Patents by Inventor Derek Abdine

Derek Abdine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11729189
    Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: August 15, 2023
    Assignee: Rapid7, Inc.
    Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
  • Patent number: 11700276
    Abstract: Methods and systems for monitoring activity on a network. The systems may include a host computer executing a non-honeypot service. The host computer may also include a control module configured to enable or disable a honeypot service on the host computer in response to at least one of computational resource availability and configured tolerance for degraded service.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: July 11, 2023
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Derek Abdine
  • Patent number: 11681936
    Abstract: Systems and methods are disclosed to infer, using a machine learned model, a service protocol of a server based on the banner data produced by the server. In embodiments, the machine learned model is implemented by a network scanner configured to receive banner data from open ports on servers. A received banner is parsed into a set of features, such as the counts or presence of particular characters or strings in the banner. In embodiments, certain types of banner content such as network addresses, hostnames, dates, and times, are replaced with special characters. The machine learned model is applied to the features to infer a most likely protocol of the server port that produced the banner. Advantageously, the model can be trained to perform the inference task with high accuracy and without using human-specified rules, which can be brittle for unconventional banner data and carry undesired biases.
    Type: Grant
    Filed: October 12, 2022
    Date of Patent: June 20, 2023
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Derek Abdine, Thomas Sellers, Prashant Subbarao
  • Publication number: 20230034866
    Abstract: Systems and methods are disclosed to infer, using a machine learned model, a service protocol of a server based on the banner data produced by the server. In embodiments, the machine learned model is implemented by a network scanner configured to receive banner data from open ports on servers. A received banner is parsed into a set of features, such as the counts or presence of particular characters or strings in the banner. In embodiments, certain types of banner content such as network addresses, hostnames, dates, and times, are replaced with special characters. The machine learned model is applied to the features to infer a most likely protocol of the server port that produced the banner. Advantageously, the model can be trained to perform the inference task with high accuracy and without using human-specified rules, which can be brittle for unconventional banner data and carry undesired biases.
    Type: Application
    Filed: October 12, 2022
    Publication date: February 2, 2023
    Applicant: Rapid7, Inc.
    Inventors: Roy Hodgman, Derek Abdine, Thomas Sellers, Prashant Subbarao
  • Patent number: 11522912
    Abstract: Disclosed herein are methods, systems, and processes for recovering opaque credentials in deception systems. A plaintext credential is received at a honeypot and a plaintext lookup table is accessed. It is determined that the plaintext credential does not exist in the plaintext lookup table and the plaintext credential is added to the plaintext lookup table and a protocol specific plaintext lookup table. An opaque credential is generated for the plaintext credential and the opaque credential is added to a protocol specific opaque lookup table.
    Type: Grant
    Filed: March 18, 2021
    Date of Patent: December 6, 2022
    Assignee: Rapid7, Inc.
    Inventors: Thomas Eugene Sellers, Derek Abdine
  • Patent number: 11507860
    Abstract: Systems and methods are disclosed to infer, using a machine learned model, a service protocol of a server based on the banner data produced by the server. In embodiments, the machine learned model is implemented by a network scanner configured to receive banner data from open ports on servers. A received banner is parsed into a set of features, such as the counts or presence of particular characters or strings in the banner. In embodiments, certain types of banner content such as network addresses, hostnames, dates, and times, are replaced with special characters. The machine learned model is applied to the features to infer a most likely protocol of the server port that produced the banner. Advantageously, the model can be trained to perform the inference task with high accuracy and without using human-specified rules, which can be brittle for unconventional banner data and carry undesired biases.
    Type: Grant
    Filed: February 24, 2020
    Date of Patent: November 22, 2022
    Assignee: Rapid7, Inc.
    Inventors: Roy D. Hodgman, Derek Abdine, Thomas E. Sellers, Prashant Subbarao
  • Publication number: 20210226992
    Abstract: Disclosed herein are methods, systems, and processes for recovering opaque credentials in deception systems. A plaintext credential is received at a honeypot and a plaintext lookup table is accessed. It is determined that the plaintext credential does not exist in the plaintext lookup table and the plaintext credential is added to the plaintext lookup table and a protocol specific plaintext lookup table. An opaque credential is generated for the plaintext credential and the opaque credential is added to a protocol specific opaque lookup table.
    Type: Application
    Filed: March 18, 2021
    Publication date: July 22, 2021
    Applicant: Rapid7, Inc.
    Inventors: Thomas Eugene Sellers, Derek Abdine
  • Patent number: 10986130
    Abstract: Disclosed herein are methods, systems, and processes for recovering opaque credentials in deception systems. A plaintext credential is received at a honeypot and a plaintext lookup table is accessed. It is determined that the plaintext credential does not exist in the plaintext lookup table and the plaintext credential is added to the plaintext lookup table and a protocol specific plaintext lookup table. An opaque credential is generated for the plaintext credential and the opaque credential is added to a protocol specific opaque lookup table. Attack context metadata associated with the original attack event is generated and stored in the protocol specific opaque lookup table in association with the plaintext credential and the opaque credential. If the honeypot receives the opaque credential from a subsequent attacker who initiates a subsequent attack event, the protocol specific opaque lookup table is accessed and the plaintext credential associated with the opaque credential is recovered.
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: April 20, 2021
    Assignee: Rapid7, Inc.
    Inventors: Thomas Eugene Sellers, Derek Abdine
  • Patent number: 10986128
    Abstract: Disclosed herein are methods, systems, and processes for recovering opaque credentials in deception systems. A plaintext credential is received at a honeypot and a plaintext lookup table is accessed. It is determined that the plaintext credential does not exist in the plaintext lookup table and the plaintext credential is added to the plaintext lookup table and a protocol specific plaintext lookup table. An opaque credential is generated for the plaintext credential and the opaque credential is added to a protocol specific opaque lookup table.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: April 20, 2021
    Assignee: Rapid7, Inc.
    Inventors: Thomas Eugene Sellers, Derek Abdine
  • Patent number: 10848507
    Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: November 24, 2020
    Assignee: Rapid7, Inc.
    Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
  • Patent number: 10826939
    Abstract: Methods and systems for monitoring activity on a network. The systems may include a host computer executing a non-honeypot service. The host computer may also include a control module configured to enable or disable a honeypot service on the host computer in response to at least one of computational resource availability and configured tolerance for degraded service.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: November 3, 2020
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Derek Abdine
  • Patent number: 10367832
    Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.
    Type: Grant
    Filed: January 27, 2017
    Date of Patent: July 30, 2019
    Assignee: Rapid7, Inc.
    Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
  • Publication number: 20190230124
    Abstract: Methods and systems for monitoring activity on a network. The systems may include a host computer executing a non-honeypot service. The host computer may also include a control module configured to enable or disable a honeypot service on the host computer in response to at least one of computational resource availability and configured tolerance for degraded service.
    Type: Application
    Filed: January 19, 2018
    Publication date: July 25, 2019
    Inventors: Roy Hodgman, Derek Abdine
  • Publication number: 20180219880
    Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 2, 2018
    Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg