Patents by Inventor Moran ZAVDI

Moran ZAVDI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12316659
    Abstract: A system and methods of cybersecurity are provided, implementing: receiving multiple TCP/IP packets destined for a target host; determining from among the multiple TCP/IP packets, a subset of suspicious TCP/IP packets characterized by one or more suspicious traits; for each of the TCP/IP packets characterized by the one or more suspicious traits, extracting a TCP/IP timestamp header value and calculating a normalized timestamp value by subtracting a local system time from the TCP/IP timestamp header value; identifying a subgroup of the TCP/IP packets having a common normalized timestamp value indicative of generation by a common source host; receiving a subsequent TCP/IP packet destined for the target host; determining that the subsequent TCP/IP packet's normalized timestamp value is the common normalized timestamp value; and responsively blocking the subsequent TCP/IP packet from reaching the target host.
    Type: Grant
    Filed: February 4, 2021
    Date of Patent: May 27, 2025
    Assignee: NUCLEON CYBER LTD.
    Inventor: Moran Zavdi
  • Publication number: 20230140533
    Abstract: A system and methods of cybersecurity are provided, implementing: receiving multiple TCP/IP packets destined for a target host; determining from among the multiple TCP/IP packets, a subset of suspicious TCP/IP packets characterized by one or more suspicious traits; for each of the TCP/IP packets characterized by the one or more suspicious traits, extracting a TCP/IP timestamp header value and calculating a normalized timestamp value by subtracting a local system time from the TCP/IP timestamp header value; identifying a subgroup of the TCP/IP packets having a common normalized timestamp value indicative of generation by a common source host; receiving a subsequent TCP/IP packet destined for the target host; determining that the subsequent TCP/IP packet’s normalized timestamp value is the common normalized timestamp value; and responsively blocking the subsequent TCP/IP packet from reaching the target host.
    Type: Application
    Filed: February 4, 2021
    Publication date: May 4, 2023
    Inventor: Moran ZAVDI
  • Patent number: 10785235
    Abstract: A drone unit operatively connected to a server may identify an attack, launched by a botnet, on a resource. A drone unit may continuously and iteratively, while the attack is in progress, determine and report to a server a first set of values of a respective set of operational parameters related to the resource. A drone unit may determine, and report to the server, a second set of values of the set of operational parameters after the attack is terminated. A server may determine an impact of an attack by relating the first set values to the second set of values.
    Type: Grant
    Filed: June 14, 2017
    Date of Patent: September 22, 2020
    Assignee: NUCLEON LTD.
    Inventors: Moran Zavdi, Yossi Accav, Dina Shomer
  • Patent number: 10581916
    Abstract: A polymorphic sensor may be adapted to repeatedly, continuously and/or autonomously: receive a resource selection from a server and imitate the selected resource; detect an attack on the imitated resource; identify the attack and send, to the server, information characterizing the attack; and terminate the imitation of the resource upon receiving a command from the server.
    Type: Grant
    Filed: July 19, 2017
    Date of Patent: March 3, 2020
    Assignee: NUCLEON LTD
    Inventors: Moran Zavdi, Yossi Accav
  • Publication number: 20180027015
    Abstract: A polymorphic sensor may be adapted to repeatedly, continuously and/or autonomously: receive a resource selection from a server and imitate the selected resource; detect an attack on the imitated resource; identify the attack and send, to the server, information characterizing the attack; and terminate the imitation of the resource upon receiving a command from the server.
    Type: Application
    Filed: July 19, 2017
    Publication date: January 25, 2018
    Applicant: NUCLEON LTD.
    Inventors: Moran ZAVDI, Yossi ACCAV, Dina SHOMER
  • Publication number: 20170359360
    Abstract: A drone unit operatively connected to a server may identify an attack, launched by a botnet, on a resource. A drone unit may continuously and iteratively, while the attack is in progress, determine and report to a server a first set of values of a respective set of operational parameters related to the resource. A drone unit may determine, and report to the server, a second set of values of the set of operational parameters after the attack is terminated. A server may determine an impact of an attack by relating the first set values to the second set of values.
    Type: Application
    Filed: June 14, 2017
    Publication date: December 14, 2017
    Inventors: Moran ZAVDI, Yossi Accav, Dina Shomer