Patents by Inventor Dmitriy Komashinskiy
Dmitriy Komashinskiy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250071126Abstract: A threat detection network, a node of a threat detection network and a threat detection method in a threat detection network, the threat detection network comprising interconnected nodes (5a-5h) and a backend system (2), wherein the backend system utilizes a backend threat detection mechanism, and at least part of the nodes (5a-5h) comprise security agent modules (6a-6h) which collect data related to the respective node. The nodes (5a-5h) utilize at least one local threat detection model which comprises a machine learning-based model of a backend threat detection mechanism. The method comprises collecting data related to the node (5a-5h) by the security agent module at the node, applying the local threat detection model to the collected data, and making a security related decision at the node (5a-5h), such as an endpoint, based on results of the local threat detection model.Type: ApplicationFiled: August 20, 2024Publication date: February 27, 2025Inventors: Paul BLOMSTEDT, Dmitriy KOMASHINSKIY, Paolo PALUMBO, Matti AKSELA
-
Publication number: 20230388328Abstract: Disclosed is a threat detection network for monitoring a security threat for a computer network, including a back end system and sensors coupled to the back end system, wherein each sensor: collects data describing respective predefined events in a respective node of the network, each event involving interaction of a subject entity operating in the respective node with an object entity associated with the node, applies predefined anomaly detection models to determine respective anomaly detection scores for interactions captured in the collected data, arranges the captured interactions into a local activity graph describing interactions of subject entities operating in the node with object entities associated with the node, and transmits portions of the local activity graph as status data to the back end system depending on the anomaly scores for the respective interactions captured in the local activity graph. The back end system derives security parameters describing security threats.Type: ApplicationFiled: May 30, 2023Publication date: November 30, 2023Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO, Matti AKSELA
-
Publication number: 20230370485Abstract: A network node of a threat detection network, a backend system of a threat detection network, a threat detection network and a threat detection method in a threat detection network. The threat detection network comprises interconnected network nodes and a backend system, wherein the backend system utilizes a backend threat detection model, and wherein at least part of the network nodes comprise security agent modules which collect data related to the respective network node, wherein the network nodes utilize a local threat detection model and a local consistency model. The local consistency model is configured to provide a confidence level information between the local threat detection model and the backend threat detection model.Type: ApplicationFiled: May 15, 2023Publication date: November 16, 2023Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO
-
Patent number: 11811803Abstract: There is provided a method comprising: detecting a new process start at a network node of a computer network; determining that said process requires external code modules; observing the times at which one or more external code modules required by the new process are loaded relative to the process starting time; determining that the usage of an external code module required by the new process is anomalous when the time elapsed between the start of the process and loading of said external code module lies outside predetermined expected boundaries; and taking further action to protect the network node and/or the computer network based on determining that the usage of the external code module required by the detected new process is anomalous.Type: GrantFiled: November 10, 2020Date of Patent: November 7, 2023Assignee: WITHSECURE CORPORATIONInventors: Paolo Palumbo, Dmitriy Komashinskiy
-
Publication number: 20230097370Abstract: Disclosed is a system and a method of threat detection in a computer network, the method including detecting by a first node a security threat, e.g. relating to anomalous or malicious behavior, digital object and/or context, at the first node, collecting context information at the first node relating to the detected security threat, reporting at least one detected security threat and the collected context information to at least a second node, analyzing at the second node the received information relating to the security threat and collecting context information relating to the analysis at the second node, and sending the threat related information with added analysis and context information collected from the second node to at least one further node or backend.Type: ApplicationFiled: September 29, 2022Publication date: March 30, 2023Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO
-
