Patents by Inventor Kowsik Guruswamy

Kowsik Guruswamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8370936
    Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: February 5, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Nir Zuk, Kowsik Guruswamy
  • Patent number: 8359653
    Abstract: A security analyzer is capable of generating attacks to test the security of a device under analysis. The security analyzer further has the capability to generate a portable, executable program to generate specified attacks. In this way, others can recreate the attacks without requiring access to the security analyzer.
    Type: Grant
    Filed: June 7, 2011
    Date of Patent: January 22, 2013
    Assignee: Spirent Communications, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 8326961
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Grant
    Filed: April 23, 2010
    Date of Patent: December 4, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Nir Zuk, Yu Ming Mao, Kowsik Guruswamy
  • Patent number: 8316447
    Abstract: A security analyzer analyzes a security of a device-under-analysis (DUA). In one embodiment, the security analyzer identifies two or more valid message-delivery preconditions for a communication protocol supported by the DUA. One of the identified valid message-delivery preconditions is selected and the security analyzer delivers an attack to the DUA according to the selected message-delivery precondition. The same or similar attacks can also be delivered to the DUA via other message-delivery preconditions. Based on the DUA's response, the security analyzer determines whether a vulnerability has been found.
    Type: Grant
    Filed: November 8, 2006
    Date of Patent: November 20, 2012
    Assignee: Mu Dynamics, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 8266267
    Abstract: A network device is capable of recognizing and blocking network attacks associated with packet flows regardless of whether the packet flows are encapsulated within network tunnels. For example, the network device includes a filter module that receives packets associated with a network tunnel from an ingress device to an egress device. The filter module applies heuristics to determine whether the packets encapsulate encrypted data units. If the data units are not encrypted, the filter module extracts the data units and generates temporary packets for use within the network device. An attack detection engine within the device analyzes the temporary packets to detect any network attacks carried by the encapsulated data units. A forwarding component selectively forwards the packets to the egress device based on whether any network attacks are detected.
    Type: Grant
    Filed: August 26, 2010
    Date of Patent: September 11, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Kowsik Guruswamy, Siyang Yang
  • Patent number: 8250658
    Abstract: A security analysis methodology is used to analyze the security of a device-under-analysis (DUA) with respect to a particular protocol message exchange. First, the mutation points that exist in the message exchange are determined. Then, the message exchange is executed multiple times—once for each mutation point. Each execution applies the mutation associated with that particular mutation point (e.g., a particular message during the exchange is modified in a particular way) to create a mutated message exchange. In other words, each message exchange with an applied mutation point corresponds to a test case.
    Type: Grant
    Filed: September 20, 2007
    Date of Patent: August 21, 2012
    Assignee: Mu Dynamics, Inc.
    Inventors: Adam Bozanich, Kowsik Guruswamy, Marshall A. Beddoe
  • Patent number: 8209756
    Abstract: An intrusion detection and prevention (IDP) device includes an attack detection module and a forwarding component. The attack detection module applies a compound attack definition to a packet flow of a computer network to determine whether the packet flow includes at least one pattern and at least one protocol anomaly. The forwarding component selectively discards the packet flow based on the determination. The IDP device may further include a reassembly module to form application-layer communications from the packet flows, and a plurality of protocol-specific decoders to process the application-layer communications to extract application-layer elements and detect protocol anomalies.
    Type: Grant
    Filed: January 27, 2005
    Date of Patent: June 26, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Kowsik Guruswamy, Siu-Wang Leung
  • Publication number: 20120137370
    Abstract: A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or more messages to the device. A message can be generated by the security analyzer or generated independently of the security analyzer. The security analyzer uses various methods to identify a particular attack that causes a device to fail or otherwise alter its behavior. Monitoring includes analyzing data (other than messages) output from the device in response to an attack. Packet processing analysis includes analyzing one or more messages generated by the device in response to an attack. Instrumentation includes establishing a baseline snapshot of the device's state when it is operating normally and then attacking the device in multiple ways while obtaining snapshots periodically during the attacks.
    Type: Application
    Filed: January 6, 2012
    Publication date: May 31, 2012
    Applicant: Mu Dynamics, Inc.
    Inventor: Kowsik Guruswamy
  • Publication number: 20120124670
    Abstract: A security analyzer includes a single software application that both sends test messages to a device under analysis (DUA) and receives response messages generated by the DUA in response to the test messages. In this way, synchronization of which response messages correspond to which test messages can be reduced or avoided. The software application further determines whether the DUA operated correctly by analyzing the received response messages.
    Type: Application
    Filed: January 6, 2012
    Publication date: May 17, 2012
    Applicant: Mu Dynamics, Inc.
    Inventor: KOWSIK GURUSWAMY
  • Patent number: 8095982
    Abstract: A security analyzer includes a single software application that both sends test messages to a device under analysis (DUA) and receives response messages generated by the DUA in response to the test messages. In this way, synchronization of which response messages correspond to which test messages can be reduced or avoided. The software application further determines whether the DUA operated correctly by analyzing the received response messages.
    Type: Grant
    Filed: February 10, 2006
    Date of Patent: January 10, 2012
    Assignee: Mu Dynamics, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 8095983
    Abstract: A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or more messages to the device. A message can be generated by the security analyzer or generated independently of the security analyzer. The security analyzer uses various methods to identify a particular attack that causes a device to fail or otherwise alter its behavior. Monitoring includes analyzing data (other than messages) output from the device in response to an attack. Packet processing analysis includes analyzing one or more messages generated by the device in response to an attack. Instrumentation includes establishing a baseline snapshot of the device's state when it is operating normally and then attacking the device in multiple ways while obtaining snapshots periodically during the attacks.
    Type: Grant
    Filed: February 10, 2006
    Date of Patent: January 10, 2012
    Assignee: Mu Dynamics, Inc.
    Inventor: Kowsik Guruswamy
  • Publication number: 20110271348
    Abstract: A security analyzer is capable of generating attacks to test the security of a device under analysis. The security analyzer further has the capability to generate a portable, executable program to generate specified attacks. In this way, others can recreate the attacks without requiring access to the security analyzer.
    Type: Application
    Filed: June 7, 2011
    Publication date: November 3, 2011
    Applicant: Mu Dynamics, Inc.
    Inventor: Kowsik GURUSWAMY
  • Publication number: 20110238852
    Abstract: A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of normalizing communication protocols supported by component systems of the network system. The test system creates objects and methods corresponding to component systems and their supported protocol commands in the network system, and generates unit test cases based on the objects, the methods, and the normalized protocols. The test system transmits the unit test cases to the component systems, receives test results, and validates the test results to ensure that the network system functions properly.
    Type: Application
    Filed: June 6, 2011
    Publication date: September 29, 2011
    Applicant: Mu Dynamics, Inc.
    Inventors: Kowsik GURUSWAMY, James Maze
  • Patent number: 7958230
    Abstract: A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of normalizing communication protocols supported by component systems of the network system. The test system creates objects and methods corresponding to component systems and their supported protocol commands in the network system, and generates unit test cases based on the objects, the methods, and the normalized protocols. The test system transmits the unit test cases to the component systems, receives test results, and validates the test results to ensure that the network system functions properly.
    Type: Grant
    Filed: September 19, 2008
    Date of Patent: June 7, 2011
    Assignee: MU Dynamics, Inc.
    Inventors: Kowsik Guruswamy, James Maze
  • Patent number: 7958560
    Abstract: A security analyzer is capable of generating attacks to test the security of a device under analysis. The security analyzer further has the capability to generate a portable, executable program to generate specified attacks. In this way, others can recreate the attacks without requiring access to the security analyzer.
    Type: Grant
    Filed: February 10, 2006
    Date of Patent: June 7, 2011
    Assignee: Mu Dynamics, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 7954161
    Abstract: A system and method to identify and characterize nonfatal failures of a device-under-analysis (DUA). A security analyzer executes attacks to test the security of the DUA. During the attacks, the security analyzer periodically sends an instrumentation command to the DUA and measures the time the DUA takes to successfully respond to the instrumentation command (the response time sample). The security analyzer uses the response time samples to identify and/or characterize the nonfatal failures in the DUA caused by the attacks.
    Type: Grant
    Filed: June 8, 2007
    Date of Patent: May 31, 2011
    Assignee: MU Dynamics, Inc.
    Inventors: Kowsik Guruswamy, Ajit Sancheti
  • Patent number: 7937755
    Abstract: A correlation database stores profiling data that describes packet flows within a network. A network device stores a set of rules for permissible packet flows within the network. The network device queries the correlation database and identifies any of the packet flows within the correlation database that are exceptions to the rules. Each of the rules may specify network elements and application-layer elements to define permissible traffic characteristics for the network.
    Type: Grant
    Filed: January 27, 2005
    Date of Patent: May 3, 2011
    Assignee: Juniper Networks, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 7809826
    Abstract: A plurality of network devices monitor network traffic and generate profiling data that describes packet flows within the network traffic. The network devices output communications that include the profiling data. An aggregation device receives the communications and builds a correlation database to aggregate the profiling data generated by the plurality of network devices. The profiling data may relate low-level network elements associated with the packet flows and application-layer elements extracted from application-layer communications reassembled from the packet flows.
    Type: Grant
    Filed: January 27, 2005
    Date of Patent: October 5, 2010
    Assignee: Juniper Networks, Inc.
    Inventor: Kowsik Guruswamy
  • Patent number: 7810151
    Abstract: A correlation database stores profiling data that describes packet flows within a network. A network device presents a user interface by which a user defines a database trigger to detect database operations that change to the profiling data stored within the correlation database. The network device may maintain a log to record the detected database operations. The database trigger may specify a combination of low-level network elements associated with the packet flows and application-layer elements extracted from application-layer communications reassembled from the packet flows.
    Type: Grant
    Filed: January 27, 2005
    Date of Patent: October 5, 2010
    Assignee: Juniper Networks, Inc.
    Inventor: Kowsik Guruswamy
  • Publication number: 20100242093
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Application
    Filed: April 23, 2010
    Publication date: September 23, 2010
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Nir ZUK, Yu Ming MAO, Kowsik GURUSWAMY