Patents by Inventor Ihab Khalil

Ihab Khalil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10230763
    Abstract: Methods and systems are provided for implementing application layer security. According to one embodiment, security rules applicable to end users of a private IP network and particular resources accessible within the network are maintained by a network appliance. A packet originated within the network is received by the network appliance. An application type associated with the packet is determined based on layer 7 information within the packet. Layer 7 information fields are extracted from the packet that are indicative of an identity of an end user associated with the packet. An SSO process is performed including receiving and authenticating credentials of the end user on behalf of multiple resources within the network based on the identity of the end user. One or more security rules are identified and applied to the packet based on the identity of the end user and the determined application type.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: March 12, 2019
    Assignee: Fortinet, Inc.
    Inventors: Michael Xie, Wei David Wang, Ihab Khalil
  • Patent number: 10104121
    Abstract: Methods and systems are provided for implementing application layer security. According to one embodiment, an application layer packet is received by a network appliance and one or more information fields, selected based on an application type associated with the packet, are used to identify an associated end user. Then, security rules that match the traffic pattern, traffic content and identified end user can be applied to the packet. Identification of end users based on application layer information allows different security rules to be implemented for end users or groups thereof. Application of security rules based on identification of an end user based on application layer information can also facilitate implementation of an application-layer-based single sign-on (SSO) process.
    Type: Grant
    Filed: July 3, 2013
    Date of Patent: October 16, 2018
    Assignee: Fortinet, Inc.
    Inventors: Michael Xie, Wei David Wang, Ihab Khalil
  • Patent number: 9917857
    Abstract: Methods and systems for improved attack context data logging are provided. According to one embodiment, prior to a logging event being triggered (i) it is determined by a network security device whether a received packet is potentially associated with a threat or undesired activity by analyzing the packet; (ii) when the determination is negative, the packet is stored within a circular buffer; and (iii) when the determination is affirmative, (a) the logging event is triggered, (b) pre-attack context information regarding the threat is captured by extracting information from packets within the circular buffer and (c) the pre-attack context information is stored within a log. After the logging event has been triggered and until information regarding a predefined quantity of packets has been logged, post-attack context information regarding the threat is captured by extracting information from subsequently received packets and the post-attack context information is stored within the log.
    Type: Grant
    Filed: March 18, 2017
    Date of Patent: March 13, 2018
    Assignee: Fortinet, Inc.
    Inventors: Wei David Wang, Dayong Zhou, Ihab Khalil
  • Publication number: 20170195355
    Abstract: Methods and systems for improved attack context data logging are provided. According to one embodiment, prior to a logging event being triggered (i) it is determined by a network security device whether a received packet is potentially associated with a threat or undesired activity by analyzing the packet; (ii) when the determination is negative, the packet is stored within a circular buffer; and (iii) when the determination is affirmative, (a) the logging event is triggered, (b) pre-attack context information regarding the threat is captured by extracting information from packets within the circular buffer and (c) the pre-attack context information is stored within a log. After the logging event has been triggered and until information regarding a predefined quantity of packets has been logged, post-attack context information regarding the threat is captured by extracting information from subsequently received packets and the post-attack context information is stored within the log.
    Type: Application
    Filed: March 18, 2017
    Publication date: July 6, 2017
    Applicant: Fortinet, Inc.
    Inventors: Wei David Wang, Dayong Zhou, Ihab Khalil
  • Patent number: 9686309
    Abstract: Methods and systems for improved attack context data logging are provided. According to one embodiment, configuration information is received from an administrator of a network security device. The configuration information includes information indicative of a quantity of packets to be captured for post attack analysis. Responsive to receipt of the configuration information, a size of a circular buffer is configured based thereon. Multiple packets directed to a network protected by the network security device are received from an external network. The received packets are temporarily buffered within the circular buffer. An analysis is performed to determine whether one of the received packets is potentially associated with a threat or undesired activity (“trigger packet”).
    Type: Grant
    Filed: March 3, 2015
    Date of Patent: June 20, 2017
    Assignee: Fortinet, Inc.
    Inventors: Wei David Wang, Dayong Zhou, Ihab Khalil
  • Publication number: 20160197963
    Abstract: Methods and systems are provided for implementing application layer security. According to one embodiment, security rules applicable to end users of a private IP network and particular resources accessible within the network are maintained by a network appliance. A packet originated within the network is received by the network appliance. An application type associated with the packet is determined based on layer 7 information within the packet. Layer 7 information fields are extracted from the packet that are indicative of an identity of an end user associated with the packet. An SSO process is performed including receiving and authenticating credentials of the end user on behalf of multiple resources within the network based on the identity of the end user. One or more security rules are identified and applied to the packet based on the identity of the end user and the determined application type.