Patent number: 11449610Abstract: There is provided a method of detecting a threat against a computer system. The method includes monitoring installation and operation of multiple different versions of the same application in a computer system; analysing evolutionary changes between the behaviours of the different versions of the same application; detecting and monitoring a new version of the same application in a computer system; monitoring the behavior of the computer system to detect one or more procedures of the monitored application that do not match expected behaviors of the monitored application on the basis of the analysis; and upon detection of one or more procedures not matching the expected behaviors of the monitored application, identifying the monitored application as malicious or suspicious.Type: GrantFiled: March 18, 2019Date of Patent: September 20, 2022Assignee: Withsecure CorporationInventors: Mikko Suominen, Dmitriy Komashinskiy, Fredrik Kock
-
Patent number: 11245666Abstract: A method including collecting and aligning raw data from a plurality of network nodes, wherein dissimilar data types are aligned as input events; filtering the input events by discarding events and/or parts of events that are detected to be equal or similar to previously observed events or events and/or parts of events found to be redundant by using predetermined criteria; separating processing of the input events into event aggregation and event enrichment processes, wherein the event aggregation process includes processing all the input events for generating aggregated events, and the event enrichment process includes processing only events passed by the filtering and the aggregated events from the event aggregation process; and analysing the data received from the event enrichment process for generating a security related decision.Type: GrantFiled: June 26, 2019Date of Patent: February 8, 2022Assignee: F-Secure CorporationInventors: Dmitriy Komashinskiy, Paolo Palumbo
-
Publication number: 20210409429Abstract: A system and a method for distributing components of a threat detection model for a threat control network, the threat control network comprising interconnected network nodes. The threat control network comprises security agent modules which collect data related to the respective network node of the security agent module, share information based on the collected data in the established internal network and use the collected data and information received from the internal network for generating and adapting threat detection models related to the respective network node. At least part of the nodes comprise at least the following components of the threat detection model: detection logic part comprising detection rules, detection logic parameter part comprising parameter values, core data primitive part comprising a set of key primitives. The method comprises distributing the said components of a threat detection model to a node independently from the other said components of the same node.Type: ApplicationFiled: June 25, 2021Publication date: December 30, 2021Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO, Johannes RAVE, Matti AKSELA
-
Publication number: 20210144165Abstract: There is provided a method comprising: detecting a new process start at a network node of a computer network; determining that said process requires external code modules; observing the times at which one or more external code modules required by the new process are loaded relative to the process starting time; determining that the usage of an external code module required by the new process is anomalous when the time elapsed between the start of the process and loading of said external code module lies outside predetermined expected boundaries; and taking further action to protect the network node and/or the computer network based on determining that the usage of the external code module required by the detected new process is anomalous.Type: ApplicationFiled: November 10, 2020Publication date: May 13, 2021Inventors: Paolo PALUMBO, Dmitriy KOMASHINSKIY
-
Patent number: 10972505Abstract: There are provided measures for improvement of distributed behavioral monitoring. Such measures exemplarily include receiving activity data indicative of a behavior of an entity to be monitored from at least one sensor sensing activity of the entity, wherein the at least one sensor is provided to an endpoint associated with said entity, assessing an activity represented by said activity data as malicious, validating a result of said assessing based on a categorization assigned to said entity in relation to said at least one sensor, and deciding, based on a result of said validating, on a response to said assessing.Type: GrantFiled: December 13, 2017Date of Patent: April 6, 2021Assignee: F-Secure CorporationInventors: Paolo Palumbo, Dmitriy Komashinskiy
-
Patent number: 10721247Abstract: There are provided measures for machine learning based malware detection systems. Such measures exemplarily include analyzing a set of training data, said set of training data comprising a plurality of training data elements, wherein each of said plurality of training data elements is associated with a respective one of at least two maliciousness related properties, learning a malicious object detection model on the basis of first feature combinations of said plurality of training data elements, said first feature combinations characterizing each of said at least two maliciousness related properties, learning an anomalous data detection model on the basis of second feature combinations of said plurality of training data elements, said second feature combinations characterizing said set of training data, said anomalous data detection model being associated with said malicious object detection model, and providing said malicious object detection model and said anomalous data detection model.Type: GrantFiled: November 28, 2017Date of Patent: July 21, 2020Assignee: F-Secure CorporationInventors: Dmitriy Komashinskiy, Paolo Palumbo
