Patents by Inventor Farnam Jahanian

Farnam Jahanian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8621610
    Abstract: A system is provided for detecting, analyzing and quarantining unwanted files in a network environment. A host agent residing on a computing device in the network environment detects a new file introduced to the computing device and sends the new file to a network service for analysis. The network service is accessible to computing devices in the network environment. An architecture for the network service may include: a request dispatcher configured to receive a candidate file for inspection from a given computing device in the network environment and distribute the candidate file to one or more of a plurality of detection engines, where the detection engines operate in parallel to analyze the candidate file and output a report regarding the candidate file; and a result aggregator configured to receive reports from each of the detection engines regarding the candidate file and aggregates the reports in accordance with an aggregation algorithm.
    Type: Grant
    Filed: August 5, 2008
    Date of Patent: December 31, 2013
    Assignee: The Regents of The University of Michigan
    Inventors: Jon Oberheide, Evan Cooke, Farnam Jahanian
  • Publication number: 20090044024
    Abstract: A system is provided for detecting, analyzing and quarantining unwanted files in a network environment. A host agent residing on a computing device in the network environment detects a new file introduced to the computing device and sends the new file to a network service for analysis. The network service is accessible to computing devices in the network environment. An architecture for the network service may include: a request dispatcher configured to receive a candidate file for inspection from a given computing device in the network environment and distribute the candidate file to one or more of a plurality of detection engines, where the detection engines operate in parallel to analyze the candidate file and output a report regarding the candidate file; and a result aggregator configured to receive reports from each of the detection engines regarding the candidate file and aggregates the reports in accordance with an aggregation algorithm.
    Type: Application
    Filed: August 5, 2008
    Publication date: February 12, 2009
    Applicant: THE REGENTS OF THE UNIVERSITY OF MICHIGAN
    Inventors: Jon Oberheide, Farnam Jahanian, Evan Cooke
  • Patent number: 6944673
    Abstract: A method and system for profiling network flows at a measurement point within a computer network is provided. The method includes measuring network flows having invariant features at a measurement point located within routing infrastructure of the computer network to obtain flow statistics. The method also includes aggregating the flow statistics to obtain a traffic profile of the network flows at the measurement point. The method and system utilize the natural hierarchy in the Internet addressing scheme to provide a means for making tractable measurements of network traffic in high-speed networks. Moreover, the method and system adapt dynamically to the changing underlying traffic characteristics to maintain a maximum memory footprint for the profiles. The method and system adapt by adjusting the level of aggregation of the traffic endpoints along a scale from Interface to fully specified network address.
    Type: Grant
    Filed: May 15, 2001
    Date of Patent: September 13, 2005
    Assignee: The Regents of the University of Michigan
    Inventors: Gerald R. Malan, Farnam Jahanian
  • Publication number: 20020035698
    Abstract: A method and system are provided for protecting publicly accessible network computer services from undesirable network traffic in real-time. The method includes receiving network traffic destined for the services and analyzing the network traffic to identify an undesirable user of the services. Access of the undesirable user to the services is limited to protect the services. The method and system identify and remove a new level of security threat that is not addressable by current techniques. Specifically, the method and system identify topologically anomalous application-level patterns of traffic and remove these data flows in real-time from the network.
    Type: Application
    Filed: May 15, 2001
    Publication date: March 21, 2002
    Applicant: The Regents of The University of Michigan
    Inventors: Gerald R. Malan, Farnam Jahanian
  • Publication number: 20020032717
    Abstract: A method and system for profiling network flows at a measurement point within a computer network is provided. The method includes measuring network flows having invariant features at a measurement point located within routing infrastructure of the computer network to obtain flow statistics. The method also includes aggregating the flow statistics to obtain a traffic profile of the network flows at the measurement point. The method and system utilize the natural hierarchy in the Internet addressing scheme to provide a means for making tractable measurements of network traffic in high-speed networks. Moreover, the method and system adapt dynamically to the changing underlying traffic characteristics to maintain a maximum memory footprint for the profiles. The method and system adapt by adjusting the level of aggregation of the traffic endpoints along a scale from Interface to fully specified network address.
    Type: Application
    Filed: May 15, 2001
    Publication date: March 14, 2002
    Applicant: The Regents of The University of Michigan
    Inventors: Gerald R. Malan, Farnam Jahanian
  • Publication number: 20020032871
    Abstract: A system and method is provided for detecting, tracking and blocking denial of service (“DoS”) attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a collector adapted to receive a plurality of data statistics from the computer network and to process the plurality of data statistics to detect one or more data packet flow anomalies. The collector is further adapted to generate a plurality of signals representing the one or more data packet flow anomalies. The system further includes a controller that is coupled to the collector and is adapted to receive the plurality of signals from the collector.
    Type: Application
    Filed: May 15, 2001
    Publication date: March 14, 2002
    Applicant: The Regents of The University of Michigan
    Inventors: Gerald R. Malan, Farnam Jahanian
  • Publication number: 20020032793
    Abstract: A method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic is provided. The method includes collecting statistics at a plurality of measurement points located within forwarding infrastructure of the computer network. The method also includes analyzing the statistics to reconstruct the path taken by the undesirable network traffic through the network from the source of the traffic. The method and system use a combination of well-known misuse signatures of network resources in combination with modeling of normal network service behavior to identify bandwidth anomalies.
    Type: Application
    Filed: May 15, 2001
    Publication date: March 14, 2002
    Applicant: The Regents of The University of Michigan
    Inventors: Gerald R. Malan, Farnam Jahanian