Patents by Inventor Brody Nisbet

Brody Nisbet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11392689
    Abstract: Event vectors can be determined for respective events based on respective command-line records and a trained representation mapping. Respective coordinate vectors can be determined, each having fewer elements than the respective event vector. Respective representations of at least some of the events can be presented via an electronic display at the respective coordinate vectors. A selection of a first representation can be received via a user interface. The events can be clustered based on the event vectors. A first cluster can be selected based on the selection. An indication of a tag can be received via the user interface. Each event of the first cluster can be associated with the tag. Some examples include transmitting a security command to cause a monitored computing device associated with an event in the first cluster to perform a mitigation action.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: July 19, 2022
    Assignee: CrowdStrike, Inc.
    Inventors: Cory-Khoi Quang Nguyen, Jaron Michael Bradley, John Lee, Brody Nisbet
  • Patent number: 11258805
    Abstract: An event can be associated with a monitored computing device and a command-line record. An event vector can be determined for each of a plurality of events based at least in part on at least a portion of the respective command-line record and on a trained representation mapping. A respective reduced event vector can be determined having fewer elements. The reduced event vectors can be clustered to determine cluster identifiers. A first event can be determined to be associated with a security violation based on a corresponding cluster identifier matching a cluster identifier of a second event that is associated with a security violation. In some examples, a cluster can include a relatively larger first group of events and a relatively smaller second group of events. That cluster can be determined to satisfy a criterion based on the numbers of events in at least one of the groups.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: February 22, 2022
    Assignee: CrowdStrike, Inc.
    Inventors: Cory-Khoi Quang Nguyen, Jaron Michael Bradley, John Lee, Brody Nisbet
  • Patent number: 11050764
    Abstract: Cardinality-based activity pattern detection is described herein. Events on a computing system are monitored to detect patterns matching defined activity patterns. A cardinality-based activity pattern query is executed over data representing detected activity patterns to identify multiple, distinct defined activity patterns that have occurred during a particular time period.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: June 29, 2021
    Assignee: CrowdStrike, Inc.
    Inventors: Brody Nisbet, Andrew Roden, John Lee
  • Publication number: 20200314117
    Abstract: An event can be associated with a monitored computing device and a command-line record. An event vector can be determined for each of a plurality of events based at least in part on at least a portion of the respective command-line record and on a trained representation mapping. A respective reduced event vector can be determined having fewer elements. The reduced event vectors can be clustered to determine cluster identifiers. A first event can be determined to be associated with a security violation based on a corresponding cluster identifier matching a cluster identifier of a second event that is associated with a security violation. In some examples, a cluster can include a relatively larger first group of events and a relatively smaller second group of events. That cluster can be determined to satisfy a criterion based on the numbers of events in at least one of the groups.
    Type: Application
    Filed: March 28, 2019
    Publication date: October 1, 2020
    Inventors: Cory-Khoi Quang Nguyen, Jaron Michael Bradley, John Lee, Brody Nisbet
  • Publication number: 20200311262
    Abstract: Event vectors can be determined for respective events based on respective command-line records and a trained representation mapping. Respective coordinate vectors can be determined, each having fewer elements than the respective event vector. Respective representations of at least some of the events can be presented via an electronic display at the respective coordinate vectors. A selection of a first representation can be received via a user interface. The events can be clustered based on the event vectors. A first cluster can be selected based on the selection. An indication of a tag can be received via the user interface. Each event of the first cluster can be associated with the tag. Some examples include transmitting a security command to cause a monitored computing device associated with an event in the first cluster to perform a mitigation action.
    Type: Application
    Filed: March 28, 2019
    Publication date: October 1, 2020
    Inventors: Cory-Khoi Quang Nguyen, Jaron Michael Bradley, John Lee, Brody Nisbet
  • Publication number: 20190268355
    Abstract: Cardinality-based activity pattern detection is described herein. Events on a computing system are monitored to detect patterns matching defined activity patterns. A cardinality-based activity pattern query is executed over data representing detected activity patterns to identify multiple, distinct defined activity patterns that have occurred during a particular time period.
    Type: Application
    Filed: August 23, 2018
    Publication date: August 29, 2019
    Applicant: CrowdStrike, Inc.
    Inventors: Brody Nisbet, Andrew Roden, John Lee
  • Publication number: 20190266323
    Abstract: A security service system and method for using a process based on ancestry relationship as a pattern for identifying a suspicious activity, such as a possible malicious attack or malware, are described herein. The security service system identifies a trigger command in a process running on a monitored computing device, identifies an ancestry command associated with the trigger command, determines an ancestry level of the ancestry command, and upon determining that the ancestry level of the ancestry command is different from an expected ancestry level of the ancestry command for the trigger command, identify a pattern based on the trigger command, the ancestry command, and the ancestry level of the ancestry command.
    Type: Application
    Filed: October 23, 2018
    Publication date: August 29, 2019
    Inventors: Cory-Khoi Quang Nguyen, Brody Nisbet, John Lee