Patents by Inventor Kasirao VELUGU

Kasirao VELUGU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11831678
    Abstract: Described embodiments provide systems and methods for detecting autonomous programs is provided. A device, intermediary to a plurality of clients and a plurality of servers, can receive a first request from a first client of the plurality of clients to a server of the plurality of servers via a connection between the device and the first client. The device can include, into a response from the server to the first client, a uniform resource locator (URL) comprising one or more randomly generated characters within a predetermined character space. The device can determine that the first client has an autonomous program responsive to receiving a second request from the first client using the URL. The device can terminate, responsive to the determination, the connection to the first client.
    Type: Grant
    Filed: March 4, 2020
    Date of Patent: November 28, 2023
    Assignee: Citrix Systems, Inc.
    Inventors: Rakesh Kumar Thangellapalli, Rama Rao Katta, Kasirao Velugu, Praveen Dandin, Aman Agrawal, Seth Kenneth Keith, Ratnesh Singh Thakur, Josephine Suganthi Joseph Leo
  • Patent number: 11792133
    Abstract: Described embodiments provide systems and methods performing header protection. A device can receive from a client, a request relating to a first resource, for a second resource. The device can determine, using an identifier for the session, whether an address of the first resource has been previously accessed by the client during the session. The device can verify, using an address of the second resource, whether the address of the second resource is mapped to the address of the first resource for the session between the client and the device. The device can determine whether to provide access to the second resource responsive to the address of the first resource being previously accessed by the client during the session and the address of the second resource being mapped to the address of the first resource for the session.
    Type: Grant
    Filed: June 7, 2022
    Date of Patent: October 17, 2023
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Patent number: 11683291
    Abstract: Described embodiments provide systems and methods for generating firewall configuration profiles for firewalls. An intermediary device may modify a request from a client to access the server to include a payload provided by the device. The payload may include an action type selected from a plurality of action types used to probe the server for a corresponding security vulnerability of a plurality of security vulnerabilities. The device may transmit, to the server, the request including the payload to cause the server to provide a response to the device. The device may determine that the server is susceptible to a security vulnerability of the plurality of security vulnerabilities corresponding to the action type based at least on the response. The device may generate a configuration profile for the firewall to restrict requests of the action type to access the server from clients.
    Type: Grant
    Filed: May 4, 2021
    Date of Patent: June 20, 2023
    Inventors: Kasirao Velugu, Priya Bagaria, Ganesh Kathiresan, Thirumoorthi Thangamani
  • Patent number: 11611535
    Abstract: Described embodiments provide systems and methods for selecting one or more firewall rules to apply to a server based at least on identifying a service of the server. A device intermediary to a plurality of clients and a serve may identify a pattern of a firewall to apply to a response from the server to a request from a client of the plurality of clients. The pattern may be to identify a service configured on the server. The device may determine that the response from the server matches the pattern. The device may identify, responsive to the response matching the pattern, that the service is configured on the server. The device may select, based at least on the service, one or more rules for the firewall to apply to responses from the server.
    Type: Grant
    Filed: May 11, 2021
    Date of Patent: March 21, 2023
    Inventors: Kasirao Velugu, Priya Bagaria, Ganesh Kathiresan, Thirumoorthi Thangamani
  • Patent number: 11593714
    Abstract: A computer system is provided. The computer system includes a memory, a network interface, and a processor coupled to the memory and the network interface. The processor is configured to receive a response to a request to verify whether an ostensible client of a service is actually a client or a bot, the response including an indicator of whether the ostensible client is a client or a bot; receive information descriptive of interoperations between the ostensible client and the service that are indicative of whether the ostensible client is a client or a bot; and train a plurality of machine learning classifiers using the information and the indicator to generate a next generation of the plurality of machine learning classifiers.
    Type: Grant
    Filed: June 19, 2020
    Date of Patent: February 28, 2023
    Assignee: Citrix Systems, Inc.
    Inventors: Aman Agrawal, Josephine Suganthi Joseph Leo, Kasirao Velugu, Praveen Dandin, Rama Rao Katta, Ratnesh Singh Thakur, Seth Kenneth Keith, Rakesh Thangellapalli
  • Publication number: 20220368700
    Abstract: Systems and methods of handling sessions between client devices and one or more server based on session classifications are provided. A device identifies a time series of security metrics corresponding to requests received during a session established by a client device to access a resource provided by one or more servers. The device generates security features from the time series of security metrics based on one or more time windows. The device classifies the session as one of anomalous or genuine using the security features generated from the time series of security metrics based on the one or more time windows. The device handles subsequent requests received during the session based on the classification of the session as the one of anomalous or genuine.
