Patents by Inventor Abedelaziz Mohaisen
Abedelaziz Mohaisen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11824829Abstract: Systems, devices and methods for a Domain Name Data Networking (DNDN) content delivery system are disclosed. Embodiments perform operations including obtaining a content object having a unique identifier. The operations also include storing a local instance of the content object in association with DNS resource records and the unique identifier. The operations further include providing the local instance of the content to a client in response to receiving a request from the client including the unique identifier.Type: GrantFiled: August 5, 2022Date of Patent: November 21, 2023Assignee: VeriSign, Inc.Inventors: Eric Osterweil, G. Craig Murray, Abedelaziz Mohaisen, Danny McPherson
-
Patent number: 11595398Abstract: The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.Type: GrantFiled: January 4, 2021Date of Patent: February 28, 2023Assignee: VeriSign, Inc.Inventors: Abedelaziz Mohaisen, Maliheh Shirvanian, G. Craig Murray
-
Publication number: 20220377050Abstract: Systems, devices and methods for a Domain Name Data Networking (DNDN) content delivery system are disclosed. Embodiments perform operations including obtaining a content object having a unique identifier. The operations also include storing a local instance of the content object in association with DNS resource records and the unique identifier. The operations further include providing the local instance of the content to a client in response to receiving a request from the client including the unique identifier.Type: ApplicationFiled: August 5, 2022Publication date: November 24, 2022Applicant: VeriSign, Inc.Inventors: Eric OSTERWEIL, G. Craig MURRAY, Abedelaziz MOHAISEN, Danny MCPHERSON
-
Patent number: 11411912Abstract: Systems, devices and methods for a Domain Name Data Networking (DNDN) content delivery system are disclosed. Embodiments perform operations including obtaining a content object having a unique identifier. The operations also include storing a local instance of the content object in association with DNS resource records and the unique identifier. The operations further include providing the local instance of the content to a client in response to receiving a request from the client including the unique identifier.Type: GrantFiled: May 5, 2016Date of Patent: August 9, 2022Assignee: VeriSign, Inc.Inventors: Eric Osterweil, G. Craig Murray, Abedelaziz Mohaisen, Danny McPherson
-
Patent number: 10887314Abstract: The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.Type: GrantFiled: September 29, 2015Date of Patent: January 5, 2021Assignee: VERISIGN, INC.Inventors: Abedelaziz Mohaisen, Maliheh Shirvanian, G. Craig Murray
-
Patent number: 10171415Abstract: Embodiments relate to systems, devices, and computer-implemented methods for characterizing domain names by determining a name server switching footprint for domain names using a data set corresponding to name server operations for the domain names. The domain names can be clustered into groups based on the name server switching footprints, and intended uses of domain names in a group can be extrapolated to other domain names in the group. Name server switching footprints can also be predicted for new domains names using a prediction model trained using the determined name server switching footprints for the domain names in the data set.Type: GrantFiled: October 9, 2014Date of Patent: January 1, 2019Assignee: VERISIGN, INC.Inventors: Md Mansurul Alam Bhuiyan, Yannis Labrou, Abedelaziz Mohaisen
-
Patent number: 10038706Abstract: Embodiments relate to systems, devices, and computing-implemented methods for separating malware and background events to classify malware based on traffic data by receiving the traffic data that includes malware events and background noise, converting the traffic data into a feature vector, performing a signal processing algorithm on the feature vector to separate the malware events from the background noise, where the signal processing algorithm is associated with a malware family, determining a score for the malware events using a malware classification algorithm associated with the malware family, and applying a label associated with the malware family to the traffic data based on the score to classify the traffic data. Additionally, the malware application can be contained, removed, and/or the effects of a malware application can be neutralized based on the classification.Type: GrantFiled: October 26, 2015Date of Patent: July 31, 2018Assignee: VERISIGN, INC.Inventors: Hesham Mekky, Abedelaziz Mohaisen
-
Publication number: 20180007159Abstract: Embodiments relate to systems, devices, and computer-implemented methods for preventing determination of previous access of sensitive content by receiving, from a user, a request for content at a device in an information centric network, where a cached version of the content is locally stored at the device; initiating a time delay based on a determination that the user has not previously requested the content; and transmitting the cached version of the content to the user after the time delay.Type: ApplicationFiled: February 20, 2017Publication date: January 4, 2018Inventor: Abedelaziz Mohaisen
-
Patent number: 9779238Abstract: The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize temporally-ordered network behavioral artifacts together with machine learning techniques to perform the classification. Because they rely on network behavioral artifacts, the disclosed techniques may be applied to executable files with obfuscated code.Type: GrantFiled: November 8, 2016Date of Patent: October 3, 2017Assignee: VERISIGN, INC.Inventors: Allison Mankin, Abedelaziz Mohaisen, Trevor Tonn
-
Publication number: 20170093752Abstract: The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.Type: ApplicationFiled: September 29, 2015Publication date: March 30, 2017Inventors: Abedelaziz Mohaisen, Maliheh Shirvanian, G. Craig Murray
-
Publication number: 20170053119Abstract: The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize temporally-ordered network behavioral artifacts together with machine learning techniques to perform the classification. Because they rely on network behavioral artifacts, the disclosed techniques may be applied to executable files with obfuscated code.Type: ApplicationFiled: November 8, 2016Publication date: February 23, 2017Inventors: Allison MANKIN, Abedelaziz MOHAISEN, Trevor TONN
-
