Patents by Inventor Dustin Myers
Dustin Myers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11711383Abstract: Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing an attack tool to simulate malicious activity in the computing environment, and then gathering data regarding a second state of the computing environment. The methods described herein may then involve generating a signature based on changes between the first and second states, and then using the generated signature to detect malicious activity in a target network.Type: GrantFiled: July 23, 2021Date of Patent: July 25, 2023Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 11706236Abstract: Methods and systems for classifying a device on a network. The systems and methods may receive network activity data associated with an unknown device. A classifier executing one or more machine learning models may then classify the device as an internet of things (IoT) device or a non-IoT device.Type: GrantFiled: August 2, 2021Date of Patent: July 18, 2023Assignee: Rapid7, Inc.Inventors: Deral Heiland, Dustin Myers, Wah-Kwan Lin
-
Patent number: 11677776Abstract: Disclosed herein are methods, systems, and processes to facilitate and perform dynamic best path determination for penetration testing. An action path that includes a kill chain that involves performance of exploit actions for a phase of a penetration test is generated by identifying the exploit actions based on a penetration parameter, a detection parameter, and/or a time parameter associated with the exploit actions. Performance of the identified exploit actions permits successful completion of the phase of the penetration test and designates the action path for inclusion as part of a best path for the penetration test.Type: GrantFiled: July 6, 2022Date of Patent: June 13, 2023Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 11606377Abstract: Methods and systems for detecting anomalous network device activity. The system may include an interface for receiving an identification label associated with a host device and pre-existing traffic data associated with the host device. The system may further detect that the pre-existing traffic data associated with the host device is anomalous based on the identification label. The system may then issue an alert upon detecting that the pre-existing traffic data associated with the host device is anomalous.Type: GrantFiled: August 6, 2020Date of Patent: March 14, 2023Assignee: Rapid7, Inc.Inventor: Dustin Myers
-
Patent number: 11509670Abstract: Methods and systems for detecting anomalous network activity. The system may receive network metadata regarding activity on a network and generate at least one of a z-score and a directionality magnitude related to the network activity. The system may then issue an alert upon detecting an anomaly exists on the network based upon at least one of the generated z-score exceeding a z-score threshold and the generated directionality magnitude deviating from a baseline directionality magnitude.Type: GrantFiled: November 28, 2018Date of Patent: November 22, 2022Assignee: Rapid7, Inc.Inventor: Dustin Myers
-
Publication number: 20220360603Abstract: Disclosed herein are methods, systems, and processes to facilitate and perform dynamic best path determination for penetration testing. An action path that includes a kill chain that involves performance of exploit actions for a phase of a penetration test is generated by identifying the exploit actions based on a penetration parameter, a detection parameter, and/or a time parameter associated with the exploit actions. Performance of the identified exploit actions permits successful completion of the phase of the penetration test and designates the action path for inclusion as part of a best path for the penetration test.Type: ApplicationFiled: July 6, 2022Publication date: November 10, 2022Applicant: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 11418528Abstract: Disclosed herein are methods, systems, and processes to facilitate and perform dynamic best path determination for penetration testing. An action path that includes a kill chain that involves performance of exploit actions for a phase of a penetration test is generated by identifying the exploit actions based on a penetration parameter, a detection parameter, and/or a time parameter associated with the exploit actions. Performance of the identified exploit actions permits successful completion of the phase of the penetration test and designates the action path for inclusion as part of a best path for the penetration test.Type: GrantFiled: November 2, 2018Date of Patent: August 16, 2022Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Publication number: 20210360406Abstract: Methods and systems for classifying a device on a network. The systems and methods may receive network activity data associated with an unknown device. A classifier executing one or more machine learning models may then classify the device as an internet of things (IoT) device or a non-IoT device.Type: ApplicationFiled: August 2, 2021Publication date: November 18, 2021Applicant: Rapid7, Inc.Inventors: Deral Heiland, Dustin Myers, Wah-Kwan Lin
-
