Patents by Inventor Louis William DiValentin
Louis William DiValentin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240250979Abstract: Implementations include a computer-implemented method comprising: obtaining data representing observed conditions in an enterprise network, each observed condition being associated with at least one cybersecurity issue, a cybersecurity issue comprising one of (i) a vulnerability comprising an instance of a vulnerable condition or (ii) a weakness that is likely to cause a vulnerability to occur; using a plurality of exploitation prediction models to determine probabilities of exploitation of the cybersecurity issues associated with the observed conditions in the enterprise network, wherein the plurality of exploitation prediction models are trained using a knowledge mesh generated using data from cybersecurity repositories; assigning a priority ranking to each of the observed conditions in the enterprise network based on the respective probabilities of exploitation for the cybersecurity issues associated with the observed conditions; and performing one or more actions to mitigate the observed conditions in theType: ApplicationFiled: January 11, 2024Publication date: July 25, 2024Inventors: Aolin Ding, Hodaya Binyamini, Gal Engelberg, Louis William DiValentin, Benjamin Glen McCarty, Dan Klein, Amin Hass
-
Publication number: 20230412635Abstract: Implementations include a computer-implemented method for reducing cyber-security risk, comprising: accessing a knowledge mesh including a plurality of modules, wherein each module is associated with a respective aspect and maintains a knowledge graph specific to the respective aspect, wherein each knowledge graph is generated using data from one or more cyber-security repositories and includes nodes and connections between the nodes; performing an information completion process to generate connections between nodes of knowledge graphs maintained by different modules of the knowledge mesh, including performing at least one of: inheritance-based inference; natural language processing classifier-based inference; or natural language processing-based object matching inference; and identifying, using the generated connections between the nodes of the knowledge graphs, one or more actions to reduce cyber-security risk.Type: ApplicationFiled: June 15, 2023Publication date: December 21, 2023Inventors: Hodaya Binyamini, Louis William DiValentin, Gal Engelberg, Dan Klein, Moshe Hadad, Petra Genc, Roei Levi
-
Patent number: 11323460Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: GrantFiled: October 30, 2019Date of Patent: May 3, 2022Assignee: Accenture Global Solutions LimitedInventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
-
Patent number: 11212306Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: GrantFiled: December 23, 2019Date of Patent: December 28, 2021Assignee: Accenture Global Solutions LimitedInventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
-
Patent number: 11122063Abstract: Identification of malicious network domains through use of links analysis of graph representation of network activity, such as a bipartite graphs. An example method includes setting an initial reputation score for each of a plurality of host computers and each of a plurality of domains accessed by the plurality of host computers; until a predefined condition is satisfied, iteratively rescoring the reputation scores for each of the plurality of host computers based upon the reputation scores of the plurality of domains; and rescoring the reputation scores for each of the plurality of domains based upon the reputation scores of the plurality of host computers; and determining, based upon the rescored reputation scores for each of the plurality of host computers and the rescored reputation scores for each of the plurality of domains, whether one or more domains amongst the plurality of domains are exhibiting malicious behavior.Type: GrantFiled: March 12, 2018Date of Patent: September 14, 2021Assignee: Accenture Global Solutions LimitedInventors: Louis William DiValentin, Dillon J. Cullinan
-
Publication number: 20200145441Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: ApplicationFiled: December 23, 2019Publication date: May 7, 2020Inventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
-
Publication number: 20200076836Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: ApplicationFiled: October 30, 2019Publication date: March 5, 2020Inventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
-
Patent number: 10530796Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: GrantFiled: September 6, 2017Date of Patent: January 7, 2020Assignee: Accenture Global Solutions LimitedInventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
-
Patent number: 10476896Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: GrantFiled: September 13, 2016Date of Patent: November 12, 2019Assignee: Accenture Global Solutions LimitedInventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
-
Patent number: 10447733Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing deception networks. One of the systems includes a threat information server configured to monitor and control security threats, a management process orchestration server configured to receive one or more identified security threats from the threat information server and develop a response process applicable to each identified security threat, a network switching controller in communication with one or more network switching devices, a target computing device connected to one of the network switching devices, and an indicator analytics processor configured to generate threat intelligence based on activity observed on the target device and provide the observed threat intelligence to the threat information server. The threat information server can receive threat intelligence information, identify key indicators, and generate identified security threats.Type: GrantFiled: August 29, 2014Date of Patent: October 15, 2019Assignee: Accenture Global Services LimitedInventors: Louis William DiValentin, Matthew Carver, Michael L. Lefebvre, David William Rozmiarek, Eric Ellett
-
Publication number: 20190158520Abstract: Identification of malicious network domains through use of links analysis of graph representation of network activity, such as a bipartite graphs. An example method includes setting an initial reputation score for each of a plurality of host computers and each of a plurality of domains accessed by the plurality of host computers; until a predefined condition is satisfied, iteratively rescoring the reputation scores for each of the plurality of host computers based upon the reputation scores of the plurality of domains; and rescoring the reputation scores for each of the plurality of domains based upon the reputation scores of the plurality of host computers; and determining, based upon the rescored reputation scores for each of the plurality of host computers and the rescored reputation scores for each of the plurality of domains, whether one or more domains amongst the plurality of domains are exhibiting malicious behavior.Type: ApplicationFiled: March 12, 2018Publication date: May 23, 2019Inventors: Louis William DiValentin, Dillon J. Cullinan
-
