Patents Assigned to WithSecure Corporation
-
Patent number: 11811803Abstract: There is provided a method comprising: detecting a new process start at a network node of a computer network; determining that said process requires external code modules; observing the times at which one or more external code modules required by the new process are loaded relative to the process starting time; determining that the usage of an external code module required by the new process is anomalous when the time elapsed between the start of the process and loading of said external code module lies outside predetermined expected boundaries; and taking further action to protect the network node and/or the computer network based on determining that the usage of the external code module required by the detected new process is anomalous.Type: GrantFiled: November 10, 2020Date of Patent: November 7, 2023Assignee: WITHSECURE CORPORATIONInventors: Paolo Palumbo, Dmitriy Komashinskiy
-
Patent number: 11811788Abstract: A method comprising: receiving raw data related to one or more network nodes, wherein dissimilar data types are aligned as input events; filtering one or more of the input events by using an adjustable threshold that is based on a filtering score, wherein the filtering score is an estimate of the likelihood that the input event is followed by a security related detection; processing only input events passed through the filtering by an enrichment process; and analysing the data received from the enrichment process for generating a security related decision.Type: GrantFiled: March 6, 2020Date of Patent: November 7, 2023Assignee: WITHSECURE CORPORATIONInventor: Matti Aksela
-
Patent number: 11647029Abstract: A method of probing and responding to a security breach in a computer network security system includes defining first and second rules and defining a model to output a probability that a security breach has occurred based on an input and to generate commands. Data is collected at first nodes according to the first rules and a first portion of the collected data is selected and sent from the first nodes to a second node. The selected first portion is input into the model to obtain an output probability that a security breach has occurred and the following steps are performed: determining signs of a security breach, generating a first command with the model to cause a second portion of the collected data to be selected, and generating a second command with the model to cause a change in settings at one or more of the first nodes.Type: GrantFiled: December 7, 2018Date of Patent: May 9, 2023Assignee: Withsecure CorporationInventors: Paolo Palumbo, Dmitry Komashinskiy, Szymon Grzybowski
-
Patent number: 11606368Abstract: A method including: establishing an internal swarm intelligence network including security agent modules of a plurality of interconnected network nodes of a local computer network, collecting data related to the respective network nodes, sharing information based on the collected data in the established internal swarm intelligence network, and using the collected data and information received from the internal swarm intelligence network for generating and adapting models related to the respective network node nodes. In case a new threat is identified, the threat is verified and contained, a new threat model is generated and the generated new threat model is shared. The security alert and/or the generated new threat model is transmitted to a security service network for enabling the security service network to share the received security alert and/or the new threat model.Type: GrantFiled: November 11, 2019Date of Patent: March 14, 2023Assignee: Withsecure CorporationInventors: Matti Aksela, Mika Stahlberg
-
Patent number: 11575633Abstract: A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.Type: GrantFiled: February 13, 2020Date of Patent: February 7, 2023Assignee: WithSecure CorporationInventor: Heikki Hannikainen
-
Patent number: 11528286Abstract: A method for monitoring a directory environment of a computer network to detect vulnerabilities. The method comprises, at a first computer on the computer network, changing a configuration of the directory environment and, with a replication service, replicating the change at a second computer on the computer network. The method further comprises extracting information relating to the change from the replication service and using the extracted information to detect a vulnerability in the directory environment.Type: GrantFiled: May 13, 2020Date of Patent: December 13, 2022Assignee: WITHSECURE CORPORATIONInventors: Jacques Louw, Keith Kirton
-
Patent number: 11457020Abstract: There is provided a method comprising: generating and sharing an initial value of an integrity token between an endpoint node and a security backend computer, collecting data at the endpoint node, wherein dissimilar data types are aligned as input events, generating a new integrity token every time a new input event is written to a local repository of the endpoint node, wherein the new integrity token is generated based on the new input event and a prior integrity token that was generated prior to the new integrity token, removing the prior integrity token generated prior to the new integrity token from the endpoint node each time a new integrity token has been generated, and sending one or more input events with the new integrity token to the security backend computer for enabling the security backend computer checking integrity of the data received from the endpoint.Type: GrantFiled: May 19, 2020Date of Patent: September 27, 2022Assignee: WITHSECURE CORPORATIONInventors: Paolo Palumbo, Alexey Kirichenko, Valtteri Niemi, Sara Ramezanian, Tommi Meskanen
-
Patent number: 11451584Abstract: A method of protecting a computer system against remote exploitation attacks performed over a network to which the computer system is connected. The method includes: a) identifying a network connection that is not associated with a successful authentication and which carries a traffic level in excess of a predefined threshold; b) reporting the identified network connection as a real or potential remote exploitation attack; and c) taking an action or actions to mitigate against the real or potential remote exploitation attack.Type: GrantFiled: May 31, 2019Date of Patent: September 20, 2022Assignee: Withsecure CorporationInventor: Mikko Suominen
-
Patent number: 11449610Abstract: There is provided a method of detecting a threat against a computer system. The method includes monitoring installation and operation of multiple different versions of the same application in a computer system; analysing evolutionary changes between the behaviours of the different versions of the same application; detecting and monitoring a new version of the same application in a computer system; monitoring the behavior of the computer system to detect one or more procedures of the monitored application that do not match expected behaviors of the monitored application on the basis of the analysis; and upon detection of one or more procedures not matching the expected behaviors of the monitored application, identifying the monitored application as malicious or suspicious.Type: GrantFiled: March 18, 2019Date of Patent: September 20, 2022Assignee: Withsecure CorporationInventors: Mikko Suominen, Dmitriy Komashinskiy, Fredrik Kock
-
Patent number: 11436326Abstract: A method of scanning files for malware on a computer system. The method comprises detecting a file to be scanned for malware in the computer system, determining the file being a partial file that comprises only a part of the file content, searching for an original clean file associated with the partial file, wherein the original clean file is a full copy of the partial file, based on finding a candidate original clean file associated with the partial file, calculating a partial hash of the same length as the partial file for the candidate original clean file, and based on determining that partial hashes of the candidate original clean file and the partial file match, signalling a false alarm.Type: GrantFiled: June 11, 2020Date of Patent: September 6, 2022Assignee: WithSecure CorporationInventor: Jarno Niemelä