Patents by Inventor Kowsik Guruswamy
Kowsik Guruswamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12003547Abstract: Disclosed herein are techniques for protecting web applications from untrusted endpoints using remote browser isolation. In an example scenario, a browser isolation system receives a request from a client browser executing on a client device to connect with a remote application accessible via a private network. A surrogate browser is provided to facilitate communications between the client browser and the remote application. A security policy is enforced against the communications.Type: GrantFiled: August 24, 2022Date of Patent: June 4, 2024Assignee: Menlo Security, Inc.Inventors: Kowsik Guruswamy, Stephen John Stanley Thornhill, Andrew Peter Edward Prince, Joshua Frank Wharton
-
Patent number: 11477248Abstract: Disclosed herein are techniques for protecting web applications from untrusted endpoints using remote browser isolation. In an example scenario, a browser isolation system receives a request from a client browser executing on a client device to connect with a remote application accessible via a private network. A surrogate browser is provided to facilitate communications between the client browser and the remote application. A security policy is enforced against the communications.Type: GrantFiled: December 14, 2021Date of Patent: October 18, 2022Assignee: Menlo Security, Inc.Inventors: Kowsik Guruswamy, Stephen John Stanley Thornhill, Andrew Peter Edward Prince, Joshua Frank Wharton
-
Publication number: 20220109700Abstract: Disclosed herein are techniques for protecting web applications from untrusted endpoints using remote browser isolation. In an example scenario, a browser isolation system receives a request from a client browser executing on a client device to connect with a remote application accessible via a private network. A surrogate browser is provided to facilitate communications between the client browser and the remote application. A security policy is enforced against the communications.Type: ApplicationFiled: December 14, 2021Publication date: April 7, 2022Inventors: Kowsik Guruswamy, Stephen John Stanley Thornhill, Andrew Peter Edward Prince, Joshua Frank Wharton
-
Patent number: 11245731Abstract: Disclosed herein are techniques for protecting web applications from untrusted endpoints using remote browser isolation. In an example scenario, a browser isolation system receives a request from a client browser executing on a client device to connect with a remote application accessible via a private network. A surrogate browser is provided to facilitate communications between the client browser and the remote application. A security policy is enforced against the communications.Type: GrantFiled: October 27, 2020Date of Patent: February 8, 2022Assignee: Menlo Security, Inc.Inventors: Kowsik Guruswamy, Stephen John Stanley Thornhill, Andrew Peter Edward Prince, Joshua Frank Wharton
-
Patent number: 9172611Abstract: A discovery system (and corresponding method and computer program product) for automatically discovering assets and their roles and functional relationships in a network system is described. In one aspect, the discovery system interrogates known assets through protocol messages, normalizes response messages, and contextually analyzes the normalized response message to identify additional assets and their roles and functional relationships with the interrogated assets. The discovery system can recursively interrogate newly discovered assets to discover additional assets. In another aspect of the present invention, the discovery system is scheduled to periodically interrogate known assets for up-to-date information of the assets and their roles and functional relationships. Such information can be used to provide various services.Type: GrantFiled: October 29, 2008Date of Patent: October 27, 2015Assignee: Spirent Communications, Inc.Inventor: Kowsik Guruswamy
-
Patent number: 9094372Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.Type: GrantFiled: December 30, 2013Date of Patent: July 28, 2015Assignee: Juniper Networks, Inc.Inventors: Nir Zuk, Kowsik Guruswamy
-
Patent number: 8959197Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.Type: GrantFiled: December 30, 2013Date of Patent: February 17, 2015Assignee: Juniper Networks, Inc.Inventors: Nir Zuk, Yuming Mao, Kowsik Guruswamy
-
Patent number: 8799714Abstract: Various example embodiments are directed to computer-implemented systems and methods for generating tests. A computer system may execute an application host and a browser. Messages originating from the application host and messages directed to the application host may be routed through the browser. The browser may be programmed to capture a plurality of application-level messages, which may comprise a plurality of requests originating from an application host and a plurality of responses directed to the application host. The computer system may generate a test scenario based on the plurality of application-level messages.Type: GrantFiled: March 6, 2012Date of Patent: August 5, 2014Assignee: Spirent Communications, Inc.Inventors: Kowsik Guruswamy, Yuri Khodosh, Joshua Nisenson
-
Publication number: 20140115688Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.Type: ApplicationFiled: December 30, 2013Publication date: April 24, 2014Applicant: Juniper Networks, Inc.Inventors: Nir ZUK, Kowsik Guruswamy
-
Publication number: 20140115379Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.Type: ApplicationFiled: December 30, 2013Publication date: April 24, 2014Applicant: Juniper Networks, Inc.Inventors: Nir ZUK, Yuming Mao, Kowsik Guruswamy
-
Patent number: 8635695Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.Type: GrantFiled: September 14, 2012Date of Patent: January 21, 2014Assignee: Juniper Networks, Inc.Inventors: Nir Zuk, Kowsik Guruswamy
-
Patent number: 8631113Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.Type: GrantFiled: September 14, 2012Date of Patent: January 14, 2014Assignee: Juniper Networks, Inc.Inventors: Nir Zuk, Yu Ming Mao, Kowsik Guruswamy
