Patents by Inventor Terry Lee NELMS

Terry Lee NELMS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10050986
    Abstract: Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a similarity between the monitored traffic and the CPT exceeds a match threshold, the monitored traffic may be associated with the CPT.
    Type: Grant
    Filed: February 8, 2017
    Date of Patent: August 14, 2018
    Assignee: Damballa, Inc.
    Inventors: Terry Lee Nelms, Andrew Hobson, Joseph Ward
  • Patent number: 9930065
    Abstract: Systems and methods for event path traceback may utilize a processor and a path traceback and categorization (ATC) module in communication with the processor. The processor may be configured to perform processing associated with receiving network traffic from a network. The ATC module may be configured to perform processing associated with identifying an event within the network traffic, tracing a sequence of network transactions related to the event, and outputting an annotated event path (AMP) including data about the event and the sequence of network transactions related to the event. Performing processing associated with tracing the sequence of network transactions may comprise reconstructing a sequence of transactions within the network traffic that led to the event while filtering out unrelated traffic within the network traffic.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: March 27, 2018
    Assignees: University of Georgia Research Foundation, Inc., Dambala, Inc.
    Inventors: Terry Lee Nelms, Roberto Perdisci
  • Publication number: 20170230393
    Abstract: Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a similarity between the monitored traffic and the CPT exceeds a match threshold, the monitored traffic may be associated with the CPT.
    Type: Application
    Filed: February 8, 2017
    Publication date: August 10, 2017
    Inventors: Terry Lee NELMS, Andrew HOBSON, Joseph WARD
  • Patent number: 9571511
    Abstract: Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a similarity between the monitored traffic and the CPT exceeds a match threshold, the monitored traffic may be associated with the CPT.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: February 14, 2017
    Assignee: Damballa, Inc.
    Inventors: Terry Lee Nelms, Andrew Hobson, Joseph Ward
  • Publication number: 20160285894
    Abstract: Systems and methods for event path traceback may utilize a processor and a path traceback and categorization (ATC) module in communication with the processor. The processor may be configured to perform processing associated with receiving network traffic from a network. The ATC module may be configured to perform processing associated with identifying an event within the network traffic, tracing a sequence of network transactions related to the event, and outputting an annotated event path (AMP) including data about the event and the sequence of network transactions related to the event. Performing processing associated with tracing the sequence of network transactions may comprise reconstructing a sequence of transactions within the network traffic that led to the event while filtering out unrelated traffic within the network traffic.
    Type: Application
    Filed: March 25, 2015
    Publication date: September 29, 2016
    Inventors: Terry Lee NELMS, Roberto PERDISCI
  • Publication number: 20140373148
    Abstract: Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a similarity between the monitored traffic and the CPT exceeds a match threshold, the monitored traffic may be associated with the CPT.
    Type: Application
    Filed: June 16, 2014
    Publication date: December 18, 2014
    Inventors: Terry Lee NELMS, Andrew HOBSON, Joseph WARD
  • Patent number: 8677473
    Abstract: Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted.
    Type: Grant
    Filed: November 18, 2008
    Date of Patent: March 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: David Allen Dennerline, Hubertus Franke, David Paul LaPotin, Terry Lee Nelms, II, Hao Yu
  • Patent number: 8006303
    Abstract: Intrusion protection. A first packet en route to a first destination is received. A first value representing a benefit for analyzing the first packet for intrusions in relation to a cost for analyzing the first packet for intrusions is automatically determined. An automatic determination is made that the first value is sufficiently high to warrant an analysis of the first packet for intrusions, and in response, the first packet is analyzed for intrusions. If the analysis of the first packet for intrusions indicates an intrusion, the first packet is discarded without forwarding the first packet to the first destination. A second packet en route to a second destination is received. A second value representing a benefit for analyzing the second packet for intrusions in relation to a cost for analyzing the second packet for intrusions is automatically determined.
    Type: Grant
    Filed: June 7, 2007
    Date of Patent: August 23, 2011
    Assignee: International Business Machines Corporation
    Inventors: David Allen Dennerline, Terry Lee Nelms, II, Bernard Paul Palmer, Jr.
  • Publication number: 20100125900
    Abstract: Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted.
    Type: Application
    Filed: November 18, 2008
    Publication date: May 20, 2010
    Inventors: David Allen Dennerline, Hubertus Franke, David Paul LaPotin, Terry Lee Nelms, II, Hao Yu