Patents by Inventor ADITYA CHOUDHARY

ADITYA CHOUDHARY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240163307
    Abstract: A method of evaluating alerts generated by security agents installed in endpoints includes: receiving a locality-sensitive hash (LSH) value associated with an alert generated by a security agent installed in one of the endpoints; performing a search for centroids that are within a threshold distance from the received LSH value, wherein the centroids are each an LSH value that is representative of one of a plurality of groups of alerts; and assigning a security risk indicator to the alert associated with the received LSH value based on results of the search and transmitting the security risk indicator to a security analytics platform of the endpoints.
    Type: Application
    Filed: November 15, 2022
    Publication date: May 16, 2024
    Inventors: Aditya CHOUDHARY, Jonathan James OLIVER, Ritika SINGHAL, Shugao XIA, Raghav BATTA, Amit CHOPRA
  • Publication number: 20240152622
    Abstract: A method of scoring alerts generated by a plurality of endpoints includes the steps of: in response to a new alert generated by a first endpoint of the plurality of endpoints, generating an anomaly score of the new alert; identifying a rule that triggered the new alert and determining a threat score associated with the rule; and generating a security risk score for the new alert based on the anomaly score and the threat score and transmitting the security risk score to a security analytics platform of the endpoints.
    Type: Application
    Filed: November 9, 2022
    Publication date: May 9, 2024
    Inventors: Shugao XIA, Ritika SINGHAL, Jonathan James OLIVER, Raghav BATTA, Jue MO, Aditya CHOUDHARY
  • Publication number: 20240143746
    Abstract: Systems and methods are described for employing event context to improve threat detection. Systems and methods of embodiments of the disclosure measure both process deviation and path deviation to determine whether processes are benign or represent threats. Both a process deviation model and a path deviation model are deployed. The process deviation model determines the similarity of a process to past processes, and the path deviation model estimates whether processes have been called out of turn. In this manner, systems and methods of embodiments of the disclosure are able to detect both whether a process is in itself unusual, and whether it is called at an unusual time. This added context contributes to improved threat detection.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Applicant: VMware LLC
    Inventors: Raghav BATTA, Amit CHOPRA, Aditya CHOUDHARY, Lalit Prithviraj JAIN, Anjali MANGAL, Jonathan James OLIVER
  • Patent number: 10536359
    Abstract: Techniques for optimized performance data collection at client nodes are disclosed. In one embodiment, a client node in a client-server environment may include at least one processing resource and a computer-readable storage medium having computer-readable program code embodied therewith. The computer-readable program code being configured to obtain resource utilization data associated with a plurality of processes running on the client node, determine a list of processes having resource utilization greater than a threshold based on the resource utilization data, organize the list of processes based on predetermined criteria and the resource utilization data, generate a report including a predefined number of processes from the organized list, and transmit the report to a management node for performance monitoring.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: January 14, 2020
    Assignee: VMWARE, INC.
    Inventors: Srinivas Kandula, Padmini Sampige Thirumalachar, Gangadharaswamy Hindiskere Umapathi, Aditya Choudhary
  • Publication number: 20190312801
    Abstract: Techniques for optimized performance data collection at client nodes are disclosed. In one embodiment, a client node in a client-server environment may include at least one processing resource and a computer-readable storage medium having computer-readable program code embodied therewith. The computer-readable program code being configured to obtain resource utilization data associated with a plurality of processes running on the client node, determine a list of processes having resource utilization greater than a threshold based on the resource utilization data, organize the list of processes based on predetermined criteria and the resource utilization data, generate a report including a predefined number of processes from the organized list, and transmit the report to a management node for performance monitoring.
    Type: Application
    Filed: April 10, 2018
    Publication date: October 10, 2019
    Inventors: SRINIVAS KANDULA, PADMINI SAMPIGE THIRUMALACHAR, GANGADHARASWAMY HINDISKERE UMAPATHI, ADITYA CHOUDHARY