-
Patent number: 8631499Abstract: A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or more messages to the device. A message can be generated by the security analyzer or generated independently of the security analyzer. The security analyzer uses various methods to identify a particular attack that causes a device to fail or otherwise alter its behavior. Monitoring includes analyzing data (other than messages) output from the device in response to an attack. Packet processing analysis includes analyzing one or more messages generated by the device in response to an attack. Instrumentation includes establishing a baseline snapshot of the device's state when it is operating normally and then attacking the device in multiple ways while obtaining snapshots periodically during the attacks.Type: GrantFiled: January 6, 2012Date of Patent: January 14, 2014Assignee: Spirent Communications, Inc.Inventor: Kowsik Guruswamy
-
Patent number: 8612530Abstract: Various embodiments are directed to testing a pass-through device under test. For example, a computer system may receive a scenario describing a model of a message exchange involving the device under test, which specifies, for at least one message a source address location, a destination address location, and an identifier location. The computer system may also execute a plurality of instances of the scenario. Executing each instance may comprise generating a first outgoing message based on the model of the message exchange; and transmitting the first outgoing message to the device under test. Additionally, the computer system may receive and apply a filter to the first forwarded message from the device under test. Applying the filter may extract a second message exchange identifier value from the identifier location of the first forwarded message. Using the second message exchange identifier, the first forwarded message may be matched to at least one outgoing message.Type: GrantFiled: October 24, 2011Date of Patent: December 17, 2013Assignee: Mu Dynamics, Inc.Inventors: Dmitrijs F. Sapovalovs, Sundar Vasan, Kowsik Guruswamy
-
Patent number: 8601585Abstract: A system is used to analyze the implementation of a protocol by a device-under-analysis (DUA). The system includes a source endpoint, a destination endpoint (the DUA), and a message generator. The source endpoint generates an original message and attempts to send it to the DUA. The original message is intercepted by the message generator, which generates a replacement message. The replacement message is then sent to the DUA instead of the original message. The replacement message is deliberately improper so as to analyze the DUA's implementation of the protocol. The message generator includes a structure recognition system and a mutation system. The structure recognition system determines the underlying structure and/or semantics of a message. After the structure recognition system has determined the structure, it creates a description of the structure (a structure description). The mutation system modifies the message based on the structure description to generate a replacement message.Type: GrantFiled: May 7, 2007Date of Patent: December 3, 2013Assignee: Spirent Communications, Inc.Inventors: Marshall A. Beddoe, Kowsik Guruswamy
-
Patent number: 8590048Abstract: A security analyzer includes a single software application that both sends test messages to a device under analysis (DUA) and receives response messages generated by the DUA in response to the test messages. In this way, synchronization of which response messages correspond to which test messages can be reduced or avoided. The software application further determines whether the DUA operated correctly by analyzing the received response messages.Type: GrantFiled: January 6, 2012Date of Patent: November 19, 2013Assignee: Mu Dynamics, Inc.Inventor: Kowsik Guruswamy
-
Patent number: 8547974Abstract: A packet capture is received from actual network traffic, the traffic including a multiple protocol message exchange. A scenario may be generated based on an analysis of the received packet capture, the scenario modeling the multiple protocol message exchange. The scenario is used to generate tests, for example protocol mutation tests.Type: GrantFiled: May 5, 2011Date of Patent: October 1, 2013Assignee: Mu DynamicsInventors: Kowsik Guruswamy, Nick Baggott, Sundar Vasan, Yuri Khodosh, David Helder
-
Patent number: 8463860Abstract: Various example embodiments are directed to scale testing based on scenarios. A computer system may receive a scenario, which may comprise a plurality of scenario objects including, a first host, a second host, a plurality of transports, a plurality of variables and a plurality of steps. The computer system may also receive a pattern. The scenario may be processed to generate a processed scenario. The computer system may execute a first track including executing a plurality of concurrencies of the processed scenario according to the pattern.Type: GrantFiled: May 27, 2011Date of Patent: June 11, 2013Assignee: Spirent Communications, Inc.Inventors: Kowsik Guruswamy, Dmitrijs F. Sapovalovs
-
Patent number: 8433811Abstract: A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of normalizing communication protocols supported by component systems of the network system. The test system creates objects and methods corresponding to component systems and their supported protocol commands in the network system, and generates unit test cases based on the objects, the methods, and the normalized protocols. The test system transmits the unit test cases to the component systems, receives test results, and validates the test results to ensure that the network system functions properly.Type: GrantFiled: June 6, 2011Date of Patent: April 30, 2013Assignee: Spirent Communications, Inc.Inventors: Kowsik Guruswamy, James Maze
-
Publication number: 20130067268Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.Type: ApplicationFiled: September 14, 2012Publication date: March 14, 2013Applicant: JUNIPER NETWORKS, INC.Inventors: Nir ZUK, Yu Ming Mao, Kowsik Guruswamy