    Type: Application
    Filed: March 16, 2016
    Publication date: July 7, 2016
    Inventors: Michael Xie, Wei David Wang, Ihab Khalil
  • Publication number: 20150180887
    Abstract: Methods and systems for improved attack context data logging are provided. According to one embodiment, configuration information is received from an administrator of a network security device. The configuration information includes information indicative of a quantity of packets to be captured for post attack analysis. Responsive to receipt of the configuration information, a size of a circular buffer is configured based thereon. Multiple packets directed to a network protected by the network security device are received from an external network. The received packets are temporarily buffered within the circular buffer. An analysis is performed to determine whether one of the received packets is potentially associated with a threat or undesired activity (“trigger packet”).
    Type: Application
    Filed: March 3, 2015
    Publication date: June 25, 2015
    Applicant: Fortinet, Inc.
    Inventors: Wei David Wang, Dayong Zhou, Ihab Khalil
  • Publication number: 20150033322
    Abstract: Methods and systems for improved attack context data logging are provided. According to one embodiment, configuration information is received by a firewall device from a network administrator. The configuration information includes a number (N) of packets to capture by the firewall device responsive to an event detected by the firewall device that is potentially indicative of a threat or undesired activity. Multiple packets are received by the firewall device. The firewall device applies an attack detection algorithm, including one or more of a set of intrusion detection signatures, a set of malware detection signatures and a set of security policies, to the received packets. Responsive to the firewall device determining that a trigger packet is associated with a potential threat or potential undesired activity, the firewall device causes information regarding N packets of the received packets, inclusive of the trigger packet, to be stored in a log.
    Type: Application
    Filed: January 14, 2014
    Publication date: January 29, 2015
    Applicant: Fortinet, Inc.
    Inventors: Wei David Wang, Dayong Zhou, Ihab Khalil
  • Publication number: 20150033336
    Abstract: Methods and systems are provided for improved attack context data logging. In one embodiment, additional context is provided for an attack by logging either a predetermined or configurable number or predetermined or configurable timeframe of packets before and optionally after detection of a packet associated with an attack. This additional context facilitates understanding of the attack and can help in connection with improving the implementation of signatures that are used to detect attacks and reducing false positives. In one aspect, the system is configured to assess multiple packets across one or more sessions and temporarily store each packet in a buffer having a configurable size such that once an attack is detected, a log can be generated based at least in part on packets present in the buffer. Then, the log can be analyzed so as to understand the context of the attack.
    Type: Application
    Filed: July 24, 2013
    Publication date: January 29, 2015
    Applicant: Fortinet, Inc.
    Inventors: Wei David Wang, Dayong Zhou, Ihab Khalil
  • Publication number: 20150012964
    Abstract: Methods and systems are provided for implementing application layer security. According to one embodiment, an application layer packet is received by a network appliance and one or more information fields, selected based on an application type associated with the packet, are used to identify an associated end user. Then, security rules that match the traffic pattern, traffic content and identified end user can be applied to the packet. Identification of end users based on application layer information allows different security rules to be implemented for end users or groups thereof. Application of security rules based on identification of an end user based on application layer information can also facilitate implementation of an application-layer-based single sign-on (SSO) process.
    Type: Application
    Filed: July 3, 2013
    Publication date: January 8, 2015
    Inventors: Michael Xie, Wei David Wang, Ihab Khalil
  • Publication number: 20140156812
    Abstract: Methods and systems for temporarily configuring a network appliance in accordance with externally provided customized configuration settings are provided. According to one embodiment, a network appliance may operate in one of multiple configuration modes, including an internal configuration mode and an external configuration mode. When operating in the internal configuration mode, the network appliance loads and runs configuration settings from a memory internal to the network appliance. When operating in the external configuration mode, the network appliance loads and runs configuration settings from an external storage device coupled to an interface of the network appliance.
    Type: Application
    Filed: December 5, 2012
    Publication date: June 5, 2014
    Applicant: Fortinet, Inc.
    Inventors: Xianfeng Deng, Ihab Khalil
  • Patent number: 6295816
    Abstract: An apparatus (11) for controlling the peak pressure in the combustion chamber (46) of a turbo-charged diesel locomotive engine (12). A pressure relief valve (56) is disposed in the compressor discharge downstream of the turbo-charger (18). The relief valve (56) is operable to release a selected amount (58) of the compressed air (24) produced by the compressor section (20) of turbo-charger (18). The actuation of valve (56) may be a function of the pressure of the compressed air (24), and/or a manifold air temperature signal (52) and a fuel injection timing signal (40). An actuator (60) attached to valve (56) is responsive to a valve position signal (62) generated by a controller (38) having the appropriate inputs and programmed logic capability.
    Type: Grant
    Filed: May 24, 2000
    Date of Patent: October 2, 2001
    Assignee: General Electric Company
    Inventors: Shawn Michael Gallagher, Ihab Khalil, Doug Glenn, Juan Carlos Alvarez