Patents by Inventor Gregory A. Porpora
Gregory A. Porpora has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11558204Abstract: In an approach to attesting control over network devices, responsive to receiving a first signal from a client, wherein the first signal initiates a network connection between the client and a server, a first certificate is sent to the client that contains a common name that is an internet protocol (IP) address. A second certificate is sent to the client that contains a common name that is a uniform resource locator (URL) of the server. Responsive to receiving a second signal from the client that the first certificate and the second certificate are trusted, the client is connected with the server.Type: GrantFiled: August 17, 2020Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventors: Mauro Marzorati, Rosa M. Bolger, Herbert Daniel Pearthree, Gregory Porpora
-
Publication number: 20220052859Abstract: In an approach to attesting control over network devices, responsive to receiving a first signal from a client, wherein the first signal initiates a network connection between the client and a server, a first certificate is sent to the client that contains a common name that is an internet protocol (IP) address. A second certificate is sent to the client that contains a common name that is a uniform resource locator (URL) of the server. Responsive to receiving a second signal from the client that the first certificate and the second certificate are trusted, the client is connected with the server.Type: ApplicationFiled: August 17, 2020Publication date: February 17, 2022Inventors: Mauro Marzorati, Rosa M. Bolger, Herbert Daniel Pearthree, Gregory Porpora
-
Publication number: 20210110037Abstract: An embodiment of the invention may include a method, computer program product, and computer system for monitoring a computing device. The embodiment includes retrieving data from physical components of the method. The embodiment includes converting the data to at least one spectral format. The embodiment includes analyzing the converted data with a spectral detector. The embodiment includes performing a remediation action of the code anomaly based on detecting a code anomaly by the spectral detector.Type: ApplicationFiled: October 10, 2019Publication date: April 15, 2021Inventors: Guerney D.H. Hunt, Elaine R. Palmer, Gregory A. Porpora, Aaron Potler
-
Patent number: 10956468Abstract: A method, computer system, and a computer program product for cognitive template question formation and execution is provided. The present invention may include receiving a dynamic template question. The present invention may also include mapping the received template question to a type. The present invention may then include mapping the received template question to a data source. The present invention may further include forming a template question based on the mapped template question. The present invention may also include triggering, in response to a triggering event, a query based on the formed template question. The present invention may then include executing the triggered query.Type: GrantFiled: November 30, 2017Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Christopher F. Codella, Jeb R. Linton, Charles Palmer, Gregory A. Porpora
-
Patent number: 10878002Abstract: An approach for filtering data is presented. A relationship between first and second entity-metadata elements specifying a person and a vehicle, respectively, and between the person and the vehicle is determined. Representations of the first and second entity-metadata elements are displayed within a regular polygon that includes locations indicated by a geospatial tag that includes location information about the person extracted from profile information describing the person and by other geospatial tags included in metadata obtained from data extracted from streaming data and data at rest. The metadata includes contextual information that specifies an activity included in a domain of knowledge associated with law enforcement. Based on hidden Markov and support vector machine models, a frequent pattern growth algorithm, and a Kohonen map, another activity of the person is predicted.Type: GrantFiled: September 5, 2018Date of Patent: December 29, 2020Assignee: International Business Machines CorporationInventors: Gregory A. Porpora, Janet L. Spann
-
Patent number: 10757070Abstract: A request is received at a local domain name system server (LDNS) from a client application to resolve a domain name. Responsive to the request a WHOIS information corresponding to the domain name is obtained, using which an age of registration of the domain name and a first weighted value based on the age are computed at the LDNS. A host associated with the domain name is accessed to determine whether a type of a service is configured at the host. A second weighted value is computed based on the configuration of the type of the service. A weighted score is computed using the first weighted value and the second weighted value. An action is selected according to the weighted score. The action is applied to a network component in a network where the client application is executing, to control a manner in which the client application communicates with the host.Type: GrantFiled: November 14, 2018Date of Patent: August 25, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
-
Publication number: 20200153790Abstract: A request is received at a local domain name system server (LDNS)from a client application to resolve a domain name. Responsive to the request a WHOIS information corresponding to the domain name is obtained, using which an age of registration of the domain name and a first weighted value based on the age are computed at the LDNS. A host associated with the domain name is accessed to determine whether a type of a service is configured at the host. A second weighted value is computed based on the configuration of the type of the service. A weighted score is computed using the first weighted value and the second weighted value. An action is selected according to the weighted score. The action is applied to a network component in a network where the client application is executing, to control a manner in which the client application communicates with the host.Type: ApplicationFiled: November 14, 2018Publication date: May 14, 2020Applicant: International Business Machines CorporationInventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
