Patents by Inventor Kowsik Guruswamy

Kowsik Guruswamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11477248
    Abstract: Disclosed herein are techniques for protecting web applications from untrusted endpoints using remote browser isolation. In an example scenario, a browser isolation system receives a request from a client browser executing on a client device to connect with a remote application accessible via a private network. A surrogate browser is provided to facilitate communications between the client browser and the remote application. A security policy is enforced against the communications.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: October 18, 2022
    Assignee: Menlo Security, Inc.
    Inventors: Kowsik Guruswamy, Stephen John Stanley Thornhill, Andrew Peter Edward Prince, Joshua Frank Wharton
  • Publication number: 20220109700
    Abstract: Disclosed herein are techniques for protecting web applications from untrusted endpoints using remote browser isolation. In an example scenario, a browser isolation system receives a request from a client browser executing on a client device to connect with a remote application accessible via a private network. A surrogate browser is provided to facilitate communications between the client browser and the remote application. A security policy is enforced against the communications.
    Type: Application
    Filed: December 14, 2021
    Publication date: April 7, 2022
    Inventors: Kowsik Guruswamy, Stephen John Stanley Thornhill, Andrew Peter Edward Prince, Joshua Frank Wharton
  • Patent number: 11245731
    Abstract: Disclosed herein are techniques for protecting web applications from untrusted endpoints using remote browser isolation. In an example scenario, a browser isolation system receives a request from a client browser executing on a client device to connect with a remote application accessible via a private network. A surrogate browser is provided to facilitate communications between the client browser and the remote application. A security policy is enforced against the communications.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: February 8, 2022
    Assignee: Menlo Security, Inc.
    Inventors: Kowsik Guruswamy, Stephen John Stanley Thornhill, Andrew Peter Edward Prince, Joshua Frank Wharton
  • Patent number: 9172611
    Abstract: A discovery system (and corresponding method and computer program product) for automatically discovering assets and their roles and functional relationships in a network system is described. In one aspect, the discovery system interrogates known assets through protocol messages, normalizes response messages, and contextually analyzes the normalized response message to identify additional assets and their roles and functional relationships with the interrogated assets. The discovery system can recursively interrogate newly discovered assets to discover additional assets. In another aspect of the present invention, the discovery system is scheduled to periodically interrogate known assets for up-to-date information of the assets and their roles and functional relationships. Such information can be used to provide various services.
    Type: Grant
    Filed: October 29, 2008
    Date of Patent: October 27, 2015
    Assignee: Spirent Communications, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 9094372
    Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.
    Type: Grant
    Filed: December 30, 2013
    Date of Patent: July 28, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Nir Zuk, Kowsik Guruswamy
  • Patent number: 8959197
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Grant
    Filed: December 30, 2013
    Date of Patent: February 17, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Nir Zuk, Yuming Mao, Kowsik Guruswamy
  • Patent number: 8799714
    Abstract: Various example embodiments are directed to computer-implemented systems and methods for generating tests. A computer system may execute an application host and a browser. Messages originating from the application host and messages directed to the application host may be routed through the browser. The browser may be programmed to capture a plurality of application-level messages, which may comprise a plurality of requests originating from an application host and a plurality of responses directed to the application host. The computer system may generate a test scenario based on the plurality of application-level messages.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: August 5, 2014
    Assignee: Spirent Communications, Inc.
    Inventors: Kowsik Guruswamy, Yuri Khodosh, Joshua Nisenson
  • Publication number: 20140115379
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Application
    Filed: December 30, 2013
    Publication date: April 24, 2014
    Applicant: Juniper Networks, Inc.
    Inventors: Nir ZUK, Yuming Mao, Kowsik Guruswamy
  • Publication number: 20140115688
    Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.
    Type: Application
    Filed: December 30, 2013
    Publication date: April 24, 2014
    Applicant: Juniper Networks, Inc.
    Inventors: Nir ZUK, Kowsik Guruswamy
  • Patent number: 8635695
    Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: January 21, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Nir Zuk, Kowsik Guruswamy
  • Patent number: 8631499
    Abstract: A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or more messages to the device. A message can be generated by the security analyzer or generated independently of the security analyzer. The security analyzer uses various methods to identify a particular attack that causes a device to fail or otherwise alter its behavior. Monitoring includes analyzing data (other than messages) output from the device in response to an attack. Packet processing analysis includes analyzing one or more messages generated by the device in response to an attack. Instrumentation includes establishing a baseline snapshot of the device's state when it is operating normally and then attacking the device in multiple ways while obtaining snapshots periodically during the attacks.
