Patents by Inventor Elisa Costante

Elisa Costante has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11949704
    Abstract: A method of detecting anomalous behaviour in data traffic on a data communication network having a first host and a second host being connected to the data communication network in which the data traffic on the data communication network forms a link between the first host and the second host.
    Type: Grant
    Filed: March 17, 2023
    Date of Patent: April 2, 2024
    Assignee: Forescout Technologies, Inc.
    Inventor: Elisa Costante
  • Publication number: 20240064158
    Abstract: Systems, methods, and related technologies for threat attribution are described. A method includes accessing network traffic to determine an incident based on a correlation of events as being associated with a same coordinated attack. The incident includes indicators of compromise (IoCs) and a Tactics, Techniques and Procedures (TTPs). The method also includes computing a first probability function based on the IoCs, wherein the first probability function comprises a first set of probability of attributions for a first list of known threat actors, and computing a second probability function based on the TTPs, wherein the second probability function comprises a second set of probability of attributions for a second list of known threat actors.
    Type: Application
    Filed: March 15, 2023
    Publication date: February 22, 2024
    Inventors: Koen Theodora Wilhelmina Teuwen, Alessandro Manzi, Daniel Ricardo dos Santos, Elisa Costante
  • Publication number: 20230421581
    Abstract: A method includes accessing events associated with a network and determining an issue based on a correlation of a portion of the events, wherein the issue represents an incident associated with the portion of the events, and wherein the correlation of the portion of the events is based on information associated with the network and at least in part on an event type of the portion of the events. A priority associated with the issue is determined at least based on the event type of the portion of the events. A first event type that is associated with an operational technology (OT) entity has a higher priority than a second event type that is not associated with the OT entity. Data associated with the issue is stored.
    Type: Application
    Filed: September 1, 2023
    Publication date: December 28, 2023
    Inventors: Daniel Ricardo dos Santos, Elisa Costante, Mario Dagrada, Alessandro Manzi
  • Publication number: 20230396527
    Abstract: Systems, methods, and related technologies for determining fields of an unknown protocol are described. Network traffic capture is grouped into one or more clusters of packets based on similarity. Each of the one or more clusters are parsed to identify one or more fields of an unknown protocol. The network traffic capture is modified, including annotating the identified one or more fields of the unknown protocol. A protocol parser is generated without user input, including parsing each of the annotated one or more fields of the unknown protocol to generate a description of the unknown protocol comprising identified one or more fields of the unknown protocol and an order of the identified one or more fields of the unknown protocol, and compiling the description into the protocol parser.
    Type: Application
    Filed: August 17, 2023
    Publication date: December 7, 2023
    Inventors: Daniel Ricardo dos Santos, Elisa Costante
  • Publication number: 20230370479
    Abstract: Systems and methods for automatic attack pattern generation from cyber threat intelligence are described. Attack pattern generation includes obtaining cyber threat intelligence including a set of methodologies used by a cyber threat and identifying a set of network detectable events associated with the set of methodologies used by the cyber threat. An attack pattern is generated including the plurality of detectable events associated with the plurality of methodologies.
    Type: Application
    Filed: November 30, 2022
    Publication date: November 16, 2023
    Inventors: Elisa Costante, Daniel Ricardo dos Santos, Cristoffer Leite da Silva
  • Patent number: 11818146
    Abstract: Systems, methods, and related technologies for determining an issue based on a plurality of events. The determining of an issue may include accessing network traffic from a network and accessing a plurality of events associated with the network traffic. An issue can be determined based on a correlation of a portion of the plurality of events, where the issue represents an incident associated with the portion of the plurality of events. The correlation of the portion of the plurality of events is based on network specific information. Information associated with the issue including the portion of the plurality of events may then be stored.
    Type: Grant
    Filed: December 27, 2019
    Date of Patent: November 14, 2023
    Assignee: Forescout Technologies, Inc.
