Patents by Inventor Ereli Eran

Ereli Eran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240069948
    Abstract: Mapping of applications by the most common file path in which they are installed or found to be running. Embodiments of the disclosure may determine the most commonly occurring hash values appearing in events generated by a virtualized network. These most commonly occurring hash values may correspond to the hash values of file paths associated with the greatest number of detected events. The database may then be queried to determine the most commonly occurring file path for each of these hash values. A table of such most commonly occurring file paths and their associated hash values may then be compiled and stored. Use of the most commonly occurring file path in lieu of an alert's actual file path may prevent undesired or malicious processes from going undetected by simply adopting a new file path that has yet to be recognized as being associated with undesired behavior.
    Type: Application
    Filed: August 26, 2022
    Publication date: February 29, 2024
    Applicant: VMware, Inc.
    Inventors: Alexander Julian THOMAS, Amit CHOPRA, Anjali MANGAL, Xiaosheng WU, Ereli ERAN
  • Publication number: 20230300155
    Abstract: The disclosure herein describes automatically performing security operations associated with a client system based on aggregated event impact scores of computing events during a rolling time interval. Event data is obtained, wherein the event data is from a plurality of computing devices of the client system associated with computing events occurring during a time interval after an endpoint of the rolling time interval. Event impact scores are calculated for the computing events of the obtained event data over the time interval based at least on cardinality estimation. The calculated event impact scores are merged into the set of aggregated event impact scores associated with the rolling time interval and event impact scores associated with an expired time interval are removed from the set of aggregated event impact scores. Based on the set of aggregated event impact scores, at least one security operation is performed for at least one computing event.
    Type: Application
    Filed: May 23, 2023
    Publication date: September 21, 2023
    Inventors: Zhen MO, Ereli ERAN, Barak RAZ, Vijay GANTI
  • Patent number: 11689545
    Abstract: The disclosure herein describes automatically performing security operations associated with a client system based on aggregated event impact scores of computing events during a rolling time interval. Event data is obtained, wherein the event data is from a plurality of computing devices of the client system associated with computing events occurring during a time interval after an endpoint of the rolling time interval. Event impact scores are calculated for the computing events of the obtained event data over the time interval based at least on cardinality estimation. The calculated event impact scores are merged into the set of aggregated event impact scores associated with the rolling time interval and event impact scores associated with an expired time interval are removed from the set of aggregated event impact scores. Based on the set of aggregated event impact scores, at least one security operation is performed for at least one computing event.
    Type: Grant
    Filed: January 16, 2021
    Date of Patent: June 27, 2023
    Assignee: VMware, Inc.
    Inventors: Zhen Mo, Ereli Eran, Barak Raz, Vijay Ganti
  • Publication number: 20220232032
    Abstract: The disclosure herein describes automatically performing security operations associated with a client system based on aggregated event impact scores of computing events during a rolling time interval. Event data is obtained, wherein the event data is from a plurality of computing devices of the client system associated with computing events occurring during a time interval after an endpoint of the rolling time interval. Event impact scores are calculated for the computing events of the obtained event data over the time interval based at least on cardinality estimation. The calculated event impact scores are merged into the set of aggregated event impact scores associated with the rolling time interval and event impact scores associated with an expired time interval are removed from the set of aggregated event impact scores. Based on the set of aggregated event impact scores, at least one security operation is performed for at least one computing event.
    Type: Application
    Filed: January 16, 2021
    Publication date: July 21, 2022
    Inventors: Zhen MO, Ereli ERAN, Barak RAZ, Vijay GANTI
  • Patent number: 10013694
    Abstract: An improved technique involves inputting data in postings from social media or news websites into a risk engine. A posting extraction device continually observes postings aggregated in social media and news websites, such as Twitter, Facebook, CNN, and the like. The posting extraction device parses postings that contain specified keywords such as “credit card,” “account number,” and the like. The posting extraction device also parses these postings for metadata such as user identifiers, times, and locations. The posting extraction device then stores the parsed information in a transaction database that is accessed by an adaptive authentication engine for risk score assignment.
    Type: Grant
    Filed: December 30, 2013
    Date of Patent: July 3, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Shachar Israeli, Ereli Eran, Alex Zaslavsky, Marcelo Blatt
  • Patent number: 9722996
    Abstract: A system that permits authentication based on a partial password, in which a risk score is assigned to an authentication request, and a minimum partial password size is generated based on the risk score. User-entered password characters are compared to one or more partial passwords having lengths equal to or greater than the minimum partial password size. If a match is found, the user is authenticated. A password similarity threshold for the request may also be generated based on the risk score, indicating a minimum level of similarity required between the user-entered password characters and the characters in a partial password, in order for there to be a match. When the user-entered password characters match a partial password, and the requesting user is authenticated, the system may stop inputting user-entered password characters, and/or transmitting the user-entered password characters to a server computer.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: August 1, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Eyal Kolman, Alon Kaufman, Ereli Eran, Eyal Gruss
  • Patent number: 9601000
    Abstract: A technique provides alert prioritization. The technique involves selecting attributes to use as alert scoring factors. The technique further involves updating, for an incoming alert having particular attribute values for the selected attributes, count data to represent encounter of the incoming alert from perspectives of the selected attributes. The technique further involves generating an overall significance score for the incoming alert based on the updated count data. The overall significance score is a measure of alert significance relative to other alerts. Scored alerts then can be sorted so that investigators focus on the alerts with the highest significance scores. Such a technique is well suited for adaptive authentication (AA) and Security Information and Event Management (SIEM) systems among other alert-based systems such as churn analysis systems, malfunction detection systems, and the like.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: March 21, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Eyal Gruss, Alex Vaystikh, Eyal Kolman, Alon Kaufman, Yael Villa, Ereli Eran
  • Patent number: 9560027
    Abstract: There is disclosed some techniques for processing an authentication request. In one example, a method comprises the step of determining the velocity between authentication requests of a user associated with the requests. Additionally, the method determines the likelihood that a location associated with one of the requests is associated with the user location. Furthermore, the method generates an authentication result based on the likelihood that a location associated with one of the requests is associated with the user location.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: January 31, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Eyal Kolman, Alon Kaufman, Yael Villa, Alex Vaystikh, Ereli Eran, Liron Liptz
  • Patent number: 9558346
    Abstract: An information processing system implements a security system. The security system comprises a classifier configured to process information characterizing events in order to generate respective risk scores, and a data store coupled to the classifier and configured to store feedback relating to one or more attributes associated with an assessment of the risk scores by one or more users. The classifier is configured to utilize the feedback regarding the risk scores to learn riskiness of particular events and to adjust its operation based on the learned riskiness, such that the risk score generated by the classifier for a given one of the events is based at least in part on the feedback received regarding risk scores generated for one or more previous ones of the events.
