Patents by Inventor Harshvardhan Parmar

Harshvardhan Parmar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11770394
    Abstract: A network security system that analyzes data from network attacks to determine which attacks came from the same attacker, even if the attacker tries to disguise its identity by spreading attacks out over time and attacking from multiple IP addresses. Intrusion detection systems or firewalls may log data for each attack, such as the time of the attack, the type of attack, and the source and target addresses. Embodiments may augment this data with derived attributes that may profile the attacker's behavior. For example, some attackers may spread out attacks over time, but always attack on the same day of the week; some attackers may spread out attacks over different IP addresses, but these addresses may all be in the same country. The original and augmented data may be clustered using an algorithm such as DBSCAN, and each attacker may be identified with one of the resulting clusters.
    Type: Grant
    Filed: June 2, 2021
    Date of Patent: September 26, 2023
    Assignee: BULL SAS
    Inventors: Harshvardhan Parmar, Vinod Vasudevan, Rajat Mohanty
  • Publication number: 20220407876
    Abstract: A method for detecting malware penetrating a network by identifying anomalous communication between at least two systems of the network, carried out by a computer. For each unique combination of Source IP address and destination IP address, the method includes considering a past period, considering the network flow logs stored during said past period, calculating values of a metric based on data of the network flow logs within the past period and at a given frequency, calculating a baseline which consists in calculating an IQR of all metric values calculated during the past period, determining an outlier threshold from the baseline, considering a current period, calculating a new IQR of all metric values calculated during the current period, and classifying the communication between the two systems of the unique combination as an anomalous communication if the IQR of the current period is greater than the outlier threshold.
    Type: Application
    Filed: June 16, 2022
    Publication date: December 22, 2022
    Applicant: BULL SAS
    Inventors: Ravi RAMAN, Vinod VASUDEVAN, Harshvardhan PARMAR
  • Publication number: 20220394048
    Abstract: A network security system that analyzes data from network attacks to determine which attacks came from the same attacker, even if the attacker tries to disguise its identity by spreading attacks out over time and attacking from multiple IP addresses. Intrusion detection systems or firewalls may log data for each attack, such as the time of the attack, the type of attack, and the source and target addresses. Embodiments may augment this data with derived attributes that may profile the attacker's behavior. For example, some attackers may spread out attacks over time, but always attack on the same day of the week; some attackers may spread out attacks over different IP addresses, but these addresses may all be in the same country. The original and augmented data may be clustered using an algorithm such as DBSCAN, and each attacker may be identified with one of the resulting clusters.
    Type: Application
    Filed: June 2, 2021
    Publication date: December 8, 2022
    Applicant: Atos IT Solutions and Services, Inc
    Inventors: Harshvardhan PARMAR, Vinod VASUDEVAN, Rajat MOHANTY
  • Patent number: 10757122
    Abstract: A network user behavior system that detects anomalous user behavior includes a memory system with a user behavior module. The user behavior module creates a user profile based on user activity that includes user activity logs that record parameters related to user activity; selects indicator features, wherein the indicator feature includes user activity related to the parameters; creates a user identifier (UID) for each combination of the indicator feature and user; associates each UID with a timestamp to establish a UID and timestamp relationship; establishes a UID and timestamp relationship range indicative of non-anomalous user behavior; and identifies an anomalous user behavior as a UID and timestamp relationship outside of the range indicative of non-anomalous user behavior.
    Type: Grant
    Filed: February 14, 2018
    Date of Patent: August 25, 2020
    Assignee: PALADION NETWORKS PRIVATE LIMITED
    Inventors: Vinod Vasudevan, Rajat Mohanty, Harshvardhan Parmar
  • Publication number: 20190253443
    Abstract: A network user behavior system that detects anomalous user behavior includes a memory system with a user behavior module. The user behavior module creates a user profile based on user activity that includes user activity logs that record parameters related to user activity; selects indicator features, wherein the indicator feature includes user activity related to the parameters; creates a user identifier (UID) for each combination of the indicator feature and user; associates each UID with a timestamp to establish a UID and timestamp relationship; establishes a UID and timestamp relationship range indicative of non-anomalous user behavior; and identifies an anomalous user behavior as a UID and timestamp relationship outside of the range indicative of non-anomalous user behavior.
    Type: Application
    Filed: February 14, 2018
    Publication date: August 15, 2019
    Applicant: Paladion Networks Private Limited
    Inventors: Vinod Vasudevan, Rajat Mohanty, Harshvardhan Parmar
  • Patent number: 10270799
    Abstract: A system uses a probabilistic technique to determine the vulnerability of similar assets based on the data provided on some assets. The probabilistic technique includes stages of preparing data followed by calculating probability; a preparing data stage, including gathering the latest vulnerability reports of all assets in a system with the help of known scanners; creating open vulnerabilities; enriching the obtained data of open vulnerabilities; creating all vulnerabilities; enriching the obtained data of all vulnerabilities. Following this stage, probability calculation may be done for three cases, when asset information is known, when asset information is partially unknown, and when asset information is completely unknown based on the data taken from open vulnerabilities and all vulnerabilities categorized into blocks of 6 months based on the time at which they have been reported to NIST/MITRE.
    Type: Grant
    Filed: May 4, 2017
    Date of Patent: April 23, 2019
    Assignee: PALADION NETWORKS PRIVATE LIMITED
    Inventors: Vinod Vasudevan, Rajat Mohanty, Harshvardhan Parmar
  • Publication number: 20170324763
    Abstract: A system uses a probabilistic technique to determine the vulnerability of similar assets based on the data provided on some assets. The probabilistic technique includes stages of preparing data followed by calculating probability; a preparing data stage, including gathering the latest vulnerability reports of all assets in a system with the help of known scanners; creating open vulnerabilities; enriching the obtained data of open vulnerabilities; creating all vulnerabilities; enriching the obtained data of all vulnerabilities. Following this stage, probability calculation may be done for three cases, when asset information is known, when asset information is partially unknown, and when asset information is completely unknown based on the data taken from open vulnerabilities and all vulnerabilities categorized into blocks of 6 months based on the time at which they have been reported to NIST/MITRE.
    Type: Application
    Filed: May 4, 2017
    Publication date: November 9, 2017
    Applicant: Paladion Networks Private Limited
    Inventors: Vinod Vasudevan, Rajat Mohanty, Harshvardhan Parmar