Patents by Inventor Timothy M. Aldrich

Timothy M. Aldrich has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9609012
    Abstract: A system and method for detecting Fast-Flux malware are presented. Domain name system (DNS) lookup requests to DNS servers from a local area network (LAN) to a wide area network (WAN) are monitored. The DNS lookup requests comprise requests to resolve uniform resource locators (URLs) to network addresses. The network addresses (IP) received from the DNS servers for the DNS lookup requests are monitored provide a URL-to-IP associations list. The DNS servers used for the DNS lookup requests for the URLs are monitored to provide a DNS Domain-to-DNS server associations list. A suspicious URL log based on the URL-to-IP associations list, and a suspicious DNS log based on the DNS Domain-to-DNS server associations list are generated.
    Type: Grant
    Filed: February 12, 2016
    Date of Patent: March 28, 2017
    Assignee: The Boeing Company
    Inventors: Aaron R. Davis, Timothy M. Aldrich
  • Patent number: 9479521
    Abstract: A particular method includes detecting, at a detection module, an indicator corresponding to a suspicious software component, where the indicator is detected based on monitored network data of a network system and based on a plurality of network behavior profiles. At least one of the network behavior profiles includes an ordered sequence of network actions. The method further includes determining, at an identification module, whether the indicator corresponds to any of the plurality of network behavior profiles. The method further includes generating output data in response to a determination that the indicator corresponds to a particular network behavior profile of the plurality of network behavior profiles.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: October 25, 2016
    Assignee: The Boeing Company
    Inventors: Aaron R. Davis, Timothy M. Aldrich, Matthew S. Bialek, Timothy M. Lemm, Shaun Kospiah
  • Publication number: 20160173519
    Abstract: A system and method for detecting Fast-Flux malware are presented. Domain name system (DNS) lookup requests to DNS servers from a local area network (LAN) to a wide area network (WAN) are monitored. The DNS lookup requests comprise requests to resolve uniform resource locators (URLs) to network addresses. The network addresses (IP) received from the DNS servers for the DNS lookup requests are monitored provide a URL-to-IP associations list. The DNS servers used for the DNS lookup requests for the URLs are monitored to provide a DNS Domain-to-DNS server associations list. A suspicious URL log based on the URL-to-IP associations list, and a suspicious DNS log based on the DNS Domain-to-DNS server associations list are generated.
    Type: Application
    Filed: February 12, 2016
    Publication date: June 16, 2016
    Inventors: Aaron R. Davis, Timothy M. Aldrich
  • Patent number: 9270693
    Abstract: A system and method for detecting Fast-Flux malware are presented. Domain name system (DNS) lookup requests to DNS servers from a local area network (LAN) to a wide area network (WAN) are monitored. The DNS lookup requests comprise requests to resolve uniform resource locators (URLs) to network addresses. The network addresses (IP) received from the DNS servers for the DNS lookup requests are monitored provide a URL-to-IP associations list. The DNS servers used for the DNS lookup requests for the URLs are monitored to provide a DNS Domain-to-DNS server associations list. A suspicious URL log based on the URL-to-IP associations list, and a suspicious DNS log based on the DNS Domain-to-DNS server associations list are generated.
    Type: Grant
    Filed: September 19, 2013
    Date of Patent: February 23, 2016
    Assignee: The Boeing Company
    Inventors: Aaron R. Davis, Timothy M. Aldrich
  • Patent number: 9215244
    Abstract: The disclosed method involves monitoring behavior of at least one node, associated with at least one user, in a network to generate a behavior profile for the user(s). The method further involves comparing the behavior profile for at least one user with a baseline behavior profile for the user(s). Also, the method involves determining when there is a difference between the behavior profile for at least one user and the baseline behavior profile for the user(s). Further, the method involves flagging an event associated with the difference: when the difference exceeds a baseline threshold level, does not exceed a baseline threshold level, meets at least one criterion, and/or does not meet at least one criterion. Additionally, the method involves classifying the event to an event classification. Further, the method involves transmitting the event to at least one other node in the network and/or a network operations center.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: December 15, 2015
    Assignee: THE BOEING COMPANY
    Inventors: Arun Ayyagari, Timothy M. Aldrich, David E. Corman, Gregory M. Gutt, David A. Whelan
  • Patent number: 9191399
    Abstract: The present disclosure describes one or more systems, methods, routines and/or techniques for detection of infected network devices via analysis of responseless outgoing network traffic. A computer implemented method may include executing a routine that receives as input first packet information. The method may include executing a routine that analyzes the first packet information to determine whether the first packet information identifies an outgoing network packet that is associated with the initiation of a network communication. The method may include executing a routine that causes storage and/or tracking, in one or more data stores, of the first packet information if the first packet information is determined to be a potential responseless packet. The method may include executing a routine that causes removal and/or ends tracking of the first packet information if the first packet information is determined to not be a responseless packet based on analysis of second packet information.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: November 17, 2015
    Assignee: The Boeing Company
    Inventors: Aaron R. Davis, Timothy M. Aldrich
  • Publication number: 20150096019
    Abstract: A particular method includes detecting, at a detection module, an indicator corresponding to a suspicious software component, where the indicator is detected based on monitored network data of a network system and based on a plurality of network behavior profiles. At least one of the network behavior profiles includes an ordered sequence of network actions. The method further includes determining, at an identification module, whether the indicator corresponds to any of the plurality of network behavior profiles. The method further includes generating output data in response to a determination that the indicator corresponds to a particular network behavior profile of the plurality of network behavior profiles.
    Type: Application
    Filed: September 30, 2013
    Publication date: April 2, 2015
    Applicant: The Boeing Company
    Inventors: Aaron R. Davis, Timothy M. Aldrich, Matthew S. Bialek, Timothy M. Lemm, Shaun Kospiah
  • Publication number: 20150082431
    Abstract: A system and method for detecting Fast-Flux malware are presented. Domain name system (DNS) lookup requests to DNS servers from a local area network (LAN) to a wide area network (WAN) are monitored. The DNS lookup requests comprise requests to resolve uniform resource locators (URLs) to network addresses. The network addresses (IP) received from the DNS servers for the DNS lookup requests are monitored provide a URL-to-IP associations list. The DNS servers used for the DNS lookup requests for the URLs are monitored to provide a DNS Domain-to-DNS server associations list. A suspicious URL log based on the URL-to-IP associations list, and a suspicious DNS log based on the DNS Domain-to-DNS server associations list are generated.
    Type: Application
    Filed: September 19, 2013
    Publication date: March 19, 2015
    Applicant: The Boeing Company
    Inventors: Aaron R. Davis, Timothy M. Aldrich
  • Publication number: 20140075536
    Abstract: The present disclosure describes one or more systems, methods, routines and/or techniques for detection of infected network devices via analysis of responseless outgoing network traffic. A computer implemented method may include executing a routine that receives as input first packet information. The method may include executing a routine that analyzes the first packet information to determine whether the first packet information identifies an outgoing network packet that is associated with the initiation of a network communication. The method may include executing a routine that causes storage and/or tracking, in one or more data stores, of the first packet information if the first packet information is determined to be a potential responseless packet. The method may include executing a routine that causes removal and/or ends tracking of the first packet information if the first packet information is determined to not be a responseless packet based on analysis of second packet information.
    Type: Application
    Filed: September 11, 2012
    Publication date: March 13, 2014
    Applicant: THE BOEING COMPANY
    Inventors: Aaron Richard Davis, Timothy M. Aldrich
  • Patent number: 8051477
    Abstract: State of security in a mobile communications network is communicated. Data regarding nature and severity of security events onboard at least one mobile platform is generated and processed. A message that includes the processed data is generated and transmitted periodically. The processed data makes up a security state vector that includes the number of security events detected since power-up of the mobile platform node, sum of highest severity security events since power-up or counter rollover, sum of the second highest severity security events detected since power-up or counter rollover, sum of the third highest severity security events detected since power-up or counter rollover, highest security event classification, second-highest security event classification, and third-highest security event classification. The processed data may be used in a network operations center to prioritize mobile platforms from which logged data should be retrieved for further investigation and monitoring.
    Type: Grant
    Filed: December 3, 2004
    Date of Patent: November 1, 2011
    Assignee: The Boeing Company
    Inventors: Laurence I. Rockwell, Timothy M. Aldrich