    Inventors: Daniel Ricardo dos Santos, Elisa Costante, Mario Dagrada, Alessandro Manzi
  • Patent number: 11777832
    Abstract: Systems, methods, and related technologies for determining fields of an unknown protocol are described. One or more packets may be removed from a network traffic capture in response to the one or more packets having a known protocol. The remaining network traffic capture may be grouped into one or more clusters of packets based on similarity. Each of the one or more clusters may be parsed to identify one or more fields of an unknown protocol. The network traffic capture may be modified, including annotating the one or more fields of the unknown protocol.
    Type: Grant
    Filed: December 21, 2021
    Date of Patent: October 3, 2023
    Assignee: FORESCOUT TECHNOLOGIES, INC.
    Inventors: Daniel Ricardo dos Santos, Elisa Costante
  • Publication number: 20230254328
    Abstract: A method of detecting anomalous behaviour in data traffic includes parsing data traffic to extract protocol field values of a protocol message of data traffic, deriving attribute values of attributes of one of the first host, the second host, and the link. The method includes selecting a model relating to the one of the first host, the second host, and the link. The mode includes at least one semantic attribute expressing a semantic meaning for the first host, the second host, or the link. The method further includes updating the selected model with the derived attribute values, assessing whether the updated model complies with a set of attribute-based policies defining a security constraint of the data communication network, and generating an alert signal in case the attribute-based policies indicate that the updated model violates at least one of the attribute-based policies.
    Type: Application
    Filed: March 17, 2023
    Publication date: August 10, 2023
    Inventor: Elisa COSTANTE
  • Publication number: 20230198882
    Abstract: Systems, methods, and related technologies for determining fields of an unknown protocol are described. One or more packets may be removed from a network traffic capture in response to the one or more packets having a known protocol. The remaining network traffic capture may be grouped into one or more clusters of packets based on similarity. Each of the one or more clusters may be parsed to identify one or more fields of an unknown protocol. The network traffic capture may be modified, including annotating the one or more fields of the unknown protocol.
    Type: Application
    Filed: December 21, 2021
    Publication date: June 22, 2023
    Inventors: Daniel Ricardo dos Santos, Elisa Costante
  • Patent number: 11641370
    Abstract: A method of detecting anomalous behaviour in data traffic on a data communication network having a first host and a second host being connected to the data communication network in which the data traffic on the data communication network forms a link between the first host and the second host.
    Type: Grant
    Filed: March 7, 2019
    Date of Patent: May 2, 2023
    Assignee: FORESCOUT TECHNOLOGIES, INC.
    Inventor: Elisa Costante
  • Publication number: 20220353153
    Abstract: Systems, methods, and related technologies for classification are described. Entity attribute data associated with network entities is obtained. One or more entity attributes for classifying a set of entities is determined based on the entity attribute data. A set of entities coupled to a network are monitored. Values of the one or more entity attributes for the plurality of entities is identified. The set of entities are clustered into one or more entity clusters based on a similarity of the one or more entity attributes for the entities. An entity fingerprinting action is then performed based on the entity clusters.
    Type: Application
    Filed: June 29, 2021
    Publication date: November 3, 2022
    Inventors: Elisa Costante, Daniel Ricardo dos Santos, Guillaume François Christophe Dupont
  • Publication number: 20210203673
    Abstract: Systems, methods, and related technologies for determining an issue based on a plurality of events. The determining of an issue may include accessing network traffic from a network and accessing a plurality of events associated with the network traffic. An issue can be determined based on a correlation of a portion of the plurality of events, where the issue represents an incident associated with the portion of the plurality of events. The correlation of the portion of the plurality of events is based on network specific information. Information associated with the issue including the portion of the plurality of events may then be stored.
    Type: Application
    Filed: December 27, 2019
    Publication date: July 1, 2021
    Inventors: Daniel Ricardo dos Santos, Elisa Costante, Mario Dagrada, Alessandro Manzi
  • Publication number: 20200404010
    Abstract: A method of detecting anomalous behaviour in data traffic on a data communication network having a first host and a second host being connected to the data communication network in which the data traffic on the data communication network forms a link between the first host and the second host.
    Type: Application
    Filed: March 7, 2019
    Publication date: December 24, 2020
    Inventor: Elisa Costante