Patents by Inventor Matteo CAFASSO
Matteo CAFASSO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240155027Abstract: Information related to data communication between a plurality of connected devices is obtained. A plurality of initiated connections between the plurality of connected devices as directed edges between nodes in a directed graph based on the information are defined. Each initiated connection is represented by a directed edge from a source node to a destination node in the directed graph, and each node comprises an internet protocol (IP) address of the node. The directed graph is explored to determine a plurality of source/destination-pairs, wherein each source/destination-pair contains a source IP address of a source node of a directed edge, and a destination IP address of a destination node of the directed edge. A peer-to-peer (P2P) network including a plurality of P2P devices is detected based on the source/destination-pairs.Type: ApplicationFiled: November 9, 2022Publication date: May 9, 2024Inventors: Matteo Cafasso, Leonardas Marozas, Filip Savin
-
Patent number: 11843946Abstract: There is provided a method that comprises receiving one or more unique passwords for identifying respective one or more user devices of the wireless local area network; associating the one or more unique passwords with the respective one or more user devices and storing the one or more unique passwords to a database; in response to receiving, at an access point of the wireless local area network, a connection request from a user device, requesting, from the user device, a unique password of the user device; and identifying the user device based on the unique password.Type: GrantFiled: April 1, 2021Date of Patent: December 12, 2023Assignee: Cujo LLCInventors: Matteo Cafasso, Leonardas Marozas
-
Patent number: 11824891Abstract: A network apparatus maintains a data repository comprising network traffic data related to a plurality of user devices, the network traffic data being collected from a plurality of Network Service Providers (NSPs). A subset of the plurality of user devices are detected to be communicating with one or more same endpoint devices based on analysing the network traffic data. A number of historical connections between each user device of the subset of the plurality of user devices and the one or more endpoint devices is determined based on analysing historical connection data maintained in the data repository, and in response to detecting that the number of historical connections between the subset of the plurality of user devices and the one or more endpoint devices exceeds a predetermined threshold, the one or more endpoint devices are identified as a suspected botnet.Type: GrantFiled: February 15, 2021Date of Patent: November 21, 2023Assignee: Cujo LLCInventors: Leonardas Marozas, Filip Savin, Matteo Cafasso, Santeri Kangas, Sean Tiernan
-
Patent number: 11528189Abstract: Network device identification is disclosed. A set of data attributes relating to at least two different data types is extracted from network traffic data associated with each user device of a set of user devices. A cluster data set of one or more known device clusters is expanded with the set of data attributes for generating an expanded cluster data set. One or more new device clusters is identified from the expanded cluster data set of the one or more known device clusters by using similarity-based metrics and a weighting factor selected based on the data types of the set of data attributes, and one or more device identification rules is generated based on the one or more new device clusters.Type: GrantFiled: March 8, 2022Date of Patent: December 13, 2022Assignee: Cujo LLCInventors: Attila Egri, Christian Kiss-Toth, Matteo Cafasso
-
Publication number: 20220322089Abstract: There is provided a method that comprises receiving one or more unique passwords for identifying respective one or more user devices of the wireless local area network; associating the one or more unique passwords with the respective one or more user devices and storing the one or more unique passwords to a database; in response to receiving, at an access point of the wireless local area network, a connection request from a user device, requesting, from the user device, a unique password of the user device; and identifying the user device based on the unique password.Type: ApplicationFiled: April 1, 2021Publication date: October 6, 2022Inventors: Matteo Cafasso, Leonardas Marozas
-
Publication number: 20220263861Abstract: A network apparatus maintains a data repository comprising network traffic data related to a plurality of user devices, the network traffic data being collected from a plurality of Network Service Providers (NSPs). A subset of the plurality of user devices are detected to be communicating with one or more same endpoint devices based on analysing the network traffic data. A number of historical connections between each user device of the subset of the plurality of user devices and the one or more endpoint devices is determined based on analysing historical connection data maintained in the data repository, and in response to detecting that the number of historical connections between the subset of the plurality of user devices and the one or more endpoint devices exceeds a predetermined threshold, the one or more endpoint devices are identified as a suspected botnet.Type: ApplicationFiled: February 15, 2021Publication date: August 18, 2022Inventors: Leonardas Marozas, Filip Savin, Matteo Cafasso, Santeri Kangas, Sean Tiernan
-
