Patents by Inventor Marcus Maloof

Marcus Maloof has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8707431
    Abstract: Methods, systems, and computer program products for insider threat detection are provided. Embodiments detect insiders who act on documents and/or files to which they have access but whose activity is inappropriate or uncharacteristic of them based on their identity, past activity, and/or organizational context. Embodiments work by monitoring the network to detect network activity associated with a set of network protocols; processing the detected activity to generate information-use events; generating contextual information associated with users of the network; and processing the information-use events based on the generated contextual information to generate alerts and threat scores for users of the network. Embodiments provide several information-misuse detectors that are used to examine generated information-use events in view of collected contextual information to detect volumetric anomalies, suspicious and/or evasive behavior.
    Type: Grant
    Filed: April 24, 2007
    Date of Patent: April 22, 2014
    Assignee: The MITRE Corporation
    Inventors: Gregory D. Stephens, Marcus A. Maloof
  • Patent number: 8438174
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.
    Type: Grant
    Filed: June 24, 2010
    Date of Patent: May 7, 2013
    Assignee: Georgetown University
    Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
  • Patent number: 8312023
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    Type: Grant
    Filed: May 12, 2008
    Date of Patent: November 13, 2012
    Assignee: Georgetown University
    Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
  • Patent number: 8280905
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: October 2, 2012
    Assignee: Georgetown University
    Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
  • Patent number: 8037535
    Abstract: A system and method for detecting malicious executable software code. Benign and malicious executables are gathered; and each are encoded as a training example using n-grams of byte codes as features. After selecting the most relevant n-grams for prediction, a plurality of inductive methods, including naive Bayes, decision trees, support vector machines, and boosting, are evaluated.
    Type: Grant
    Filed: August 12, 2005
    Date of Patent: October 11, 2011
    Assignee: Georgetown University
    Inventor: Marcus A. Maloof
  • Publication number: 20100287196
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.
    Type: Application
    Filed: June 24, 2010
    Publication date: November 11, 2010
    Inventors: Thomas Clay SHIELDS, Ophir Frieder, Marcus A. Maloof
  • Publication number: 20090164517
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Inventors: Thomas Clay SHIELDS, Ophir Frieder, Marcus A. Maloof
  • Publication number: 20090164427
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    Type: Application
    Filed: May 12, 2008
    Publication date: June 25, 2009
    Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
  • Publication number: 20080271143
    Abstract: Methods, systems, and computer program products for insider threat detection are provided. Embodiments detect insiders who act on documents and/or files to which they have access but whose activity is inappropriate or uncharacteristic of them based on their identity, past activity, and/or organizational context. Embodiments work by monitoring the network to detect network activity associated with a set of network protocols; processing the detected activity to generate information-use events; generating contextual information associated with users of the network; and processing the information-use events based on the generated contextual information to generate alerts and threat scores for users of the network. Embodiments provide several information-misuse detectors that are used to examine generated information-use events in view of collected contextual information to detect volumetric anomalies, suspicious and/or evasive behavior.
    Type: Application
    Filed: April 24, 2007
    Publication date: October 30, 2008
    Applicant: The MITRE Corporation
    Inventors: Gregory D. Stephens, Marcus A. Maloof
  • Publication number: 20060037080
    Abstract: A system and method for detecting malicious executable software code. Benign and malicious executables are gathered; and each are encoded as a training example using n-grams of byte codes as features. After selecting the most relevant n-grams for prediction, a plurality of inductive methods, including naive Bayes, decision trees, support vector machines, and boosting, are evaluated.
    Type: Application
    Filed: August 12, 2005
    Publication date: February 16, 2006
    Applicant: GEORGETOWN UNIVERSITY
    Inventor: Marcus Maloof