Publication number: 20190132358Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing deception networks. One of the systems includes a threat information server configured to monitor and control security threats, a management process orchestration server configured to receive one or more identified security threats from the threat information server and develop a response process applicable to each identified security threat, a network switching controller in communication with one or more network switching devices, a target computing device connected to one of the network switching devices, and an indicator analytics processor configured to generate threat intelligence based on activity observed on the target device and provide the observed threat intelligence to the threat information server. The threat information server can receive threat intelligence information, identify key indicators, and generate identified security threats.Type: ApplicationFiled: August 29, 2014Publication date: May 2, 2019Applicant: ACCENTURE GLOBAL SERVICES LIMITEDInventors: Louis William DiValentin, Matthew Carver, Michael L. Lefebvre, David William Rozmiarek, Eric Ellett
-
Patent number: 10270795Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying network security risks. One of the methods includes receiving organizational hierarchy data and receiving access privilege data for a network, generating an adjacency matrix that represents connections between individuals within the organizational hierarchy and various groups, and that represents connections between the individuals and various access privileges, selecting an analytic technique for analyzing the adjacency matrix, determining, for each individual, an individual score that represents a security risk associated with the individual's network account, and in response to determining that the individual score meets a threshold, applying security controls.Type: GrantFiled: April 12, 2018Date of Patent: April 23, 2019Assignee: Accenture Global Solutions LimitedInventors: Louis William DiValentin, Matthew Carver
-
Publication number: 20180234448Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying network security risks. One of the methods includes receiving organizational hierarchy data and receiving access privilege data for a network, generating an adjacency matrix that represents connections between individuals within the organizational hierarchy and various groups, and that represents connections between the individuals and various access privileges, selecting an analytic technique for analyzing the adjacency matrix, determining, for each individual, an individual score that represents a security risk associated with the individual's network account, and in response to determining that the individual score meets a threshold, applying security controls.Type: ApplicationFiled: April 12, 2018Publication date: August 16, 2018Inventors: Louis William DiValentin, Matthew Carver
-
Patent number: 10051010Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in a computing network. One of the methods includes identifying a security incident based on detecting one or more indicators of compromise associated with the security incident, comparing the security incident with a predefined ontology that maps the security incident to one or more courses of action, selecting a response strategy that includes one or more of the courses of action, and implementing the response strategy as an automated response.Type: GrantFiled: October 25, 2017Date of Patent: August 14, 2018Assignee: Accenture Global Services LimitedInventors: Matthew Carver, Louis William DiValentin, Michael L. Lefebvre, Elvis Hovor, David William Rozmiarek
-
Patent number: 10021127Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the methods includes receiving by a threat information server, threat intelligence information from one or more intelligence feeds and generating one or more identified security threats, identifying a compromise by a management process orchestration server and retrieving information from the threat information server and identifying one or more actions to be performed, determining by an indicator analytics processor, a composite credibility based on the actions, and determining one or more components for profiling and determining indicators of compromise for each component, and communicating the indicators of compromise to the management process orchestration server.Type: GrantFiled: October 12, 2017Date of Patent: July 10, 2018Assignee: Accenture Global Services LimitedInventors: Louis William DiValentin, Matthew Carver, Michael L. Lefebvre
-
Patent number: 10009366Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the methods includes generating a network map including at least a plurality of network nodes and a plurality of edges that indicate communications paths between the plurality of network nodes, obtaining first data indicating network activity over the edges and between the plurality of network nodes for a first time period, generating a model of expected network activity over the edges and between the plurality of network nodes for a future time period using the network map and the first data, obtaining second data indicating network activity over the edges and between the plurality of network nodes for a second time period, and determining an anomaly score using a comparison between the second data and the model of expected network activity.Type: GrantFiled: July 12, 2017Date of Patent: June 26, 2018Assignee: Accenture Global Services LimitedInventors: Michael L. Lefebvre, Matthew Carver, Eric Ellett, Walid Negm, Louis William DiValentin, James J. Solderitsch
-
Patent number: 9973522Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying network security risks. One of the methods includes receiving organizational hierarchy data and receiving access privilege data for a network, generating an adjacency matrix that represents connections between individuals within the organizational hierarchy and various groups, and that represents connections between the individuals and various access privileges, selecting an analytic technique for analyzing the adjacency matrix, determining, for each individual, an individual score that represents a security risk associated with the individual's network account, and in response to determining that the individual score meets a threshold, applying security controls.Type: GrantFiled: July 8, 2016Date of Patent: May 15, 2018Assignee: Accenture Global Solutions LimitedInventors: Louis William DiValentin, Matthew Carver
-
Publication number: 20180097847Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in a computing network. One of the methods includes identifying a security incident based on detecting one or more indicators of compromise associated with the security incident, comparing the security incident with a predefined ontology that maps the security incident to one or more courses of action, selecting a response strategy that includes one or more of the courses of action, and implementing the response strategy as an automated response.Type: ApplicationFiled: October 25, 2017Publication date: April 5, 2018Inventors: Matthew Carver, Louis William DiValentin, Michael L. Lefebvre, Elvis Hovor, David William Rozmiarek
-
Publication number: 20180077175Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: ApplicationFiled: September 13, 2016Publication date: March 15, 2018Inventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt