Patents by Inventor Yair Allouche
Yair Allouche has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240176784Abstract: An example system includes a processor to receive a stream of records. The processor can generate an unbiased outlier score for each sample in the stream of records via a trained histogram-based outlier score model. The unbiased outlier score is unbiased for samples including dependent features using feature grouping. The processor can then detect an anomaly in response to detecting that an associated unbiased outlier score of the sample is higher than a predefined threshold.Type: ApplicationFiled: November 30, 2022Publication date: May 30, 2024Inventors: Yair ALLOUCHE, Aviad COHEN, Samuel Solomon ACKERMAN, Ofer Haim BILLER, Eitan Daniel FARCHI
-
Patent number: 11995068Abstract: A method including: receiving a set of data representing usage by entities of objects in a computing resource; extracting, from the initial set of data, one or more feature vectors representing the usage by one of the entities with respect to the objects; generating, from the feature vectors, a feature matrix; with respect to each entry in the feature matrix: (i) assigning a binary value to the entry, based on a predefined usage threshold, (ii) identifying, among the one or more entities, k nearest neighbor entities with respect to the one of the entities, based on a predefined distance threshold, and (iii) modifying the usage value of the entry, based on usage values associated with each of the k nearest neighbor entities with respect to the one of the objects; and updating the feature matrix with the modified usage values, to obtain a manipulated feature matrix.Type: GrantFiled: May 3, 2023Date of Patent: May 28, 2024Assignee: International Business Machines CorporationInventors: Yair Allouche, Aviad Cohen, Eitan Daniel Farchi
-
Patent number: 11979421Abstract: In some examples, a system for decorating network traffic flows with outlier scores includes a processor and a memory device to store traffic flows received from a network. The processor is configured to receive a set of traffic flows from the memory device and generate a tree model to split the traffic flows into clusters of traffic flows. Each cluster corresponds with a leaf of the tree model. The processor is further configured to generate machine learning models for each of the clusters of traffic flows separately. For a new traffic flow, the processor is configured to identify a specific one of the machine learning models that corresponds with the new traffic flow, compute an outlier score for the new traffic flow using the identified specific one of the machine learning models, and decorate the new traffic flow with the outlier score.Type: GrantFiled: December 31, 2021Date of Patent: May 7, 2024Assignee: International Business Machines CorporationInventors: Yair Allouche, Aviad Cohen, Ravid Sagy, Ofer Haim Biller, Eitan Daniel Farchi
-
Publication number: 20240143737Abstract: Described are techniques for automated generation of labeled datasets for training an AI model to identify a cyberattack. The techniques include receiving configuration information for simulating a cyberattack against a target computer network. The techniques further include executing a cyberattack simulation, based on the configuration information, against the target computer network, where one or more attack log files containing information related to the cyberattack simulation are generated by resources of the target computer network in response to the cyberattack simulation. The techniques further include generating labeled training data from the one or more attack log files to correspond to specifications of the target computer network, and training an artificial intelligence (AI) model to identify the cyberattack in the target computer network using the labeled training data.Type: ApplicationFiled: October 26, 2022Publication date: May 2, 2024Inventors: Amos Zamir, Yair Allouche, Aviad Cohen, RAVID SAGY
-
Publication number: 20230216870Abstract: In some examples, a system for decorating network traffic flows with outlier scores includes a processor and a memory device to store traffic flows received from a network. The processor is configured to receive a set of traffic flows from the memory device and generate a tree model to split the traffic flows into clusters of traffic flows. Each cluster corresponds with a leaf of the tree model. The processor is further configured to generate machine learning models for each of the clusters of traffic flows separately. For a new traffic flow, the processor is configured to identify a specific one of the machine learning models that corresponds with the new traffic flow, compute an outlier score for the new traffic flow using the identified specific one of the machine learning models, and decorate the new traffic flow with the outlier score.Type: ApplicationFiled: December 31, 2021Publication date: July 6, 2023Inventors: Yair ALLOUCHE, Aviad COHEN, Ravid SAGY, Ofer Haim BILLER, Eitan Daniel FARCHI
-
Patent number: 11546366Abstract: Systems and methods provide a platform for threat information sharing. A method comprises transmitting an access permission request to a blockchain network. The request asks for access to cyber threat information stored in at least one cyber threat information storage system. The information may come from a plurality of organizations. The blockchain network may include a blockchain ledger storing access control information from the plurality of organizations. Upon receipt of a reference to an access permission token generated by the blockchain network using at least one smart contract, a transaction request to the cyber threat information server may be sent. In response to the transaction request including the reference to the access permission token, the requested cyber threat information may be retrieved from the cyber threat information server.Type: GrantFiled: May 8, 2019Date of Patent: January 3, 2023Assignee: International Business Machines CorporationInventors: Yair Allouche, Oded Margalit, Ravid Sagy, Tom Weiss