-
Patent number: 10397253Abstract: From a record of a packet in a Domain Name System (DNS) communication between a DNS client and a DNS server, an input feature is constructed. Using the packet, a metadata item supporting the input feature is computed. Using a processor and a memory to execute a trained cognitive classification model, and by supplying the input feature and the supporting metadata item as inputs to the cognitive classification model, a transmission of the packet is classified as malicious use of DNS tunneling between the DNS client and the DNS server. From the cognitive classification model, a classification of the packet as malicious, and a confidence value in the malicious classification are output. By generating a notification, the DNS client is caused to cease the malicious use of the DNS tunneling.Type: GrantFiled: August 8, 2018Date of Patent: August 27, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
-
Publication number: 20190163814Abstract: A method, computer system, and a computer program product for cognitive template question formation and execution is provided. The present invention may include receiving a dynamic template question. The present invention may also include mapping the received template question to a type. The present invention may then include mapping the received template question to a data source. The present invention may further include forming a template question based on the mapped template question. The present invention may also include triggering, in response to a triggering event, a query based on the formed template question. The present invention may then include executing the triggered query.Type: ApplicationFiled: November 30, 2017Publication date: May 30, 2019Inventors: Christopher F. Codella, Jeb R. Linton, Charles Palmer, Gregory A. Porpora
-
Patent number: 10212123Abstract: A request is received at a local domain name system server (LDNS) from a client application to resolve a domain name. Responsive to the request a WHOIS information corresponding to the domain name is obtained, using which an age of registration of the domain name and a first weighted value based on the age are computed at the LDNS. A host associated with the domain name is accessed to determine whether a type of a service is configured at the host. A second weighted value is computed based on the configuration of the type of the service. A weighted score is computed using the first weighted value and the second weighted value. An action is selected according to the weighted score. The action is applied to a network component in a network where the client application is executing, to control a manner in which the client application communicates with the host.Type: GrantFiled: November 24, 2015Date of Patent: February 19, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
-
Publication number: 20190018860Abstract: An approach for filtering data is presented. A relationship between first and second entity-metadata elements specifying a person and a vehicle, respectively, and between the person and the vehicle is determined. Representations of the first and second entity-metadata elements are displayed within a regular polygon that includes locations indicated by a geospatial tag that includes location information about the person extracted from profile information describing the person and by other geospatial tags included in metadata obtained from data extracted from streaming data and data at rest. The metadata includes contextual information that specifies an activity included in a domain of knowledge associated with law enforcement. Based on hidden Markov and support vector machine models, a frequent pattern growth algorithm, and a Kohonen map, another activity of the person is predicted.Type: ApplicationFiled: September 5, 2018Publication date: January 17, 2019Inventors: Gregory A. Porpora, Janet L. Spann
-
Publication number: 20180351974Abstract: From a record of a packet in a Domain Name System (DNS) communication between a DNS client and a DNS server, an input feature is constructed. Using the packet, a metadata item supporting the input feature is computed. Using a processor and a memory to execute a trained cognitive classification model, and by supplying the input feature and the supporting metadata item as inputs to the cognitive classification model, a transmission of the packet is classified as malicious use of DNS tunneling between the DNS client and the DNS server. From the cognitive classification model, a classification of the packet as malicious, and a confidence value in the malicious classification are output. By generating a notification, the DNS client is caused to cease the malicious use of the DNS tunneling.Type: ApplicationFiled: August 8, 2018Publication date: December 6, 2018Applicant: International Business Machines CorporationInventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
-
Patent number: 10102220Abstract: An approach for filtering data is presented. A first geo-hash indicating location information of a person based on profile data or a second geo-hash indicating location information of the person based on an inference is determined to have more characters and is selected as an optimal geo-hash specifying a first geospatial tag. Based on correlations between geospatial tags, time/date stamps, and contextual information, a relationship between first and second entity-metadata elements specifying the person and a vehicle, respectively, and between the person and the vehicle is determined. Representations of the first and second entity-metadata elements are displayed within a regular polygon that includes locations indicated by the geospatial tags. Based on hidden Markov and support vector machine models, a frequent pattern growth algorithm, and a Kohonen map, another activity of the person is predicted.Type: GrantFiled: June 17, 2016Date of Patent: October 16, 2018Assignee: International Business Machines CorporationInventors: Gregory A. Porpora, Janet L. Spann
