRA NETWORKS, INC.
    Inventors: David Lopes Pegna, Nicolas Beauchesne
  • Patent number: 9900336
    Abstract: Disclosed is an improved approach to implement a system and method for detecting insider threats, where models are constructed that is capable of defining what constitutes the normal behavior for any given hosts and quickly find anomalous behaviors that could constitute a potential threat to an organization. The disclosed approach provides a way to identify abnormal data transfers within and external to an organization without the need for individual monitoring software on each host, by leveraging metadata that describe the data exchange patterns observed in the network.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: February 20, 2018
    Assignee: Vectra Networks, Inc.
    Inventors: Nicolas Beauchesne, David Lopes Pegna
  • Patent number: 9853988
    Abstract: An approach for detecting network attacks using metadata vectors may initially involve receiving network communications or packets, extracting metadata items from the packets. The metadata items describe the communications without requiring deep content inspection of the data payload or contents. The communications may be clustered into groups using the metadata items. If a cluster exceeds a threshold, an alarm may be generated.
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: December 26, 2017
    Assignee: Vectra Networks, Inc.
    Inventors: Nicolas Beauchesne, David Lopes Pegna, Karl Lynn
  • Publication number: 20160191563
    Abstract: Disclosed is an improved approach to implement a system and method for detecting insider threats, where models are constructed that is capable of defining what constitutes the normal behavior for any given hosts and quickly find anomalous behaviors that could constitute a potential threat to an organization. The disclosed approach provides a way to identify abnormal data transfers within and external to an organization without the need for individual monitoring software on each host, by leveraging metadata that describe the data exchange patterns observed in the network.
    Type: Application
    Filed: November 2, 2015
    Publication date: June 30, 2016
    Applicant: VECTRA NETWORKS, INC.
    Inventors: Nicolas Beauchesne, David Lopes Pegna
  • Publication number: 20160191560
    Abstract: A method and system for identifying insider threats within an organization is provided. The approach constructs an internal connectivity graph to identify communities of hosts/users, and checks for abnormal behavior relative to past behaviors.
    Type: Application
    Filed: November 2, 2015
    Publication date: June 30, 2016
    Applicant: VECTRA NETWORKS, INC.
    Inventors: David Lopes Pegna, Himanshu Mhatre, Oliver Brdiczka
  • Publication number: 20160191559
    Abstract: Disclosed is an approach to detect insider threats, by tracking unusual access activity for a specific user or computer with regard to accessing key assets over time. In this way, malicious activity and the different preparation phases of attacks can be identified.
    Type: Application
    Filed: November 2, 2015
    Publication date: June 30, 2016
    Applicant: VECTRA NETWORKS, INC.
    Inventors: Himanshu Mhatre, David Lopes Pegna
  • Publication number: 20160191551
    Abstract: An approach for detecting network attacks using metadata vectors may initially involve receiving network communications or packets, extracting metadata items from the packets. The metadata items describe the communications without requiring deep content inspection of the data payload or contents. The communications may be clustered into groups using the metadata items. If a cluster exceeds a threshold, an alarm may be generated.
    Type: Application
    Filed: November 17, 2015
    Publication date: June 30, 2016
    Applicant: VECTRA NETWORKS, INC.
    Inventors: Nicolas Beauchesne, David Lopes Pegna, Karl Lynn
  • Publication number: 20160149936
    Abstract: An approach for detecting network threats is disclosed, that may involve receiving network traffic, plotting the network traffic in a n-dimensional feature space to form a network map, generating a client signature at least by placing new client points in the map, setting a threshold, and generating an alarm if one or more client activity points exceed the threshold. In some embodiments, the network map and the client signature are updated using sliding windows and distance calculations.
    Type: Application
    Filed: November 17, 2015
    Publication date: May 26, 2016
    Applicant: VECTRA NETWORKS, INC.
    Inventors: David Lopes Pegna, Nicolas Beauchesne