Patent number: 9578125Abstract: Embodiments relate to systems, devices, and computer-implemented methods for preventing determination of previous access of sensitive content by receiving, from a user, a request for content at a device in an information centric network, where a cached version of the content is locally stored at the device; initiating a time delay based on a determination that the user has not previously requested the content; and transmitting the cached version of the content to the user after the time delay.Type: GrantFiled: May 5, 2014Date of Patent: February 21, 2017Assignee: Verisign, Inc.Inventor: Abedelaziz Mohaisen
-
Publication number: 20170019371Abstract: Systems, devices and methods for a Domain Name Data Networking (DNDN) content delivery system are disclosed. Embodiments perform operations including obtaining a content object having a unique identifier. The operations also include storing a local instance of the content object in association with DNS resource records and the unique identifier. The operations further include providing the local instance of the content to a client in response to receiving a request from the client including the unique identifier.Type: ApplicationFiled: May 5, 2016Publication date: January 19, 2017Inventors: Eric Osterweil, G. Craig Murray, Abedelaziz Mohaisen, Danny McPherson
-
Patent number: 9489514Abstract: The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize temporally-ordered network behavioral artifacts together with machine learning techniques to perform the classification. Because they rely on network behavioral artifacts, the disclosed techniques may be applied to executable files with obfuscated code.Type: GrantFiled: October 6, 2014Date of Patent: November 8, 2016Assignee: VERISIGN, INC.Inventors: Allison Mankin, Abedelaziz Mohaisen, Trevor Tonn
-
Publication number: 20160127397Abstract: Embodiments relate to systems, devices, and computing-implemented methods for separating malware and background events to classify malware based on traffic data by receiving the traffic data that includes malware events and background noise, converting the traffic data into a feature vector, performing a signal processing algorithm on the feature vector to separate the malware events from the background noise, where the signal processing algorithm is associated with a malware family, determining a score for the malware events using a malware classification algorithm associated with the malware family, and applying a label associated with the malware family to the traffic data based on the score to classify the traffic data. Additionally, the malware application can be contained, removed, and/or the effects of a malware application can be neutralized based on the classification.Type: ApplicationFiled: October 26, 2015Publication date: May 5, 2016Inventors: Hesham Mekky, Abedelaziz Mohaisen
-
Publication number: 20150106931Abstract: The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize temporally-ordered network behavioral artifacts together with machine learning techniques to perform the classification. Because they rely on network behavioral artifacts, the disclosed techniques may be applied to executable files with obfuscated code.Type: ApplicationFiled: October 6, 2014Publication date: April 16, 2015Inventors: Allison Mankin, Abedelaziz Mohaisen, Trevor Tonn
-
Publication number: 20150106494Abstract: Embodiments relate to systems, devices, and computer-implemented methods for characterizing domain names by determining a name server switching footprint for domain names using a data set corresponding to name server operations for the domain names. The domain names can be clustered into groups based on the name server switching footprints, and intended uses of domain names in a group can be extrapolated to other domain names in the group. Name server switching footprints can also be predicted for new domains names using a prediction model trained using the determined name server switching footprints for the domain names in the data set.Type: ApplicationFiled: October 9, 2014Publication date: April 16, 2015Inventors: Md Mansural Alam Bhuiyan, Yannis Labrou, Abedelaziz Mohaisen
-
Publication number: 20140337460Abstract: Embodiments relate to systems, devices, and computer-implemented methods for preventing determination of previous access of sensitive content by receiving, from a user, a request for content at a device in an information centric network, where a cached version of the content is locally stored at the device; initiating a time delay based on a determination that the user has not previously requested the content; and transmitting the cached version of the content to the user after the time delay.Type: ApplicationFiled: May 5, 2014Publication date: November 13, 2014Applicant: VERISIGN, INC.Inventor: Abedelaziz Mohaisen
-
Patent number: 8745696Abstract: There are provided an apparatus and a method for privacy protection in association rule mining among data mining technologies. An apparatus for privacy protection in association rule mining according to an embodiment of the present invention comprises: a fake transaction inserter that generates fake transactions of a predetermined number each having a predetermined length and inserts the fake transactions between a plurality of transactions comprised in an original data set to generate a first virtual data set; and a distortion transaction generator that generates a second virtual data set by converting data of the transaction of the first virtual data set with a predetermined probability.Type: GrantFiled: December 15, 2010Date of Patent: June 3, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Nam-Su Jho, Abedelaziz Mohaisen, Do-Won Hong
-
Patent number: 8112386Abstract: The present invention includes a rotation based transformation method for preserving data privacy. A rotation based transformation method according to an embodiment of the present invention divides a given data set into a plurality of data subsets, applies a plurality of different rotation matrixes to the plurality of divided data subsets, respectively, to rotate the plurality of data subsets, and re-concatenates the plurality of rotated data subsets to generate a rotated data set. The rotated data set is released and used for data clustering. The rotation based transformation method is effectively used when the impact of the AK-ICA attack is mitigated. Meanwhile, when the two parties are related to the present invention, the two parties need to agree on parameters, such as the number of data subsets. It is preferable that the data subsets be divided into equal sizes.Type: GrantFiled: October 7, 2009Date of Patent: February 7, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Abedelaziz Mohaisen, Dowon Hong