-
Patent number: 11403577Abstract: An example system includes a processor to monitor a user interface to generate activity logs including step-flows. The processor is to extract features and common variables from unstructured data in the activity logs and generate structured log events based on the extracted features and the common variables. The processor is to generate a workflow model based on the structured log events. The processor is to automate or assist workflow based on the generated workflow model.Type: GrantFiled: February 13, 2020Date of Patent: August 2, 2022Assignee: International Business Machines CorporationInventors: Oded Sofer, Oded Margalit, Yair Allouche
-
Publication number: 20210256433Abstract: An example system includes a processor to monitor a user interface to generate activity logs including step-flows. The processor is to extract features and common variables from unstructured data in the activity logs and generate structured log events based on the extracted features and the common variables. The processor is to generate a workflow model based on the structured log events. The processor is to automate or assist workflow based on the generated workflow model.Type: ApplicationFiled: February 13, 2020Publication date: August 19, 2021Inventors: Oded Sofer, Oded Margalit, Yair Allouche
-
Publication number: 20200358801Abstract: Embodiments of the present systems and methods may provide a platform for threat information sharing.Type: ApplicationFiled: May 8, 2019Publication date: November 12, 2020Inventors: Yair Allouche, Oded Margalit, Ravid Sagy, Tom Weiss
-
Patent number: 10652256Abstract: A vehicle system, comprising multiple electronic control units (ECUs) configured to manage operation of multiple vehicle components, a controller area network (CAN) bus that provides communication pathways between the multiple ECUs, and a threat validation module configured to receive a message from an electronic control unit (ECU) of the multiple ECUs, wherein the message comprises data of a suspicious message flagged by the ECU, generate a query to determine authenticity of the message, broadcast the query to at least one ECU of the multiple ECUs, listen for responses from the at least one ECU, and determine whether the suspicious message is an actual threat based at least on a count of received responses.Type: GrantFiled: June 20, 2017Date of Patent: May 12, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yair Allouche, Arndt Kohler, Ravid Sagy, Yaron Wolfsthal
-
Patent number: 10602360Abstract: A computerized method comprising, on a mobile computing device, processing a vehicle integration request made by one or more of (i) the mobile computing device and (ii) a transportation vehicle. The mobile computing device computes a risk assessment value that quantifies a security risk to the transportation vehicle as a result of connecting the mobile computing device to the transportation vehicle, where the computing is based on one or more of a hardware and a software of the mobile computing device. The mobile computing device transmits the risk assessment value to a vehicle computer integrated in the transportation vehicle. The mobile computing device completes a digital data connection with the vehicle computer when the risk assessment value complies with a vehicle access security policy of the vehicle computer.Type: GrantFiled: April 5, 2017Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: Yair Allouche, Oded Margalit
-
Patent number: 10572636Abstract: A method comprising using at least one hardware processor for receiving a plurality of media files captured in real-time by a sensor of a client terminal, wherein each of the plurality of media files comprises data captured from the environment surrounding the client terminal. The method comprises extracting a plurality of captured media fragments from the plurality of media files. The method comprises retrieving a plurality of random media fragments from a database. The method comprises sending the plurality of captured media fragments and the plurality of random media fragments to the client terminal or to a different client terminal, for presentation to a user in an arbitrary order. The method comprises receiving from the client terminal or the different client terminal a selection of the plurality of captured media fragments. The method comprises sending a user authentication to a secure server module based on the selection.Type: GrantFiled: June 1, 2017Date of Patent: February 25, 2020Assignee: International Business Machines CorporationInventors: Yair Allouche, David Asulin
-
Publication number: 20190182267Abstract: A system comprising: a software agent stored on a non-transient computer-readable storage medium in a motor vehicle, the software agent comprising instructions that cause a processor in the motor vehicle to: monitor, in real time (i) events occurring in an operating system of the motor vehicle and any application running thereon, (ii) messages transmitted by Electronic Control Units (ECUs) of the motor vehicle over an in-vehicle network of the motor vehicle, and (iii) network activity between the motor vehicle and external network resources; detect suspicious events, messages, and network activity, in the monitored events, messages, and network activity, respectively; repeatedly execute Stateful Event Processing (SEP) on a combination of the detected suspicious events, messages, and network activity; and infer potential computer security threats based on results of the SEP.Type: ApplicationFiled: December 13, 2017Publication date: June 13, 2019Inventors: Derek Aher, Yair Allouche, Jack Hanley, Patrick Hourigan, Ravid Sagy, Mauro Silva
-
