Patents by Inventor Avi Chesla

Avi Chesla has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230328095
    Abstract: A computing system identifies an evidence set associated with a detected cybersecurity attack. The evidence set includes logs representing security alerts associated with the detected cybersecurity attack. The computing system analyzes the evidence set to predict actions taken by a malicious actor, the actions comprising historical actions and future actions. The computing system analyzes the predicted actions to classify the historical actions and future actions taken by the malicious actor. The computing system generates a query for analyzing the evidence set based on the classified historical actions and future actions.
    Type: Application
    Filed: March 31, 2023
    Publication date: October 12, 2023
    Applicant: Cybereason Inc.
    Inventors: Avi Chesla, Elan Pavlov
  • Publication number: 20230319088
    Abstract: Disclosed is a computer-implemented method for correlating user information can include receiving, from a user device, a login log associated with a user; receiving an intrusion detection system (IDS) log; receiving a domain name system (DNS) log; receiving, from a computing device, a log; enriching at least one of the login log, the IDS log, or the DNS log; and correlating an identity with one or more of the login log, the IDS log, and the DNS log. In some embodiments, correlating the identity with one or more of the login log, the IDS log, and the DNS log can include generating a graph representation and saving the graph representation as a sparse graph representation.
    Type: Application
    Filed: March 31, 2023
    Publication date: October 5, 2023
    Applicant: Cybereason Inc.
    Inventors: Avi Chesla, Sivan Omer
  • Publication number: 20230319089
    Abstract: A method for predicting a future stage of an attack on a computer system. The method comprises performing, by the computer system, linguistic analysis on threat intelligence reports, where the threat intelligence reports comprise known stages of the attack. The method also comprises processing, by the computer system, the linguistic analysis with a transition matrix to determine probabilities of cause-and-effect relationships between the known stages of the attack, updating, by the computer system, a probability model based on the probabilities determined by the transition matrix, and predicting, by the computer system, the future stage of the attack based on the probability model and attack classifications.
    Type: Application
    Filed: March 31, 2023
    Publication date: October 5, 2023
    Applicant: Cybereason Inc.
    Inventors: Avi Chesla, Sergei Edelstein
  • Publication number: 20230057632
    Abstract: A system and method for optimizing a defense model using available security capabilities are provided. The method includes obtaining a defense model and an optimal security application implementation associated with the defense model; evaluating available security capabilities deployed in an enterprise environment to determine a plurality of variant security applications implementing the defense model; determining a quality score for each of the plurality of the variant security applications; selecting, from the plurality of variant security applications, a variant security application having a highest quality score; and executing the selected variant security application.
    Type: Application
    Filed: October 19, 2022
    Publication date: February 23, 2023
    Applicant: Cybereason Inc.
    Inventors: Rami COHEN, Avi CHESLA
  • Patent number: 11509692
    Abstract: A system and method for optimizing a defense model using available security capabilities are provided. The method includes obtaining a defense model and an optimal security application implementation associated with the defense model; evaluating available security capabilities deployed in an enterprise environment to determine a plurality of variant security applications implementing the defense model; determining a quality score for each of the plurality of the variant security applications; selecting, from the plurality of variant security applications, a variant security application having a highest quality score; and executing the selected variant security application.
    Type: Grant
    Filed: June 27, 2018
    Date of Patent: November 22, 2022
    Assignee: Cybereason Inc.
    Inventors: Rami Cohen, Avi Chesla
  • Patent number: 11444969
    Abstract: A method and system for scoring performance of a security product are provided. The method includes receiving security product performance data of the security product configured to handle a specific cyber threat; classifying the performance data into a product profile associated with the security product; computing at least one security product performance score for the product profile based on the classified product security performance data; and associating the at least one security performance score with the product profile. In an embodiment, the method also includes selecting the at least one security product from a plurality of security products based on their respective performance scores for the respective cyber threat.
    Type: Grant
    Filed: June 23, 2020
    Date of Patent: September 13, 2022
    Assignee: Cybereason Inc.
    Inventor: Avi Chesla
  • Publication number: 20220147622
    Abstract: Systems and methods are provided for making predictions relating to the attack sequence of an attacker or other malicious entity.
    Type: Application
    Filed: November 10, 2021
    Publication date: May 12, 2022
    Applicant: Cybereason Inc.