Publication number: 20220021670Abstract: There is provided a method comprising: maintaining a database of one or more computer devices registered at a computer network, detecting a connection request from a new computer device, determining a physical location of the new computer device and comparing the physical location of the new computer device with the physical location data stored in the database. In response to detecting a previously registered computer device of the one or more computer devices having at least an approximately same physical location as the new computer device based on the comparison, the method further comprises determining that a change has occurred in network-based identification data of the previously registered computer device and taking further action to protect the computer devices from a security threat caused by the change of the network-based identification data.Type: ApplicationFiled: July 16, 2020Publication date: January 20, 2022Inventor: Matteo Cafasso
-
Patent number: 11010473Abstract: There are provided measures for enabling detecting malware. A method includes generating a copy of a first node, configuring a sandbox environment by using the generated copy, executing an electronic file or a URL in the sandbox environment configured with the copy, providing a result of the malware analysis of the electronic file or the URL, identifying the electronic file or the URL as malicious or suspicious on the basis of the provided result, and taking further action for protecting the first node from the electronic file or the URL identified as malicious or suspicious.Type: GrantFiled: December 14, 2018Date of Patent: May 18, 2021Assignee: F-Secure CorporationInventors: Matteo Cafasso, Bruno Amaro Almeida, Ville Lindfors, Jorge Rodriguez Garcia
-
Patent number: 10565375Abstract: There is provided a method for improving security of computer resources, including obtaining raw memory snapshots of a computer memory of one or more computing systems during runtime of identical processes relating to a predetermined application or a service; forming a map of expected memory behaviour relating to the application or the service based on the obtained raw memory snapshots; monitoring the memory behaviour of a computing system during the execution of the same application or the service; comparing the monitored memory behaviour of the computing system with the formed map of expected memory behaviour; and in the event that a deviation from the expected memory behaviour is detected based on the comparison, triggering an alert.Type: GrantFiled: January 23, 2017Date of Patent: February 18, 2020Assignee: F-Secure CorporationInventors: Jarno Niemelä, Matteo Cafasso
-
Publication number: 20190188383Abstract: There are provided measures for enabling detecting malware. A method includes generating a copy of a first node, configuring a sandbox environment by using the generated copy, executing an electronic file or a URL in the sandbox environment configured with the copy, providing a result of the malware analysis of the electronic file or the URL, identifying the electronic file or the URL as malicious or suspicious on the basis of the provided result, and taking further action for protecting the first node from the electronic file or the URL identified as malicious or suspicious.Type: ApplicationFiled: December 14, 2018Publication date: June 20, 2019Inventors: Matteo Cafasso, Bruno Amaro Almeida, Ville Lindfors, Jorge Rodriguez Garcia
-
Publication number: 20170235949Abstract: There is provided a method for improving security of computer resources, including obtaining raw memory snapshots of a computer memory of one or more computing systems during runtime of identical processes relating to a predetermined application or a service; forming a map of expected memory behaviour relating to the application or the service based on the obtained raw memory snapshots; monitoring the memory behaviour of a computing system during the execution of the same application or the service; comparing the monitored memory behaviour of the computing system with the formed map of expected memory behaviour; and in the event that a deviation from the expected memory behaviour is detected based on the comparison, triggering an alert.Type: ApplicationFiled: January 23, 2017Publication date: August 17, 2017Inventors: Jarno NIEMELA, Matteo CAFASSO
-
Patent number: 9591019Abstract: Malicious object detection is disclosed. An apparatus includes one or more processors, and one or more memories including computer program code. The one or more memories and the computer program code are configured to, with the one or more processors, cause the apparatus at least to perform: obtain image data; obtain association data relating to the image data; identify the image data as corresponding to an identified image among known reference images; and set reputation data of the association data as suspicious, if the association data does not match acceptable associations for the identified image.Type: GrantFiled: October 31, 2013Date of Patent: March 7, 2017Assignee: F-Secure CorporationInventors: Matteo Cafasso, Matias Suarez, Ville Lindfors, Jarno Niemela
-
Publication number: 20140130164Abstract: Malicious object detection is disclosed. An apparatus includes one or more processors, and one or more memories including computer program code. The one or more memories and the computer program code are configured to, with the one or more processors, cause the apparatus at least to perform: obtain image data; obtain association data relating to the image data; identify the image data as corresponding to an identified image among known reference images; and set reputation data of the association data as suspicious, if the association data does not match acceptable associations for the identified image.Type: ApplicationFiled: October 31, 2013Publication date: May 8, 2014Applicant: F-Secure CorporationInventors: Matteo CAFASSO, Matias SUAREZ, Ville LINDFORS, Jarno NIEMELA