Patents by Inventor Shoufu Luo

Shoufu Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11457034
    Abstract: The disclosed embodiments provide a system for detecting abusive requests. During operation, the system generates, based on one or more primary signals, a first set of clusters of network requests spanning a first period and a second set of clusters of requests spanning a second period. Next, the system stores, in a snapshot, a signature representing primary signal values and a first distribution of secondary signals in a first cluster in the first set of clusters. The system matches primary signal values from a second cluster in the second set of clusters to the signature and calculates a divergence score representing a deviation of a second distribution of secondary signals in the second cluster from the first distribution. When the divergence score violates a threshold, the system generates output for identifying additional network requests that contain one or more primary and secondary signal values in the second cluster.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: September 27, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shoufu Luo, Yi-Wei Lin, Samridh Saluja, Rui Han
  • Publication number: 20210306358
    Abstract: The disclosed embodiments provide a system for detecting abusive requests. During operation, the system generates, based on one or more primary signals, a first set of clusters of network requests spanning a first period and a second set of clusters of requests spanning a second period. Next, the system stores, in a snapshot, a signature representing primary signal values and a first distribution of secondary signals in a first cluster in the first set of clusters. The system matches primary signal values from a second cluster in the second set of clusters to the signature and calculates a divergence score representing a deviation of a second distribution of secondary signals in the second cluster from the first distribution. When the divergence score violates a threshold, the system generates output for identifying additional network requests that contain one or more primary and secondary signal values in the second cluster.
    Type: Application
    Filed: March 31, 2020
    Publication date: September 30, 2021
    Inventors: Shoufu Luo, Yi-Wei Lin, Samridh Saluja, Rui Han
  • Patent number: 11108813
    Abstract: The disclosed embodiments provide a system for mitigating a distributed denial-of-service (DDoS) attack. During operation, the system analyzes application layer data in historical traffic to an online system to determine a historical volume of member traffic from an Internet Protocol (IP) address to the online system, wherein the member traffic is generated by members of the online system. Next, the system calculates a rate limit for a set of requests from the IP address to the online system based on the historical volume of member traffic from the IP address. During a DDoS attack, the system outputs the rate limit for use in blocking a subset of the requests from the IP address to the online system.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: August 31, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shoufu Luo, Jie Zhang
  • Patent number: 11063969
    Abstract: In one embodiment, a network security device monitors network communications between a computer and another computer. A periodicity of transmissions made by one computer to the other computer is determined, with the periodicity being used to identify candidate time point pairs having intervals that match the periodicity. A graph is constructed with time points of the candidate time point pairs as nodes and with intervals of time point pairs as edges. A longest path that continuously links one time point to another time point on the graph is compared to a threshold length to verify that the transmissions are periodic, and are thus potentially indicative of malicious network communications.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: July 13, 2021
    Assignee: Trend Micro Incorporated
    Inventors: Shoufu Luo, Jonathan Edward Andersson, Josiah Dede Hagen
  • Patent number: 11044265
    Abstract: In one embodiment, local begin and end tags are detected by a network security device to determine a local context of a network traffic flow, and a local feature vector is obtained for that local context. At least one triggering machine learning model is applied by the network security device to the local feature vector, and the result determines whether or not deeper analysis is warranted. In most cases, very substantial resources are not required because deeper analysis is not indicated. If deeper analysis is indicated, one or more deeper machine learning model may then be applied to global and local feature vectors, and regular expressions may be applied to packet data, which may include the triggering data packet and one or more subsequent data packets. Other embodiments, aspects and features are also disclosed.
    Type: Grant
    Filed: June 11, 2020
    Date of Patent: June 22, 2021
    Assignee: Trend Micro Incorporated
    Inventors: Josiah Dede Hagen, Jonathan Edward Andersson, Shoufu Luo, Brandon Niemczyk, Leslie Zsohar, Craig Botkin, Peter Andriukaitis
  • Publication number: 20200412760
    Abstract: The disclosed embodiments provide a system for mitigating a distributed denial-of-service (DDoS) attack. During operation, the system analyzes application layer in historical traffic to an online system to determine historical volumes of member traffic from a set of regions to the online system, wherein the member traffic is generated by members of the online system. Next, the system calculates allocations of query rates for the set of regions based on the historical volumes of member traffic from the set of regions. During a DDoS attack, the system outputs the allocations of the query rates for use in blocking different portions of the requests from different regions in the set of regions to the online system.
    Type: Application
    Filed: June 28, 2019
    Publication date: December 31, 2020
    Inventors: Shoufu Luo, Jie Zhang
  • Publication number: 20200412761
    Abstract: The disclosed embodiments provide a system for mitigating a distributed denial-of-service (DDoS) attack. During operation, the system analyzes application layer data in historical traffic to an online system to determine a historical volume of member traffic from an Internet Protocol (IP) address to the online system, wherein the member traffic is generated by members of the online system. Next, the system calculates a rate limit for a set of requests from the IP address to the online system based on the historical volume of member traffic from the IP address. During a DDoS attack, the system outputs the rate limit for use in blocking a subset of the requests from the IP address to the online system.
    Type: Application
    Filed: June 28, 2019
    Publication date: December 31, 2020
    Inventors: Shoufu Luo, Jie Zhang
  • Patent number: 10728268
    Abstract: In one embodiment, local begin and end tags are detected by a network security device to determine a local context of a network traffic flow, and a local feature vector is obtained for that local context. At least one triggering machine learning model is applied by the network security device to the local feature vector, and the result determines whether or not deeper analysis is warranted. In most cases, very substantial resources are not required because deeper analysis is not indicated. If deeper analysis is indicated, one or more deeper machine learning model may then be applied to global and local feature vectors, and regular expressions may be applied to packet data, which may include the triggering data packet and one or more subsequent data packets. Other embodiments, aspects and features are also disclosed.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: July 28, 2020
    Assignee: Trend Micro Incorporated
    Inventors: Josiah Dede Hagen, Jonathan Edward Andersson, Shoufu Luo, Brandon Niemczyk, Leslie Zsohar, Craig Botkin, Peter Andriukaitis