Patents by Inventor David J. Plonka
David J. Plonka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11736362Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.Type: GrantFiled: July 28, 2022Date of Patent: August 22, 2023Assignee: Akamai Technologies, Inc.Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
-
Patent number: 11658991Abstract: An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise; nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.Type: GrantFiled: February 19, 2021Date of Patent: May 23, 2023Assignee: Akamai Technologies, Inc.Inventors: David J. Plonka, Kyle R. Rose, Laura M. Roberts
-
Publication number: 20220368603Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.Type: ApplicationFiled: July 28, 2022Publication date: November 17, 2022Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
-
Patent number: 11405286Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.Type: GrantFiled: March 8, 2021Date of Patent: August 2, 2022Assignee: Akamai Technologies, Inc.Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
-
Publication number: 20210243214Abstract: An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise: nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.Type: ApplicationFiled: February 19, 2021Publication date: August 5, 2021Applicant: Akamai Technologies, Inc.Inventors: David J. Plonka, Kyle R. Rose, Laura M. Roberts
-
Publication number: 20210194775Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.Type: ApplicationFiled: March 8, 2021Publication date: June 24, 2021Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
-
Patent number: 10944639Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.Type: GrantFiled: June 9, 2017Date of Patent: March 9, 2021Assignee: Akamai Technologies, Inc.Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
-
Patent number: 10931695Abstract: An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise; nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.Type: GrantFiled: August 22, 2018Date of Patent: February 23, 2021Assignee: Akamai Technologies, Inc.Inventors: David J. Plonka, Kyle R. Rose, Laura M. Roberts
-
Publication number: 20200067954Abstract: An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise; nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.Type: ApplicationFiled: August 22, 2018Publication date: February 27, 2020Applicant: Akamai Technologies, Inc.Inventors: David J. Plonka, Kyle R. Rose, Laura M. Roberts
-
Publication number: 20170359227Abstract: An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g.Type: ApplicationFiled: June 9, 2017Publication date: December 14, 2017Inventors: Pawel J. Foremski, Arthur W. Berger, David J. Plonka
-
Patent number: 8015605Abstract: A monitor of malicious network traffic attaches to unused addresses and monitors communications with an active responder that has constrained-state awareness to be highly scalable. In a preferred embodiment, the active responder provides a response based only on the previous statement from the malicious source, which in most cases is sufficient to promote additional communication with the malicious source, presenting a complete record of the transaction for analysis and possible signature extraction.Type: GrantFiled: August 29, 2005Date of Patent: September 6, 2011Assignee: Wisconsin Alumni Research FoundationInventors: Vinod T. Yegneswaran, Paul R. Barford, David J. Plonka
-
Patent number: 7907543Abstract: A network monitor provides improved understanding of the type of data being transmitted by packets by capturing rendezvous packets, such as domain name server queries and responses, to extract text domain names that may then be associated with later packets using a common numeric addresses. Text domain names intended for human understanding and recollection provide a unique insight into the content of the packets not readily obtained by analysis of the packet data itself.Type: GrantFiled: May 12, 2009Date of Patent: March 15, 2011Assignee: Wisconsin Alumni Research FoundationInventors: Paul R. Barford, David J. Plonka
-
Publication number: 20100290353Abstract: A network monitor provides improved understanding of the type of data being transmitted by packets by capturing rendezvous packets, such as domain name server queries and responses, to extract text domain names that may then be associated with later packets using a common numeric addresses. Text domain names intended for human understanding and recollection provide a unique insight into the content of the packets not readily obtained by analysis of the packet data itself.Type: ApplicationFiled: May 12, 2009Publication date: November 18, 2010Inventors: Paul R. Barford, David J. Plonka