    Type: Application
    Filed: May 13, 2021
    Publication date: November 17, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Priya Bagaria, Kasirao Velugu, Thirumoorthi Thangamani, Ganesh Kathiresan
  • Publication number: 20220368672
    Abstract: Described embodiments provide systems and methods for selecting one or more firewall rules to apply to a server based at least on identifying a service of the server. A device intermediary to a plurality of clients and a serve may identify a pattern of a firewall to apply to a response from the server to a request from a client of the plurality of clients. The pattern may be to identify a service configured on the server. The device may determine that the response from the server matches the pattern. The device may identify, responsive to the response matching the pattern, that the service is configured on the server. The device may select, based at least on the service, one or more rules for the firewall to apply to responses from the server.
    Type: Application
    Filed: May 11, 2021
    Publication date: November 17, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Kasirao Velugu, Priya Bagaria, Ganesh Kathiresan, Thirumoorthi Thangamani
  • Publication number: 20220360560
    Abstract: Described embodiments provide systems and methods for generating firewall configuration profiles for firewalls. An intermediary device may modify a request from a client to access the server to include a payload provided by the device. The payload may include an action type selected from a plurality of action types used to probe the server for a corresponding security vulnerability of a plurality of security vulnerabilities. The device may transmit, to the server, the request including the payload to cause the server to provide a response to the device. The device may determine that the server is susceptible to a security vulnerability of the plurality of security vulnerabilities corresponding to the action type based at least on the response. The device may generate a configuration profile for the firewall to restrict requests of the action type to access the server from clients.
    Type: Application
    Filed: May 4, 2021
    Publication date: November 10, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Kasirao Velugu, Priya Bagaria, Ganesh Kathiresan, Thirumoorthi Thangamani
  • Publication number: 20220329624
    Abstract: A system to identify automated submissions of web pages, such as those submitted by bots, in real time. The system comprising a processor configured to update an initial version of a requested web page with at least one hidden field, transmit the updated web page to the client, then, upon receipt parse the completed web page, and identify if a data entry is associated with the at least one hidden field. Where a data entry is associated with the at least one hidden field, the system blocks the transmission of the completed web page to the server. Where a data entry is not associated with the at least one hidden field the system removes the at least one hidden field, and transmits the final web page to the server.
    Type: Application
    Filed: April 9, 2021
    Publication date: October 13, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu, Aman Agrawal
  • Publication number: 20220303226
    Abstract: Described embodiments provide systems and methods performing header protection. A device can receive from a client, a request relating to a first resource, for a second resource. The device can determine, using an identifier for the session, whether an address of the first resource has been previously accessed by the client during the session. The device can verify, using an address of the second resource, whether the address of the second resource is mapped to the address of the first resource for the session between the client and the device. The device can determine whether to provide access to the second resource responsive to the address of the first resource being previously accessed by the client during the session and the address of the second resource being mapped to the address of the first resource for the session.
    Type: Application
    Filed: June 7, 2022
    Publication date: September 22, 2022
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Publication number: 20220279011
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to extract, from a website vulnerability scanner log, a uniform resource locator (URL) and a vulnerability score and vulnerability classification associated with the URL. The at least one processor is further configured to generate an application vulnerability graph comprising connected nodes that are associated with a field of the URL. The nodes are labeled to indicate the associated field of the URL and color coded based on the vulnerability score. The nodes are also associated with the vulnerability classification. The at least one processor is further configured to enable or disable security protection against a user-selected vulnerability classification of a user-selected node by generating web application firewall security rules and/or web application firewall relaxation rules.
    Type: Application
    Filed: May 16, 2022
    Publication date: September 1, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Kasirao Velugu, Priya Bagaria, Thirumoorthi Thangamani, Ganesh Kathiresan
  • Patent number: 11411982
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to extract, from a website vulnerability scanner log, a uniform resource locator (URL) and a vulnerability score and vulnerability classification associated with the URL. The at least one processor is further configured to generate an application vulnerability graph comprising connected nodes that are associated with a field of the URL. The nodes are labeled to indicate the associated field of the URL and color coded based on the vulnerability score. The nodes are also associated with the vulnerability classification. The at least one processor is further configured to enable or disable security protection against a user-selected vulnerability classification of a user-selected node by generating web application firewall security rules and/or web application firewall relaxation rules.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: August 9, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Kasirao Velugu, Priya Bagaria, Thirumoorthi Thangamani, Ganesh Kathiresan
  • Patent number: 11381517
    Abstract: Described embodiments provide systems and methods performing header protection. A device can receive from a client, a request relating to a first resource, for a second resource. The device can determine, using an identifier for the session, whether an address of the first resource has been previously accessed by the client during the session. The device can verify, using an address of the second resource, whether the address of the second resource is mapped to the address of the first resource for the session between the client and the device. The device can determine whether to provide access to the second resource responsive to the address of the first resource being previously accessed by the client during the session and the address of the second resource being mapped to the address of the first resource for the session.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: July 5, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Patent number: 11349812
