Patents by Inventor Harsha Kumara Kalutarage

Harsha Kumara Kalutarage has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10681059
    Abstract: The present invention provides a target centric monitoring of a network enabling a likelihood score for the existence of an attack to be calculated. The score is calculated by monitoring a plurality of network nodes for a range of symptoms. Detected symptoms are then profiled using a classical Bayesian-based framework such that a node score is calculated for every node. The node scores are compared against reference activity so as to identify deviations from reference activity. The reference activity may comprise peer analysis comparing the node scores against the nodes scores or per nodes and discord analysis comparing the node score of a particular node against historical behaviour. Based on the deviations, the method can enable the calculation of a likelihood of suspicious activity for each node.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: June 9, 2020
    Assignee: CyberOwl Limited
    Inventors: Siraj Ahmed Shaikh, Harsha Kumara Kalutarage
  • Publication number: 20170346834
    Abstract: The present invention provides a target centric monitoring of a network enabling a likelihood score for the existence of an attack to be calculated. The score is calculated by monitoring a plurality of network nodes for a range of symptoms. Detected symptoms are then profiled using a classical Bayesian-based framework such that a node score is calculated for every node. The node scores are compared against reference activity so as to identify deviations from reference activity. The reference activity may comprise peer analysis comparing the node scores against the nodes scores or per nodes and discord analysis comparing the node score of a particular node against historical behaviour. Based on the deviations, the method can enable the calculation of a likelihood of suspicious activity for each node.
    Type: Application
    Filed: May 25, 2016
    Publication date: November 30, 2017
    Inventors: Siraj Ahmed Shaikh, Harsha Kumara Kalutarage