Patents by Inventor David J. Plonka

David J. Plonka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11736362
    Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: August 22, 2023
    Assignee: Akamai Technologies, Inc.
    Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
  • Patent number: 11658991
    Abstract: An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise; nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.
    Type: Grant
    Filed: February 19, 2021
    Date of Patent: May 23, 2023
    Assignee: Akamai Technologies, Inc.
    Inventors: David J. Plonka, Kyle R. Rose, Laura M. Roberts
  • Publication number: 20220368603
    Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.
    Type: Application
    Filed: July 28, 2022
    Publication date: November 17, 2022
    Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
  • Patent number: 11405286
    Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.
    Type: Grant
    Filed: March 8, 2021
    Date of Patent: August 2, 2022
    Assignee: Akamai Technologies, Inc.
    Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
  • Publication number: 20210243214
    Abstract: An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise: nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.
    Type: Application
    Filed: February 19, 2021
    Publication date: August 5, 2021
    Applicant: Akamai Technologies, Inc.
    Inventors: David J. Plonka, Kyle R. Rose, Laura M. Roberts
  • Publication number: 20210194775
    Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.
    Type: Application
    Filed: March 8, 2021
    Publication date: June 24, 2021
    Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
  • Patent number: 10944639
    Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.
    Type: Grant
    Filed: June 9, 2017
    Date of Patent: March 9, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
  • Patent number: 10931695
    Abstract: An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise; nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: February 23, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: David J. Plonka, Kyle R. Rose, Laura M. Roberts
  • Publication number: 20200067954
    Abstract: An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise; nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.
    Type: Application
    Filed: August 22, 2018
    Publication date: February 27, 2020
    Applicant: Akamai Technologies, Inc.
    Inventors: David J. Plonka, Kyle R. Rose, Laura M. Roberts
  • Publication number: 20170359227
    Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.
    Type: Application
    Filed: June 9, 2017
    Publication date: December 14, 2017
    Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
  • Patent number: 8015605
    Abstract: A monitor of malicious network traffic attaches to unused addresses and monitors communications with an active responder that has constrained-state awareness to be highly scalable. In a preferred embodiment, the active responder provides a response based only on the previous statement from the malicious source, which in most cases is sufficient to promote additional communication with the malicious source, presenting a complete record of the transaction for analysis and possible signature extraction.
    Type: Grant
    Filed: August 29, 2005
    Date of Patent: September 6, 2011
    Assignee: Wisconsin Alumni Research Foundation
    Inventors: Vinod T. Yegneswaran, Paul R. Barford, David J. Plonka
  • Patent number: 7907543
    Abstract: A network monitor provides improved understanding of the type of data being transmitted by packets by capturing rendezvous packets, such as domain name server queries and responses, to extract text domain names that may then be associated with later packets using a common numeric addresses. Text domain names intended for human understanding and recollection provide a unique insight into the content of the packets not readily obtained by analysis of the packet data itself.
    Type: Grant
    Filed: May 12, 2009
    Date of Patent: March 15, 2011
    Assignee: Wisconsin Alumni Research Foundation
    Inventors: Paul R. Barford, David J. Plonka
  • Publication number: 20100290353
    Abstract: A network monitor provides improved understanding of the type of data being transmitted by packets by capturing rendezvous packets, such as domain name server queries and responses, to extract text domain names that may then be associated with later packets using a common numeric addresses. Text domain names intended for human understanding and recollection provide a unique insight into the content of the packets not readily obtained by analysis of the packet data itself.
    Type: Application
    Filed: May 12, 2009
    Publication date: November 18, 2010
    Inventors: Paul R. Barford, David J. Plonka