Publication number: 20180367554Abstract: A vehicle system, comprising multiple electronic control units (ECUs) configured to manage operation of multiple vehicle components, a controller area network (CAN) bus that provides communication pathways between the multiple ECUs, and a threat validation module configured to receive a message from an electronic control unit (ECU) of the multiple ECUs, wherein the message comprises data of a suspicious message flagged by the ECU, generate a query to determine authenticity of the message, broadcast the query to at least one ECU of the multiple ECUs, listen for responses from the at least one ECU, and determine whether the suspicious message is an actual threat based at least on a count of received responses.Type: ApplicationFiled: June 20, 2017Publication date: December 20, 2018Inventors: YAIR ALLOUCHE, ARNDT KOHLER, RAVID SAGY, YARON WOLFSTHAL
-
Publication number: 20180349579Abstract: A method comprising using at least one hardware processor for receiving a plurality of media files captured in real-time by a sensor of a client terminal, wherein each of the plurality of media files comprises data captured from the environment surrounding the client terminal. The method comprises extracting a plurality of captured media fragments from the plurality of media files. The method comprises retrieving a plurality of random media fragments from a database. The method comprises sending the plurality of captured media fragments and the plurality of random media fragments to the client terminal or to a different client terminal, for presentation to a user in an arbitrary order. The method comprises receiving from the client terminal or the different client terminal a selection of the plurality of captured media fragments. The method comprises sending a user authentication to a secure server module based on the selection.Type: ApplicationFiled: June 1, 2017Publication date: December 6, 2018Inventors: Yair Allouche, David Asulin
-
Patent number: 10017155Abstract: Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle. The present invention may include collecting vehicle data from the vehicle. The present invention may also include collecting mobile device data from an authorized mobile device associated with an authorized operator. The present invention may then include comparing the collected vehicle data with the collected mobile device data. The present invention may further include determining that the collected vehicle data does not match the collected mobile device data. The present invention may include also sending an alert message to a security control application based on determining that the collected vehicle data does not match the collected mobile device data.Type: GrantFiled: February 21, 2017Date of Patent: July 10, 2018Assignee: International Business Machines CorporationInventors: Yair Allouche, Oded Margalit, Ravid Sagy
-
Patent number: 10011248Abstract: Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle. The present invention may include collecting vehicle data from the vehicle. The present invention may also include collecting mobile device data from an authorized mobile device associated with an authorized operator. The present invention may then include comparing the collected vehicle data with the collected mobile device data. The present invention may further include determining that the collected vehicle data does not match the collected mobile device data. The present invention may include also sending an alert message to a security control application based on determining that the collected vehicle data does not match the collected mobile device data.Type: GrantFiled: December 26, 2017Date of Patent: July 3, 2018Assignee: International Business Machines CorporationInventors: Yair Allouche, Oded Margalit, Ravid Sagy
-
Patent number: 9984512Abstract: A cooperative vehicle monitoring method including, at an intravehicular monitor configured with each of a plurality of vehicles, gathering any in-vehicle data associated with the vehicle, detecting any intravehicular anomaly associated with the vehicle by analyzing the in-vehicle data, and reporting intravehicular information including any of the detected intravehicular anomaly and the in-vehicle data, and, at an extravehicular monitor, detecting any anomaly by analyzing the reported intravehicular information in combination with extravehicular data that are external to the plurality of vehicles, and reporting any of the intravehicular information, the extravehicular data, and any anomaly detected at the extravehicular monitor.Type: GrantFiled: January 10, 2016Date of Patent: May 29, 2018Assignee: International Business Machines CorporationInventors: Yair Allouche, Yossi Gilad, Oded Margalit, Yaron Wolfsthal
-
Patent number: 9843597Abstract: Techniques for monitoring a controller area network bus are described herein. In one example, a system comprises a processor that is to detect a message from a source electronic control unit in a vehicle and calculate a location of the source electronic control unit based on at least two arrival times, the arrival times indicating a distance between a first monitor and the source electronic control unit. The processor can also detect that the message corresponds to a function controlled by a second electronic control unit and generate a warning that the message from the source electronic control unit is malicious.Type: GrantFiled: August 10, 2015Date of Patent: December 12, 2017Assignee: International Business Machines CorporationInventors: Yair Allouche, Yossi Gilad, Oded Margalit
-
Publication number: 20170200323Abstract: A cooperative vehicle monitoring method including, at an intravehicular monitor configured with each of a plurality of vehicles, gathering any in-vehicle data associated with the vehicle, detecting any intravehicular anomaly associated with the vehicle by analyzing the in-vehicle data, and reporting intravehicular information including any of the detected intravehicular anomaly and the in-vehicle data, and, at an extravehicular monitor, detecting any anomaly by analyzing the reported intravehicular information in combination with extravehicular data that are external to the plurality of vehicles, and reporting any of the intravehicular information, the extravehicular data, and any anomaly detected at the extravehicular monitor.Type: ApplicationFiled: January 10, 2016Publication date: July 13, 2017Inventors: YAIR ALLOUCHE, YOSSI GILAD, ODED MARGALIT, YARON WOLFSTHAL