    Inventor: Avi CHESLA
  • Patent number: 11228610
    Abstract: A method and system for classification of cyber-threats is provided. The method includes receiving a request for classifying a cyber-threat detected by a cyber-security system, wherein the request includes initial information about the detected cyber-threat; enriching the initial information about the detected cyber-threat to provide textual information about at least one perceived threat related to the detected cyber-threat; and classifying each of the at least one perceived threat into a security service, wherein the classification is performed based on the respective textual information.
    Type: Grant
    Filed: August 14, 2018
    Date of Patent: January 18, 2022
    Assignee: Cybereason Inc.
    Inventors: Shlomi Medalion, Rami Cohen, Ron Katz, Idan Bellayev, Avi Chesla
  • Patent number: 11115437
    Abstract: A method and system for adaptively securing a protected entity against a potential advanced persistent threat (APT) are provided. The method includes probing a plurality of resources in a network prone to be exploited by an APT attacker; operating at least one security service configured to output signals indicative of APT related activity of each of the plurality of probed resources; generating at least one security event respective of the output signals; determining if the at least one security event satisfies at least one workflow rule; and upon determining that the at least one security event satisfies the at least one workflow rule, generating at least one action with respect to the potential APT attack.
    Type: Grant
    Filed: July 15, 2015
    Date of Patent: September 7, 2021
    Assignee: Cybereason Inc.
    Inventor: Avi Chesla
  • Publication number: 20200322371
    Abstract: A method and system for scoring performance of a security product are provided. The method includes receiving security product performance data of the security product configured to handle a specific cyber threat; classifying the performance data into a product profile associated with the security product; computing at least one security product performance score for the product profile based on the classified product security performance data; and associating the at least one security performance score with the product profile. In an embodiment, the method also includes selecting the at least one security product from a plurality of security products based on their respective performance scores for the respective cyber threat.
    Type: Application
    Filed: June 23, 2020
    Publication date: October 8, 2020
    Applicant: Empow Cyber Security Ltd.
    Inventor: Avi CHESLA
  • Patent number: 10673903
    Abstract: A system and method for method for generating a security rule classification model comprises receiving at least one security rule from at least one attack database of a first security product of a plurality of different security products; normalizing each of the at least one security rule; generating a vector for each of the least one normalized security rule; classifying each generated vector to a security engine within a security service using a classification sub-model to generate a preliminary classification model, wherein the classification sub-model is provided from previous classification of security rules for a security product of the plurality of different security products that is different than the first security product; determining a score for the preliminary classification model; and validating the preliminary classification model as the security rule classification model, when the score is over a predefined threshold.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: June 2, 2020
    Assignee: Empow Cyber Security Ltd.
    Inventors: Avi Chesla, Shlomi Medalion
  • Publication number: 20200162496
    Abstract: A method and system for classification of cyber-threats is provided. The method includes receiving a request for classifying a cyber-threat detected by a cyber-security system, wherein the request includes initial information about the detected cyber-threat; enriching the initial information about the detected cyber-threat to provide textual information about at least one perceived threat related to the detected cyber-threat; and classifying each of the at least one perceived threat into a security service, wherein the classification is performed based on the respective textual information.
    Type: Application
    Filed: August 14, 2018
    Publication date: May 21, 2020
    Applicant: Empow Cyber Security Ltd.
    Inventors: Shlomi MEDALION, Rami COHEN, Ron KATZ, Idan BELLAYEV, Avi CHESLA
  • Patent number: 10601853
    Abstract: A system and method for generating policies for investigating cyber-security attacks are provided. The method includes selecting at least one entity of interest (EoI); determining at least one detection event associated with the at least one EoI; processing the at least one detection event to create a plurality of investigation rules, wherein each of the plurality of investigation rules includes a set of filters utilized to identify malicious activity related the at least one EoI; and defining an investigation policy for the EoI, wherein the defined investigation policy includes the plurality of investigation rules.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: March 24, 2020
    Assignee: Empow Cyber Security Ltd.
    Inventor: Avi Chesla
  • Patent number: 10505953
    Abstract: A cyber-security system and method for proactively predicting cyber-security threats are provided. The method comprises receiving a plurality of security events classified to different groups of events; correlating the plurality of received security events to classify potential cyber-security threats to a set of correlation types; determining a correlation score for each classified potential cyber-security threat; and determining a prediction score for each classified potential cyber-security threat, wherein the prediction score is determined based in part on the correlation score.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: December 10, 2019
    Assignee: Empow Cyber Security Ltd.