-
Publication number: 20200036681Abstract: A method including collecting and aligning raw data from a plurality of network nodes, wherein dissimilar data types are aligned as input events; filtering the input events by discarding events and/or parts of events that are detected to be equal or similar to previously observed events or events and/or parts of events found to be redundant by using predetermined criteria; separating processing of the input events into event aggregation and event enrichment processes, wherein the event aggregation process includes processing all the input events for generating aggregated events, and the event enrichment process includes processing only events passed by the filtering and the aggregated events from the event aggregation process; and analysing the data received from the event enrichment process for generating a security related decision.Type: ApplicationFiled: June 26, 2019Publication date: January 30, 2020Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO
-
Publication number: 20190294795Abstract: There is provided a method of detecting a threat against a computer system. The method includes monitoring installation and operation of multiple different versions of the same application in a computer system; analysing evolutionary changes between the behaviours of the different versions of the same application; detecting and monitoring a new version of the same application in a computer system; monitoring the behavior of the computer system to detect one or more procedures of the monitored application that do not match expected behaviors of the monitored application on the basis of the analysis; and upon detection of one or more procedures not matching the expected behaviors of the monitored application, identifying the monitored application as malicious or suspicious.Type: ApplicationFiled: March 18, 2019Publication date: September 26, 2019Inventors: Mikko Suominen, Dmitriy Komashinskiy, Fredrik Kock
-
Publication number: 20180176260Abstract: There are provided measures for improvement of distributed behavioral monitoring. Such measures exemplarily include receiving activity data indicative of a behavior of an entity to be monitored from at least one sensor sensing activity of the entity, wherein the at least one sensor is provided to an endpoint associated with said entity, assessing an activity represented by said activity data as malicious, validating a result of said assessing based on a categorization assigned to said entity in relation to said at least one sensor, and deciding, based on a result of said validating, on a response to said assessing.Type: ApplicationFiled: December 13, 2017Publication date: June 21, 2018Inventors: Paolo Palumbo, Dmitriy Komashinskiy
-
Publication number: 20180159871Abstract: There are provided measures for machine learning based malware detection systems. Such measures exemplarily include analyzing a set of training data, said set of training data comprising a plurality of training data elements, wherein each of said plurality of training data elements is associated with a respective one of at least two maliciousness related properties, learning a malicious object detection model on the basis of first feature combinations of said plurality of training data elements, said first feature combinations characterizing each of said at least two maliciousness related properties, learning an anomalous data detection model on the basis of second feature combinations of said plurality of training data elements, said second feature combinations characterizing said set of training data, said anomalous data detection model being associated with said malicious object detection model, and providing said malicious object detection model and said anomalous data detection model.Type: ApplicationFiled: November 28, 2017Publication date: June 7, 2018Inventors: Dmitriy Komashinskiy, Paolo Palumbo
-
Patent number: 8904537Abstract: A method and apparatus for detecting malware in which a computer device that has an operating system and a memory executes an untrusted computer program. In the event that the untrusted program directly accesses a region of the memory used to store information relating to the operating system, a determination is made that the untrusted program is likely to be malware.Type: GrantFiled: May 9, 2011Date of Patent: December 2, 2014Assignee: F—Secure CorporationInventors: Jarkko Turkulainen, Samuli Larvala, Dmitriy Komashinskiy, Antti Tikkanen, Daavid Hentunen
-
Publication number: 20120291131Abstract: A method and apparatus for detecting malware in which a computer device that has an operating system and a memory executes an untrusted computer program. In the event that the untrusted program directly accesses a region of the memory used to store information relating to the operating system, a determination is made that the untrusted program is likely to be malware.Type: ApplicationFiled: May 9, 2011Publication date: November 15, 2012Inventors: Jarkko Turkulainen, Samuli Larvala, Dmitriy Komashinskiy, Antti Tikkanen, Daavid Hentunen