    Abstract: Described embodiments provide systems and methods for learning across multiple application delivery controllers and updating settings across the application delivery controllers. A profile can be generated based on selection of a set of intermediary devices managed by a device. The set of intermediary devices configured to load balance data of an application hosted in different computing environments. Activity can be identified at the intermediary devices with use of a firewall. The activity having an appearance of a malicious attack on at least one intermediary device of the set. The device can determine if the activity is permissible or a violation based on a comparison of an aggregation of data records for the identified activity and a threshold. The device can provide a notification to at least one intermediary device of the set to configure the at least one intermediary device to allow the activity or prevent the activity.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: May 31, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Gourish K Biradar, Kasirao Velugu, Vamshi Raghav, Ratnesh Singh Thakur, Rama Rao Katta, Srinivasa Reddy Kasu, Kapil Jaisinghani, Satyendra Tiwari
  • Patent number: 11343357
    Abstract: Systems and methods for autonomous program management include a device which may transmit data to a client in response to a first request from the client. The data may include a response to the first request and a copy of data available to the device corresponding to the first request or the client. The device may receive a second request including the copy of data from the client. The device may determine that the second request is from an autonomous program rather than a user of the client based on the copy of data from the second request. The device may block at least one subsequent request from the client in response to the determination that the second request is from an autonomous program.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: May 24, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Publication number: 20220141187
    Abstract: Described embodiments provide systems and methods for learning across multiple application delivery controllers and updating settings across the application delivery controllers. A profile can be generated based on selection of a set of intermediary devices managed by a device. The set of intermediary devices configured to load balance data of an application hosted in different computing environments. Activity can be identified at the intermediary devices with use of a firewall. The activity having an appearance of a malicious attack on at least one intermediary device of the set. The device can determine if the activity is permissible or a violation based on a comparison of an aggregation of data records for the identified activity and a threshold. The device can provide a notification to at least one intermediary device of the set to configure the at least one intermediary device to allow the activity or prevent the activity.
    Type: Application
    Filed: December 10, 2020
    Publication date: May 5, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Gourish K Biradar, Kasirao Velugu, Vamshi Raghav, Ratnesh Singh Thakur, Rama Rao Katta, Srinivasa Reddy Kasu, Kapil Jaisinghani, Satyendra Tiwari
  • Publication number: 20220131813
    Abstract: Described embodiments provide systems and methods performing header protection. A device can receive from a client, a request relating to a first resource, for a second resource. The device can determine, using an identifier for the session, whether an address of the first resource has been previously accessed by the client during the session. The device can verify, using an address of the second resource, whether the address of the second resource is mapped to the address of the first resource for the session between the client and the device. The device can determine whether to provide access to the second resource responsive to the address of the first resource being previously accessed by the client during the session and the address of the second resource being mapped to the address of the first resource for the session.
    Type: Application
    Filed: October 28, 2020
    Publication date: April 28, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Publication number: 20220116481
    Abstract: Systems and methods for autonomous program management include a device which may transmit data to a client in response to a first request from the client. The data may include a response to the first request and a copy of data available to the device corresponding to the first request or the client. The device may receive a second request including the copy of data from the client. The device may determine that the second request is from an autonomous program rather than a user of the client based on the copy of data from the second request. The device may block at least one subsequent request from the client in response to the determination that the second request is from an autonomous program.
    Type: Application
    Filed: November 24, 2020
    Publication date: April 14, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Publication number: 20220103587
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to extract, from a website vulnerability scanner log, a uniform resource locator (URL) and a vulnerability score and vulnerability classification associated with the URL. The at least one processor is further configured to generate an application vulnerability graph comprising connected nodes that are associated with a field of the URL. The nodes are labeled to indicate the associated field of the URL and color coded based on the vulnerability score. The nodes are also associated with the vulnerability classification. The at least one processor is further configured to enable or disable security protection against a user-selected vulnerability classification of a user-selected node by generating web application firewall security rules and/or web application firewall relaxation rules.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Kasirao Velugu, Priya Bagaria, Thirumoorthi Thangamani, Ganesh Kathiresan
  • Publication number: 20220038447
    Abstract: Systems and methods for autonomous program management include a device which may receive a first request from a client for a server. The device may transmit one or more data packets to the client. The data packet(s) may include a response to the request from the server and an attribute collector script which executes on the client to automatically transmit one or more attributes corresponding to at least one of the client or a browser of the client to the device. The device may receive a second request from the client which includes one or more attributes collected using the attribute collector script. The device may determine whether the client is associated with an autonomous program using the attribute(s). The device may block one or more subsequent requests from the client to the server responsive to determining that the client is associated with an autonomous program.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventors: Rakesh Kumar Thangellapalli, Rama Rao Katta, Kasirao Velugu, Praveen Dandin, Aman Agrawal, Seth K. Keith, Ratnesh Singh Thakur, Josephine Suganthi Joseph Leo