Patents by Inventor Kevin Tabb

Kevin Tabb has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11228612
    Abstract: Identifying cyber adversary behavior on a computer network is provided. Individual security events are received from multiple threat intelligence data sources. A security incident corresponding to an attack on at least one element of the computer network, the security incident being described by the individual security events received from the multiple threat intelligence data sources, is matched to a defined cyber adversary objective in a structured framework of a plurality of defined cyber adversary objectives and a related technique associated with the defined cyber adversary objective used by a cyber adversary in the attack. A set of mitigation actions is performed on the computer network based on matching the security incident corresponding to the attack on the computer network to the defined cyber adversary objective and the related technique.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: January 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: Sulakshan Vajipayajula, Kaushal Kiran Kapadia, Stephen Cameron Will, Ilgen Banu Yuceer, Kevin Tabb
  • Publication number: 20210349994
    Abstract: An approach is provided in which the approach receives a global trending threat corresponding to an incident occurring in an industry. The approach identifies a set of local Indicators of Concern (IoCs) within an entity that corresponds to the global trending threat, and computes an alert priority based on the set of local IoCs and the global trending threat. The approach adjusts the alert priority based on comparing entity properties of the entity with threat properties of the global trending threat, and dispatches an alert based on the adjusted alert priority.
    Type: Application
    Filed: May 11, 2020
    Publication date: November 11, 2021
    Inventors: PREETI RAVINDRA, Ilgen Banu Yuceer, Kevin Tabb
  • Patent number: 11050773
    Abstract: Prioritizing security incidents for analysis is provided. A set of security information and event management data corresponding to each of a set of security incidents is retrieved. A source weight of a security incident and a magnitude of the security incident are used to determine a priority of the security incident within the set of security incidents. A local analysis of the security incident is performed based on the retrieved set of security information and event management data corresponding to the security incident and the determined priority of the security incident.
    Type: Grant
    Filed: January 3, 2019
    Date of Patent: June 29, 2021
    Assignee: International Business Machines Corporation
    Inventors: Stephen C. Will, Kevin Tabb, Ilgen B. Yuceer, Sulakshan Vajipayajula, Kaushal K. Kapadia
  • Publication number: 20200314141
    Abstract: Identifying cyber adversary behavior on a computer network is provided. Individual security events are received from multiple threat intelligence data sources. A security incident corresponding to an attack on at least one element of the computer network, the security incident being described by the individual security events received from the multiple threat intelligence data sources, is matched to a defined cyber adversary objective in a structured framework of a plurality of defined cyber adversary objectives and a related technique associated with the defined cyber adversary objective used by a cyber adversary in the attack. A set of mitigation actions is performed on the computer network based on matching the security incident corresponding to the attack on the computer network to the defined cyber adversary objective and the related technique.
    Type: Application
    Filed: March 28, 2019
    Publication date: October 1, 2020
    Inventors: Sulakshan Vajipayajula, Kaushal Kiran Kapadia, Stephen Cameron Will, Ilgen Banu Yuceer, Kevin Tabb
  • Publication number: 20200220885
    Abstract: Prioritizing security incidents for analysis is provided. A set of security information and event management data corresponding to each of a set of security incidents is retrieved. A source weight of a security incident and a magnitude of the security incident are used to determine a priority of the security incident within the set of security incidents. A local analysis of the security incident is performed based on the retrieved set of security information and event management data corresponding to the security incident and the determined priority of the security incident.
    Type: Application
    Filed: January 3, 2019
    Publication date: July 9, 2020
    Inventors: Stephen C. Will, Kevin Tabb, Ilgen B. Yuceer, Sulakshan Vajipayajula, Kaushal K. Kapadia