    Inventors: Rami Cohen, Avi Chesla, Shlomi Medalion, Ron Katz
  • Patent number: 10374918
    Abstract: A method and system for configuring a behavioral network intelligence system using a network monitoring programming language are provided. The method includes defining at least one target of a traffic segment to be monitored using at least one application path attribute of an application, wherein the application is accessed via at least one user device connected to a network, wherein the at least one application path attribute is defined respective of an application path keyword and an application path assessment keyword; and defining at least one condition representing the behavior of the at least one application path attribute of the application, the at least one target and the at least one condition can be interpreted by a monitoring system to allow for determining a behavioral impact of the application on the network.
    Type: Grant
    Filed: December 4, 2014
    Date of Patent: August 6, 2019
    Assignee: Radware, Ltd.
    Inventors: Lev Medvedovsky, David Aviv, Avi Chesla
  • Patent number: 10355949
    Abstract: A method and system for determining the behavioral impact of applications and their respective users on a network carrier are provided. The method includes receiving data collected by at least one deep packet inspection (DPI) engine; classifying the received data at least per an application path respective of each of the applications; generating an application path profile data structure using the collected data; and generating, responsive to at least one behavioral rule, at least one degree of fulfillment (DoF) for the application path based on contents of the application path profile data structure, wherein the at least DoF defines an association of the application path with at least one behavior group, wherein the behavior group determines the behavioral impact of an application represented by the application path.
    Type: Grant
    Filed: December 4, 2014
    Date of Patent: July 16, 2019
    Assignee: RADWARE, LTD.
    Inventors: Avi Chesla, David Aviv, Lev Medvedovsky
  • Publication number: 20190081986
    Abstract: A system and method for classifying security rules of a plurality of different security products into a security decision engine in a service. The method comprises receiving at least one security rule from at least one attack database of a security product of the plurality of different security products; normalizing each of the at least one security rule; generating a vector for each of the least one normalized security rule, wherein each vector is generated based on a set of terms indicative of a cyber-solution; mapping each of the generated vector to a security service, wherein the security service represents a cyber-solution category, wherein the mapping is performed using a classification model; and associating each of the respective security rule with the security service, when an evaluation threshold is met.
    Type: Application
    Filed: November 2, 2018
    Publication date: March 14, 2019
    Applicant: Empow Cyber Security Ltd.
    Inventors: Avi CHESLA, Shlomi MEDALION
  • Patent number: 10193919
    Abstract: A method and system for cyber threat risk-chain generation are provided. The method includes obtaining a plurality of events; mapping each event of the plurality of obtained events to a global threat type, wherein each global threat type is associated with a risk-chain group; correlating among the mapped plurality of events to determine at least a transition between one global threat type to another; and updating a data structure maintaining data of at least one risk-chain, when the transition is determined, wherein the at least one risk-chain is a lifecycle of a cyber-attack.
    Type: Grant
    Filed: August 17, 2016
    Date of Patent: January 29, 2019
    Assignee: Empow Cyber Security, Ltd
    Inventor: Avi Chesla
  • Publication number: 20190020686
    Abstract: A system and method for optimizing a defense model using available security capabilities are provided. The method includes obtaining a defense model and an optimal security application implementation associated with the defense model; evaluating available security capabilities deployed in an enterprise environment to determine a plurality of variant security applications implementing the defense model; determining a quality score for each of the plurality of the variant security applications; selecting, from the plurality of variant security applications, a variant security application having a highest quality score; and executing the selected variant security application.
    Type: Application
    Filed: June 27, 2018
    Publication date: January 17, 2019
    Applicant: Empow Cyber Security Ltd.
    Inventors: Rami COHEN, Avi CHESLA
  • Patent number: 10122762
    Abstract: A system and method for classifying security rules of a plurality of different security products into a security decision engine in a service. The method comprises receiving at least one security rule from at least one attack database of a security product of the plurality of different security products; normalizing each of the at least one security rule; generating a vector for each of the least one normalized security rule, wherein each vector is generated based on a set of terms indicative of a cyber-solution; mapping each of the generated vector to a security service, wherein the security service represents a cyber-solution category, wherein the mapping is performed using a classification model; and associating each of the respective security rule with the security service, when an evaluation threshold is met.
    Type: Grant
    Filed: June 15, 2016
    Date of Patent: November 6, 2018
    Assignee: Empow Cyber Security Ltd.
    Inventors: Avi Chesla, Shlomi Medalion