Publication number: 20210352092Abstract: Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing an attack tool to simulate malicious activity in the computing environment, and then gathering data regarding a second state of the computing environment. The methods described herein may then involve generating a signature based on changes between the first and second states, and then using the generated signature to detect malicious activity in a target network.Type: ApplicationFiled: July 23, 2021Publication date: November 11, 2021Applicant: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Publication number: 20210288986Abstract: Disclosed herein are methods, systems, and processes for detecting data exfiltration. A data exfiltration event in a network is detected. Traffic data regarding outgoing traffic of a source in the network associated with the data exfiltration event is received. A logarithmic transformation is applied to the traffic data to generate transformed data. An outlier identification technique is selected based on the transformed data and is executed on the transformed data to determine that the outgoing traffic is indicative of the data exfiltration event. An alert is generated in response to the determination that the outgoing traffic is indicative of the data exfiltration event.Type: ApplicationFiled: June 2, 2021Publication date: September 16, 2021Applicant: Rapid7, Inc.Inventors: Dustin Myers, Vasudha Shivamoggi, Roy Hodgman
-
Patent number: 11115823Abstract: Methods and systems for classifying a device on a network. The systems and methods may receive network activity data associated with an unknown device. A classifier executing one or more machine learning models may then classify the device as an internet of things (IoT) device or a non-IoT device.Type: GrantFiled: April 30, 2019Date of Patent: September 7, 2021Assignee: Rapid7, Inc.Inventors: Deral Heiland, Dustin Myers, Wah-Kwan Lin
-
Patent number: 11108790Abstract: Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing an attack tool to simulate malicious activity in the computing environment, and then gathering data regarding a second state of the computing environment. The methods described herein may then involve generating a signature based on changes between the first and second states, and then using the generated signature to detect malicious activity in a target network.Type: GrantFiled: April 30, 2019Date of Patent: August 31, 2021Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 11057410Abstract: Methods and systems for detecting a data exfiltration event on a network. The method includes receiving traffic data and applying a transformation to transform the traffic data at least closer to a normal distribution. The method further includes selecting at least one outlier identification technique based on a property of the transformed data, and then executing the at least one selected identification technique to determine whether the traffic data is indicative of a data exfiltration event.Type: GrantFiled: February 27, 2019Date of Patent: July 6, 2021Assignee: Rapid7, Inc.Inventors: Dustin Myers, Vasudha Shivamoggi, Roy Hodgman
-
Patent number: 10771490Abstract: Methods and systems for detecting anomalous network device activity. The system may include an interface for receiving an identification label associated with a host device and pre-existing traffic data associated with the host device. The system may further detect that the pre-existing traffic data associated with the host device is anomalous based on the identification label. The system may then issue an alert upon detecting that the pre-existing traffic data associated with the host device is anomalous.Type: GrantFiled: November 28, 2018Date of Patent: September 8, 2020Assignee: Rapid7, Inc.Inventor: Dustin Myers
-
Publication number: 20200169575Abstract: Methods and systems for detecting anomalous network activity. The system may receive network metadata regarding activity on a network and generate at least one of a z-score and a directionality magnitude related to the network activity. The system may then issue an alert upon detecting an anomaly exists on the network based upon at least one of the generated z-score exceeding a z-score threshold and the generated directionality magnitude deviating from a baseline directionality magnitude.Type: ApplicationFiled: November 28, 2018Publication date: May 28, 2020Inventor: Dustin Myers
-
Publication number: 20200169576Abstract: Methods and systems for detecting anomalous network device activity. The system may include an interface for receiving an identification label associated with a host device and pre-existing traffic data associated with the host device. The system may further detect that the pre-existing traffic data associated with the host device is anomalous based on the identification label. The system may then issue an alert upon detecting that the pre-existing traffic data associated with the host device is anomalous.Type: ApplicationFiled: November 28, 2018Publication date: May 28, 2020Inventor: Dustin Myers
-
Publication number: 20200145446Abstract: Disclosed herein are methods, systems, and processes to facilitate and perform dynamic best path determination for penetration testing. An action path that includes a kill chain that involves performance of exploit actions for a phase of a penetration test is generated by identifying the exploit actions based on a penetration parameter, a detection parameter, and/or a time parameter associated with the exploit actions. Performance of the identified exploit actions permits successful completion of the phase of the penetration test and designates the action path for inclusion as part of a best path for the penetration test.Type: ApplicationFiled: November 2, 2018Publication date: May 7, 2020Applicant: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers