Patents by Inventor Mor Rubin
Mor Rubin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11936655Abstract: According to examples, an apparatus may include a processor that may identify activities of an entity on resources over a predetermined period of time, in which the entity is to use permissions assigned to the entity over the resources to perform the identified activities. The processor may also identify which of a plurality of groups of permissions includes the permissions the entity used to perform the identified activities and may determine permutations of the identified plurality of groups of permissions. The processor may further calculate respective scores for each of the determined permutations to identify permutations of the groups of permissions having the lowest scores and may output information pertaining to the determined permutations having the lowest scores.Type: GrantFiled: March 1, 2023Date of Patent: March 19, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventor: Mor Rubin
-
Patent number: 11743284Abstract: Techniques are described herein that are capable of using multiple factors to detect illicit enumeration. Object requests are parsed among request types such that each request type includes object request(s) that share a respective common attribute. Each object request requests information about an object. Scores are generated for the respective request types such that the score for each request type is based at least in part on a count of the object request(s) in the respective request type. The scores for the respective request types are aggregated to provide a malicious activity score that represents a likelihood that the illicit enumeration has occurred. The malicious activity score is compared to a score threshold. A remedial operation is selectively performed with regard to the illicit enumeration based at least in part on whether the malicious activity score is greater than or equal to the score threshold.Type: GrantFiled: January 12, 2021Date of Patent: August 29, 2023Assignee: Microsoft Technology Licensing, LLCInventor: Mor Rubin
-
Publication number: 20230208842Abstract: According to examples, an apparatus may include a processor that may identify activities of an entity on resources over a predetermined period of time, in which the entity is to use permissions assigned to the entity over the resources to perform the identified activities. The processor may also identify which of a plurality of groups of permissions includes the permissions the entity used to perform the identified activities and may determine permutations of the identified plurality of groups of permissions. The processor may further calculate respective scores for each of the determined permutations to identify permutations of the groups of permissions having the lowest scores and may output information pertaining to the determined permutations having the lowest scores.Type: ApplicationFiled: March 1, 2023Publication date: June 29, 2023Applicant: Microsoft Technology Licensing, LLCInventor: Mor RUBIN
-
Patent number: 11611559Abstract: According to examples, an apparatus may include a processor that may identify activities of an entity on resources over a predetermined period of time, in which the entity is to use permissions assigned to the entity over the resources to perform the identified activities. The processor may also identify which of a plurality of groups of permissions includes the permissions the entity used to perform the identified activities and may determine permutations of the identified plurality of groups of permissions. The processor may further calculate respective scores for each of the determined permutations to identify permutations of the groups of permissions having the lowest scores and may output information pertaining to the determined permutations having the lowest scores.Type: GrantFiled: December 16, 2020Date of Patent: March 21, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventor: Mor Rubin
-
Patent number: 11550902Abstract: Techniques are described herein that are capable of using security event correlation to describe an authentication process. Multiple events may describe a common (i.e., same) attempt to authenticate the user. For instance, a first event may include a first description of the attempt, a second event may include a second description of the attempt, and a third event may include a third description of the attempt. The first, second, and third events may be correlated based at least in part on the first, second, and third descriptions. The first, second, and third events may be aggregated to provide an aggregated event that includes an aggregation of the first, second, and third descriptions. An authentication report may be generated to include the aggregation of the first, second, and third descriptions to describe the authentication process.Type: GrantFiled: January 2, 2020Date of Patent: January 10, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Tal Joseph Maor, Mor Rubin, Noa Goren, Yaron Kaner
-
Patent number: 11399039Abstract: Lateral movement between networked computers is detected, and automatically and efficiently assessed by a detection tool to distinguish innocent activity from cyberattacks. By correlating log data about logins and network traffic, the detection tool produces network node sets corresponding to individual movements. If a chain can be built from node sets matching an event sequence pattern that tends to be used by attackers, then the detection tool reports the chain as an illicit lateral movement candidate. Detection patterns define illicitness grounds such as consistency of data transfer sizes, shortness of login intervals, use of suspect protocols, chain scope, and the presence or use of administrator credentials. Detection responses may then isolate computers, inspect them for malware or tampering, obtain forensic images for analysis, tighten exfiltration filtering, and otherwise mitigate against ongoing or future cyberattacks.Type: GrantFiled: January 30, 2020Date of Patent: July 26, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Mor Rubin, Moshe Ben-Nehemia
-
Publication number: 20220224715Abstract: Techniques are described herein that are capable of using multiple factors to detect illicit enumeration. Object requests are parsed among request types such that each request type includes object request(s) that share a respective common attribute. Each object request requests information about an object. Scores are generated for the respective request types such that the score for each request type is based at least in part on a count of the object request(s) in the respective request type. The scores for the respective request types are aggregated to provide a malicious activity score that represents a likelihood that the illicit enumeration has occurred. The malicious activity score is compared to a score threshold. A remedial operation is selectively performed with regard to the illicit enumeration based at least in part on whether the malicious activity score is greater than or equal to the score threshold.Type: ApplicationFiled: January 12, 2021Publication date: July 14, 2022Inventor: Mor RUBIN
-
Publication number: 20220191207Abstract: According to examples, an apparatus may include a processor that may identify activities of an entity on resources over a predetermined period of time, in which the entity is to use permissions assigned to the entity over the resources to perform the identified activities. The processor may also identify which of a plurality of groups of permissions includes the permissions the entity used to perform the identified activities and may determine permutations of the identified plurality of groups of permissions. The processor may further calculate respective scores for each of the determined permutations to identify permutations of the groups of permissions having the lowest scores and may output information pertaining to the determined permutations having the lowest scores.Type: ApplicationFiled: December 16, 2020Publication date: June 16, 2022Applicant: Microsoft Technology Licensing, LLCInventor: Mor Rubin
-
Publication number: 20210336947Abstract: Unauthorized use of user credentials in a network implementing an authentication protocol is detected. Authentication certificates that are observed in the network are uniquely identified and monitored. A baseline profile of the authentication certificates is generated. For a new request to access a resource in the network, a unique identifier for the submitted authentication certificate is generated. If the identifier is new: the submitted authentication certificate is compared to the baseline profile and an alert is generated when the difference from the baseline profile exceeds a threshold. If the unique identifier for the submitted authentication certificate has previously been identified and is not included in the baseline profile, an alert is generated when the source computer associated with the unique identifier is not found in a chain of connection to the original source.Type: ApplicationFiled: April 27, 2020Publication date: October 28, 2021Inventor: Mor RUBIN
-
Publication number: 20210243208Abstract: Lateral movement between networked computers is detected, and automatically and efficiently assessed by a detection tool to distinguish innocent activity from cyberattacks. By correlating log data about logins and network traffic, the detection tool produces network node sets corresponding to individual movements. If a chain can be built from node sets matching an event sequence pattern that tends to be used by attackers, then the detection tool reports the chain as an illicit lateral movement candidate. Detection patterns define illicitness grounds such as consistency of data transfer sizes, shortness of login intervals, use of suspect protocols, chain scope, and the presence or use of administrator credentials. Detection responses may then isolate computers, inspect them for malware or tampering, obtain forensic images for analysis, tighten exfiltration filtering, and otherwise mitigate against ongoing or future cyberattacks.Type: ApplicationFiled: January 30, 2020Publication date: August 5, 2021Inventors: Mor RUBIN, Moshe BEN-NEHEMIA
-
Publication number: 20210209228Abstract: Techniques are described herein that are capable of using security event correlation to describe an authentication process. Multiple events may describe a common (i.e., same) attempt to authenticate the user. For instance, a first event may include a first description of the attempt, a second event may include a second description of the attempt, and a third event may include a third description of the attempt. The first, second, and third events may be correlated based at least in part on the first, second, and third descriptions. The first, second, and third events may be aggregated to provide an aggregated event that includes an aggregation of the first, second, and third descriptions. An authentication report may be generated to include the aggregation of the first, second, and third descriptions to describe the authentication process.Type: ApplicationFiled: January 2, 2020Publication date: July 8, 2021Inventors: Tal Joseph Maor, Mor Rubin, Noa Goren, Yaron Kaner