Patents by Inventor Sushil Jajodia

Sushil Jajodia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140325660
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Application
    Filed: July 7, 2014
    Publication date: October 30, 2014
    Inventors: Sushil JAJODIA, Lingyu WANG, Steven NOEL, Anoop SINGHAL
  • Patent number: 8856782
    Abstract: An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes.
    Type: Grant
    Filed: February 26, 2008
    Date of Patent: October 7, 2014
    Assignee: George Mason Research Foundation, Inc.
    Inventors: Anup K Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
  • Patent number: 8839422
    Abstract: An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: September 16, 2014
    Assignee: George Mason Research Foundation, Inc.
    Inventors: Anup K Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
  • Publication number: 20140173740
    Abstract: A system and method for determining at least one hardening strategy to prevent at least one attack, comprising: performing processing associated with obtaining at least one attack graph, the at least one attack graph comprising at least one goal condition, at least one initial condition, and at least one exploit; performing processing associated with obtaining at least one allowable action that disables the at least one initial condition; performing processing associated with obtaining costs associated with the at least one allowable action; and performing processing associated with utilizing the at least one allowable action to determine at least one recommended strategy from the at least one allowable action taking into account the costs.
    Type: Application
    Filed: June 21, 2013
    Publication date: June 19, 2014
    Inventors: MASSIMILIANO ALBANESE, SUSHIL JAJODIA, STEVEN NOEL
  • Patent number: 8719943
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Grant
    Filed: May 8, 2012
    Date of Patent: May 6, 2014
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Steven E Noel, Sushil Jajodia, Eric B Robertson
  • Patent number: 8644353
    Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: February 4, 2014
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Xinyuan Wang, Shiping Chen, Sushil Jajodia
  • Patent number: 8566269
    Abstract: An attack graph analysis tool that includes a network configuration information input module, a domain knowledge input module, a network configuration information storage module, a domain knowledge storage module, and a result generation module. The network configuration information input module inputs network configuration information. The domain knowledge input module inputs domain knowledge for the network. The network configuration information storage module stores network configuration information in a network database table. The domain knowledge storage module stores the domain knowledge in an exploit database table. The result generation module generates a result using the network database table and exploit database table. The result may be generated in response to a query to a database management system that has access to the network database table and exploit database table.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: October 22, 2013
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Lingyu Wang, Anoop Singhal
  • Publication number: 20120233699
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Application
    Filed: January 11, 2012
    Publication date: September 13, 2012
    Inventors: Sushil JAJODIA, Lingyu Wang, Steven Noel, Anoop Singhal
  • Publication number: 20120227108
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Application
    Filed: May 8, 2012
    Publication date: September 6, 2012
    Inventors: Steven E. Noel, Eric B. Robertson, Sushil Jajodia
  • Patent number: 8181252
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: May 15, 2012
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Steven E Noel, Eric B Robertson
  • Patent number: 8082452
    Abstract: Sensitive data associations for related data values are protected. A set of related data values is received. The set of related data values include at least a first data value and a second data value. The first data value is associated with a first data field and the second data value is associated to a second data field. First encrypted data is created by encrypting the first data value using a first encryption key and a second encrypted data is created by encrypting the second data value using a second encryption key. The first data value is stored in a first data table, the second data value is stored in a second data table, the first encrypted data is stored in the second table, and the second encrypted data is stored in the first table.
    Type: Grant
    Filed: November 29, 2007
    Date of Patent: December 20, 2011
    Assignee: George Mason Intellectual Properties, Inc.
    Inventor: Sushil Jajodia
  • Publication number: 20110167492
    Abstract: An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark.
    Type: Application
    Filed: June 30, 2010
    Publication date: July 7, 2011
    Inventors: Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
  • Publication number: 20110164506
    Abstract: Embodiments of the present invention include a system or method for inferring packet management rules of a packet management device. A probing device is used to extract at least one of port number and IP address from a packet management configuration file. The probing device classifies extracted numbers and selectively transmits packets to a packet management device. A packet analyzer notifies the probing device when a packet passes through the packet management device. Based on the notification, the probing device is able to transmit packets to the packet management device in a non-exhaustive manner and determine a port range corresponding to a packet management rule.
    Type: Application
    Filed: July 13, 2010
    Publication date: July 7, 2011
    Inventors: Angelos Stavrou, Sushil Jajodia, Charalampos Andrianakis
  • Publication number: 20110099620
    Abstract: A transparent proxy for malware detection includes a monitor module, a protocol determination module, a challenge generation module, a response determination module, and a data control module. The monitor module examines data originating from an application towards a remote server. The protocol determination module identifies the protocol type used for the data. The challenge generation module produces a challenge for the application based upon the protocol type, sends the challenge to the application, and maintains a state related to the data and the challenge. The response determination module makes a determination if an automatic non-interactive application response is received in response to the challenge from the application. The data control module allows the first data to continue to the remote server when the determination is valid. The data control module reports malware detection and blocks the data to continue to the remote server when the determination is invalid.
    Type: Application
    Filed: April 9, 2010
    Publication date: April 28, 2011
    Inventors: Angelos Stavrou, Sushil Jajodia, Anup Ghosh, Rhandi Martin, Charalampos Andrianakis
  • Publication number: 20110069721
    Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.
    Type: Application
    Filed: September 30, 2010
    Publication date: March 24, 2011
    Inventors: Sushil Jajodia, Shlping Chen, Xinyuan Wang
  • Patent number: 7904962
    Abstract: Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: March 8, 2011
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Steven E. Noel, Pramod Kalapa, Brian C. O'Berry, Michael A. Jacobs, Eric B. Robertson, Robert G. Weierbach
  • Patent number: 7822073
    Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: October 26, 2010
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Xinyuan Wang, Shiping Chen, Sushil Jajodia
  • Publication number: 20100192226
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Application
    Filed: April 12, 2010
    Publication date: July 29, 2010
    Inventors: Steven E. Noel, Eric B. Robertson, Sushil Jajodia
  • Patent number: 7730037
    Abstract: Disclosed is a fragile watermarking scheme for detecting and localizing malicious alterations made to a database relation with categorical attributes without introducing distortions to cover data. A watermark for a tuple group may be inserted by selectively switching the position of tuples in tuple pairs using a tuple hash associated with each tuple in the tuple pair; and a corresponding bit in a watermark derived from the tuple group using a embedding key, a primary key and hash functions.
    Type: Grant
    Filed: October 17, 2005
    Date of Patent: June 1, 2010
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Huiping Guo, Yingjiu Li
  • Patent number: 7720250
    Abstract: A watermarking system embeds a watermark into data values that may be streamed. A data hash is calculated using data values and a hash key. The data values are grouped. The groups include a first group and a second group. A first group hash is calculated using data values in the first group and a first group hash key. A second group hash is calculated using data values in the second group and a second group hash key. A watermark is constructed based on the first group hash and the second group hash. The value of at least one of the data values in the first group is modified using the watermark.
    Type: Grant
    Filed: May 23, 2006
    Date of Patent: May 18, 2010
    Assignee: George Mason University
    Inventors: Sushil Jajodia, Huiping Guo, YingJiu Li