    Type: Grant
    Filed: May 28, 2013
    Date of Patent: January 31, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Eyal Kolman, Alon Kaufman, Yael Villa, Alex Vaystikh, Ereli Eran
  • Patent number: 9462009
    Abstract: There is disclosed a technique for detecting risky domains. The technique comprises collecting information in connection with a domain. The technique also comprises generating a profile comprising at least one metric associated with the domain based on the collected information. The technique further comprises determining the riskiness in connection with the domain based on the generated profile.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: October 4, 2016
    Assignee: EMC Corporation
    Inventors: Eyal Kolman, Alex Vaystikh, Alon Kaufman, Ereli Eran, Eyal Gruss
  • Patent number: 9426168
    Abstract: A processing device comprises a processor coupled to a memory and is configured to determine a first set of features from domain name system (DNS) information, the first set of features being defined over a domain, and to determine a second set of features from the DNS information, the second set of features being defined over internet protocol (IP) addresses returned for the domain. The processing device is further configured to compute a fast-flux score based on the first and second sets of features, and to utilize the fast-flux score to characterize fast-flux activity relating to the domain. For example, the processing device can be configured to compare the fast-flux score to a threshold, and to generate an indicator of the presence or absence of fast-flux activity based on a result of the comparison. The processing device may be implemented in a computer network or network security system.
    Type: Grant
    Filed: August 28, 2014
    Date of Patent: August 23, 2016
    Assignee: EMC Corporation
    Inventors: Eyal Yehowa Gruss, Ereli Eran, Alex Vaystikh, Eyal Kolman, Alon Kaufman
  • Patent number: 9325733
    Abstract: A processing device comprises a processor coupled to a memory and is configured to obtain at least one rule set utilized to detect malicious activity in a computer network, to determine one or more trigger conditions for each of a plurality of rules of the at least one rule set, to identify alerts generated responsive to the determined trigger conditions, to compute correlations between respective pairs of the plurality of rules based on the identified alerts, and to aggregate groups of two or more of the plurality of rules into respective aggregated rules based at least in part on the computed correlations. The aggregated rules are illustratively applied in conjunction with remaining unaggregated ones of the plurality of rules of the one or more rule sets to detect malicious activity in the computer network. The processing device may be implemented in a computer network or network security system.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: April 26, 2016
    Assignee: EMC Corporation
    Inventors: Eyal Kolman, Eyal Yehowa Gruss, Alon Kaufman, Ereli Eran
  • Patent number: 9154516
    Abstract: A technique detects riskiness of a communication in a network based on behavior profiling. The technique involves generating a network history baseline (e.g., normal and abnormal behavior profiles) from prior network communications occurring in the network. The technique further involves, for a new network communication, assigning the new network communication a risk score based on a comparison of the new network communication to the network history baseline. The risk score is a numerical measure of behavioral normalcy relative to the prior network communications occurring in the network. The technique further involves providing an output signal having a first value when the risk score is above a predefined risk threshold to indicate that the communication is risky, and a second value which is different than the first value when the risk score is below the predefined risk threshold to indicate that the communication is not risky.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: October 6, 2015
    Assignee: EMC Corporation
    Inventors: Alex Vaystikh, Ereli Eran, Eyal Kolman
  • Patent number: 9130985
    Abstract: Data driven device detection is provided, whereby a device is detected by obtaining a plurality of feature values for a given device; obtaining a set of device attributes for a plurality of potential devices; calculating a probability value that the given device is each potential device within the plurality of potential devices; identifying a candidate device associated with a maximum probability value among the calculated probability values; and labeling the given device as the candidate device if the associated maximum probability value satisfies a predefined threshold. The predefined threshold can be a function, for example, of whether the given user has previously used this device. The obtained feature values can be obtained for a selected set of features satisfying one or more predefined characteristic criteria. The device attributes can be obtained, for example, from a profile for each of the plurality of potential devices.
    Type: Grant
    Filed: June 29, 2013
    Date of Patent: September 8, 2015
    Assignee: EMC Corporation
    Inventors: Eyal Kolman, Alon Kaufman, Yael Villa, Alex Vaystikh, Ereli Eran, Eyal Yehowa Gruss