    Type: Grant
    Filed: January 6, 2012
    Date of Patent: January 14, 2014
    Assignee: Spirent Communications, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 8631113
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: January 14, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Nir Zuk, Yu Ming Mao, Kowsik Guruswamy
  • Patent number: 8612530
    Abstract: Various embodiments are directed to testing a pass-through device under test. For example, a computer system may receive a scenario describing a model of a message exchange involving the device under test, which specifies, for at least one message a source address location, a destination address location, and an identifier location. The computer system may also execute a plurality of instances of the scenario. Executing each instance may comprise generating a first outgoing message based on the model of the message exchange; and transmitting the first outgoing message to the device under test. Additionally, the computer system may receive and apply a filter to the first forwarded message from the device under test. Applying the filter may extract a second message exchange identifier value from the identifier location of the first forwarded message. Using the second message exchange identifier, the first forwarded message may be matched to at least one outgoing message.
    Type: Grant
    Filed: October 24, 2011
    Date of Patent: December 17, 2013
    Assignee: Mu Dynamics, Inc.
    Inventors: Dmitrijs F. Sapovalovs, Sundar Vasan, Kowsik Guruswamy
  • Patent number: 8601585
    Abstract: A system is used to analyze the implementation of a protocol by a device-under-analysis (DUA). The system includes a source endpoint, a destination endpoint (the DUA), and a message generator. The source endpoint generates an original message and attempts to send it to the DUA. The original message is intercepted by the message generator, which generates a replacement message. The replacement message is then sent to the DUA instead of the original message. The replacement message is deliberately improper so as to analyze the DUA's implementation of the protocol. The message generator includes a structure recognition system and a mutation system. The structure recognition system determines the underlying structure and/or semantics of a message. After the structure recognition system has determined the structure, it creates a description of the structure (a structure description). The mutation system modifies the message based on the structure description to generate a replacement message.
    Type: Grant
    Filed: May 7, 2007
    Date of Patent: December 3, 2013
    Assignee: Spirent Communications, Inc.
    Inventors: Marshall A. Beddoe, Kowsik Guruswamy
  • Patent number: 8590048
    Abstract: A security analyzer includes a single software application that both sends test messages to a device under analysis (DUA) and receives response messages generated by the DUA in response to the test messages. In this way, synchronization of which response messages correspond to which test messages can be reduced or avoided. The software application further determines whether the DUA operated correctly by analyzing the received response messages.
    Type: Grant
    Filed: January 6, 2012
    Date of Patent: November 19, 2013
    Assignee: Mu Dynamics, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 8547974
    Abstract: A packet capture is received from actual network traffic, the traffic including a multiple protocol message exchange. A scenario may be generated based on an analysis of the received packet capture, the scenario modeling the multiple protocol message exchange. The scenario is used to generate tests, for example protocol mutation tests.
    Type: Grant
    Filed: May 5, 2011
    Date of Patent: October 1, 2013
    Assignee: Mu Dynamics
    Inventors: Kowsik Guruswamy, Nick Baggott, Sundar Vasan, Yuri Khodosh, David Helder
  • Patent number: 8463860
    Abstract: Various example embodiments are directed to scale testing based on scenarios. A computer system may receive a scenario, which may comprise a plurality of scenario objects including, a first host, a second host, a plurality of transports, a plurality of variables and a plurality of steps. The computer system may also receive a pattern. The scenario may be processed to generate a processed scenario. The computer system may execute a first track including executing a plurality of concurrencies of the processed scenario according to the pattern.
    Type: Grant
    Filed: May 27, 2011
    Date of Patent: June 11, 2013
    Assignee: Spirent Communications, Inc.
    Inventors: Kowsik Guruswamy, Dmitrijs F. Sapovalovs
  • Patent number: 8433811
    Abstract: A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of normalizing communication protocols supported by component systems of the network system. The test system creates objects and methods corresponding to component systems and their supported protocol commands in the network system, and generates unit test cases based on the objects, the methods, and the normalized protocols. The test system transmits the unit test cases to the component systems, receives test results, and validates the test results to ensure that the network system functions properly.
    Type: Grant
    Filed: June 6, 2011
    Date of Patent: April 30, 2013
    Assignee: Spirent Communications, Inc.
    Inventors: Kowsik Guruswamy, James Maze
  • Publication number: 20130067560
    Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 14, 2013
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Nir ZUK, Kowsik GURUSWAMY
  • Publication number: 20130067268
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 14, 2013
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Nir ZUK, Yu Ming Mao, Kowsik Guruswamy