Patents by Inventor Itamar Tal

Itamar Tal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10917500
    Abstract: A method for monitoring a computing system including multiple endpoints, includes monitoring, in at least some of the endpoints, operating-system (OS) system calls relating to a transport protocol having no handshake mechanism. First and second endpoints, which exchange a flow of packets with one another using the transport protocol, are identified from among the multiple endpoints. A deduction is made, from the monitored system calls, which of the first and second endpoints acts as a server in the flow of packets, and which of the first and second endpoints acts as a client in the flow of packets.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: February 9, 2021
    Assignee: GUARDICORE LTD.
    Inventors: Uri Hershcovits, Liron Schiff, Itamar Tal
  • Publication number: 20200404080
    Abstract: A method for monitoring a computing system including multiple endpoints, includes monitoring, in at least some of the endpoints, operating-system (OS) system calls relating to a transport protocol having no handshake mechanism. First and second endpoints, which exchange a flow of packets with one another using the transport protocol, are identified from among the multiple endpoints. A deduction is made, from the monitored system calls, which of the first and second endpoints acts as a server in the flow of packets, and which of the first and second endpoints acts as a client in the flow of packets.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 24, 2020
    Inventors: Uri Hershcovits, Liron Schiff, Itamar Tal
  • Patent number: 10360059
    Abstract: A method includes, in a computer, running a hypervisor that allocates resources of a memory and of a network to one or more Virtual Machines (VMs), which run VM processes and communicate over network connections. First information is extracted by monitoring the network connections in the hypervisor. Second information is extracted by directly accessing, in the hypervisor, regions of the memory assigned to the VMs. An association is established between a given network connection and a given VM process, by correlating the first information with the second information.
    Type: Grant
    Filed: February 12, 2017
    Date of Patent: July 23, 2019
    Assignee: GUARDICORE LTD.
    Inventors: Itamar Tal, Ariel Zeitlin
  • Publication number: 20180232248
    Abstract: A method includes, in a computer, running a hypervisor that allocates resources of a memory and of a network to one or more Virtual Machines (VMs), which run VM processes and communicate over network connections. First information is extracted by monitoring the network connections in the hypervisor. Second information is extracted by directly accessing, in the hypervisor, regions of the memory assigned to the VMs. An association is established between a given network connection and a given VM process, by correlating the first information with the second information.
    Type: Application
    Filed: February 12, 2017
    Publication date: August 16, 2018
    Inventors: Itamar Tal, Ariel Zeitlin
  • Patent number: 9667637
    Abstract: A method includes monitoring communication traffic that is exchanged over a computer network. One or more authentication attempts that have failed are identified in at least part of the monitored communication traffic. Hostile activity is detected in the computer network by analyzing the failed authentication attempts.
    Type: Grant
    Filed: May 31, 2015
    Date of Patent: May 30, 2017
    Assignee: GUARDICORE LTD.
    Inventors: Ariel Zeitlin, Pavel Gurvich, Ofri Ziv, Itamar Tal
  • Publication number: 20150358338
    Abstract: A method includes monitoring communication traffic that is exchanged over a computer network. One or more authentication attempts that have failed are identified in at least part of the monitored communication traffic. Hostile activity is detected in the computer network by analyzing the failed authentication attempts.
    Type: Application
    Filed: May 31, 2015
    Publication date: December 10, 2015
    Inventors: Ariel Zeitlin, Pavel Gurvich, Ofri Ziv, Itamar Tal
  • Publication number: 20150229659
    Abstract: A method includes, in a computer network that includes multiple endpoints, configuring a network element to forward one or more specified packets from a selected endpoint to a detection unit. A malicious network-mapping software running on the selected endpoint is identified by analyzing the forwarded packets in the detection unit.
    Type: Application
    Filed: January 14, 2015
    Publication date: August 13, 2015
    Inventors: Itamar Tal, Ariel Zeitlin, Pavel Gurvich, Ofri Ziv
  • Patent number: D582311
    Type: Grant
    Filed: April 27, 2006
    Date of Patent: December 9, 2008
    Inventor: Itamar Tal