-
Patent number: 10097568Abstract: Embodiments for domain name service (DNS) tunneling prevention by a processor. A DNS tunneling detection operation is requested to be performed upon receiving a DNS query. A response is generated based on the DNS tunneling detection operation such that the DNS tunneling detection operation indicates in the response that the DNS query for a domain name is associated with DNS tunneling activity.Type: GrantFiled: August 25, 2016Date of Patent: October 9, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
-
Patent number: 10075458Abstract: From a record of a packet in a Domain Name System (DNS) communication between a DNS client and a DNS server, an input feature is constructed. Using the packet, a metadata item supporting the input feature is computed. Using a processor and a memory to execute a trained cognitive classification model, and by supplying the input feature and the supporting metadata item as inputs to the cognitive classification model, a transmission of the packet is classified as malicious use of DNS tunneling between the DNS client and the DNS server. From the cognitive classification model, a classification of the packet as malicious, and a confidence value in the malicious classification are output. By generating a notification, the DNS client is caused to cease the malicious use of the DNS tunneling.Type: GrantFiled: April 29, 2016Date of Patent: September 11, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
-
Patent number: 10075417Abstract: Embodiments for verifying trustworthiness of redirection targets in a tiered delivery computing network by at least a portion of a processor. A degree of trustworthiness for a uniform resource locator (URL) is determined by validating at least one attribute of the URL to establish a reputation score of the URL. The URL is classified, using the reputation score, into one of a plurality of classifications to indicate the degree of trustworthiness.Type: GrantFiled: September 12, 2016Date of Patent: September 11, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. Baughman, Yaser K. Doleh, Mauro Marzorati, Gregory A. Porpora
-
Publication number: 20180077120Abstract: Embodiments for verifying trustworthiness of redirection targets in a tiered delivery computing network by at least a portion of a processor. A degree of trustworthiness for a uniform resource locator (URL) is determined by validating at least one attribute of the URL to establish a reputation score of the URL. The URL is classified, using the reputation score, into one of a plurality of classifications to indicate the degree of trustworthiness.Type: ApplicationFiled: September 12, 2016Publication date: March 15, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. BAUGHMAN, Yaser K. DOLEH, Mauro MARZORATI, Gregory A. PORPORA
-
Publication number: 20180063162Abstract: Embodiments for domain name service (DNS) tunneling prevention by a processor. A DNS tunneling detection operation is requested to be performed upon receiving a DNS query. A response is generated based on the DNS tunneling detection operation such that the DNS tunneling detection operation indicates in the response that the DNS query for a domain name is associated with DNS tunneling activity.Type: ApplicationFiled: August 25, 2016Publication date: March 1, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. BAUGHMAN, Mauro MARZORATI, Gregory A. PORPORA
-
Publication number: 20170318035Abstract: From a record of a packet in a Domain Name System (DNS) communication between a DNS client and a DNS server, an input feature is constructed. Using the packet, a metadata item supporting the input feature is computed. Using a processor and a memory to execute a trained cognitive classification model, and by supplying the input feature and the supporting metadata item as inputs to the cognitive classification model, a transmission of the packet is classified as malicious use of DNS tunneling between the DNS client and the DNS server. From the cognitive classification model, a classification of the packet as malicious, and a confidence value in the malicious classification are output. By generating a notification, the DNS client is caused to cease the malicious use of the DNS tunneling.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Applicant: International Business Machines CorporationInventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
-
Publication number: 20170149730Abstract: A request is received at a local domain name system server (LDNS) from a client application to resolve a domain name. Responsive to the request a WHOIS information corresponding to the domain name is obtained, using which an age of registration of the domain name and a first weighted value based on the age are computed at the LDNS. A host associated with the domain name is accessed to determine whether a type of a service is configured at the host. A second weighted value is computed based on the configuration of the type of the service. A weighted score is computed using the first weighted value and the second weighted value. An action is selected according to the weighted score. The action is applied to a network component in a network where the client application is executing, to control a manner in which the client application communicates with the host.Type: ApplicationFiled: November 24, 2015Publication date: May 25, 2017Applicant: International Business Machines CorporationInventors: AARON K. BAUGHMAN, Mauro Marzorati, Gregory A. Porpora