Patents by Inventor Mark DEHUS
Mark DEHUS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250141871Abstract: The present application describes systems and methods for network-based blocking threat intelligence. An access control list (ACL) generator may modify ACLs and provide modified ACLs to provider edge routers based on the capabilities of the provider edge routers. In some cases, an additional provider edge router that is more capable of implementing longer ACLs may be used. In some cases, a collector may identify when threat communications are bypassing provider edge routers with limited ACL lengths and provide the customer an opportunity to buy a better router or access to an additional router that supports longer or additional ACLs. A threat intelligence system may update (e.g., continuously update) the ACL provided to the ACL generator, and the ACL generator may accordingly update the modified ACLs provided to the provider edge routers.Type: ApplicationFiled: January 29, 2024Publication date: May 1, 2025Applicant: Level 3 Communications, LLCInventors: Peter BRECL, Mark DEHUS
-
Publication number: 20240422122Abstract: The present application describes a system and method for passively collecting DNS traffic data as that data is passed between a recursive DNS resolver and an authoritative DNS server. The information contained in the collected DNS traffic data is used to generate a virtual authoritative DNS server, or a zone associated with the authoritative DNS server, when it is determined that the authoritative DNS server has been compromised.Type: ApplicationFiled: August 29, 2024Publication date: December 19, 2024Applicant: Level 3 Communications, LLCInventors: John R. Woodworth, Dean Ballew, Mark Dehus
-
Publication number: 20240372926Abstract: Novel tools and techniques are provided for implementing object-based changes to filter-intent over multicast or publication/subscription (“Pub/Sub”) distribution. In various embodiments, a computing system (e.g., a managed device among a plurality of managed devices and/or its corresponding agent) may receive, from a network filter orchestration conductor, a global filter-intent list including a first filter intent that references a corresponding filter-intent object. The computing system may determine whether the at least one first filter intent applies to the managed device. If so, the computing system may translate the at least one first filter intent into a first filter that is specific to a first configuration of the managed device, in some cases, by building the first filter based at least in part on the at least one first filter intent. The computing system may subsequently apply the first filter to one or more network communications handled by the managed device.Type: ApplicationFiled: April 30, 2024Publication date: November 7, 2024Applicant: Level 3 Communications, LLCInventors: Dean BALLEW, John R.B. WOODWORTH, Brian J. STRONG, Robert J. WHELTON, Tom DONAHUE, John A. SCHIEL, Mark DEHUS
-
Publication number: 20240340318Abstract: Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.Type: ApplicationFiled: June 13, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventors: David Dubois, Michael Benjamin, Mark Dehus, Peter Brecl
-
Patent number: 12081512Abstract: The present application describes a system and method for passively collecting DNS traffic data as that data is passed between a recursive DNS resolver and an authoritative DNS server. The information contained in the collected DNS traffic data is used to generate a virtual authoritative DNS server, or a zone associated with the authoritative DNS server, when it is determined that the authoritative DNS server has been compromised.Type: GrantFiled: June 1, 2023Date of Patent: September 3, 2024Assignee: Level 3 Communications, LLCInventors: John R. Woodworth, Dean Ballew, Mark Dehus
-
Patent number: 12015644Abstract: Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.Type: GrantFiled: April 10, 2020Date of Patent: June 18, 2024Assignee: Level 3 Communications, LLCInventors: David Dubois, Michael Benjamin, Mark Dehus, Peter Brecl
-
Publication number: 20230308414Abstract: The present application describes a system and method for passively collecting DNS traffic data as that data is passed between a recursive DNS resolver and an authoritative DNS server. The information contained in the collected DNS traffic data is used to generate a virtual authoritative DNS server, or a zone associated with the authoritative DNS server, when it is determined that the authoritative DNS server has been compromised.Type: ApplicationFiled: June 1, 2023Publication date: September 28, 2023Applicant: Level 3 Communications, LLCInventors: John R. Woodworth, Dean Ballew, Mark Dehus
-
Patent number: 11677714Abstract: The present application describes a system and method for passively collecting DNS traffic data as that data is passed between a recursive DNS resolver and an authoritative DNS server. The information contained in the collected DNS traffic data is used to generate a virtual authoritative DNS server, or a zone associated with the authoritative DNS server, when it is determined that the authoritative DNS server has been compromised.Type: GrantFiled: September 20, 2021Date of Patent: June 13, 2023Assignee: Level 3 Communications, LLCInventors: John R. Woodworth, Dean Ballew, Mark Dehus
-
Publication number: 20230069845Abstract: The present application describes systems and methods for populating a DNS cache of a recursive DNS server using information gathered by a threat intelligence system. The threat intelligence system may collect some or all DNS responses from one or more recursive DNS servers as the one or more DNS servers process various received requests. Since the threat intelligence engine has access to this DNS data, the DNS data may be used to seed a DNS cache of a recursive DNS server.Type: ApplicationFiled: August 26, 2022Publication date: March 9, 2023Applicant: Level 3 Communications, LLCInventors: John R.B. Woodworth, Dean Ballew, Dan LUTHER, Mark DEHUS
-
Publication number: 20220094661Abstract: The present application describes a system and method for passively collecting DNS traffic data as that data is passed between a recursive DNS resolver and an authoritative DNS server. The information contained in the collected DNS traffic data is used to generate a virtual authoritative DNS server, or a zone associated with the authoritative DNS server, when it is determined that the authoritative DNS server has been compromised.Type: ApplicationFiled: September 20, 2021Publication date: March 24, 2022Applicant: Level 3 Communications, LLCInventors: John R. WOODWORTH, Dean BALLEW, Mark DEHUS
-
Publication number: 20200329072Abstract: Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.Type: ApplicationFiled: April 10, 2020Publication date: October 15, 2020Inventors: David DUBOIS, Michael BENJAMIN, Mark DEHUS, Peter BRECL