Patents by Inventor Nariman MAMMADLI
Nariman MAMMADLI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250039214Abstract: Systems and methods for adaptively identifying anomalous network communication traffic. The system includes a processor and a memory coupled to the processor. The memory includes processor-executable instructions that configure the processor to: obtain data associated with a sequence of network communication events; determine that the sequence of communication events is generated by a computing agent based on a symmetricity measure associated with the sequence of network communication events; generate a threat prediction value for the sequence of network communication events prior-generated by the computing agent based on a combination of the symmetricity measure and a randomness measure associated with the network communication events; and transmit a signal for communicating that the sequence of network communication events is a potential malicious sequence of network communication events based on the threat prediction value.Type: ApplicationFiled: October 17, 2024Publication date: January 30, 2025Applicant: ROYAL BANK OF CANADAInventors: Nariman MAMMADLI, Atanas VIYACHKI
-
Publication number: 20250013757Abstract: Methods, systems, and techniques for facilitating identification of electronic data exfiltration. A message transmission log and screenshot metadata are obtained. A screenshot corresponding to the screenshot metadata is matched to a sent electronic message, such as an email, having a file attachment represented in the message transmission log to generate an event. The screenshot metadata indicates that the screenshot was captured prior to when the message transmission log indicates the electronic message was sent. An anomaly score is determined for the sent electronic message is determined by applying unsupervised machine learning, such as by applying an isolation forest, to score the sent electronic message relative to a baseline. The anomaly score meeting or exceeding an anomaly threshold is treated as potentially being indicative of electronic data exfiltration.Type: ApplicationFiled: April 16, 2024Publication date: January 9, 2025Applicant: Royal Bank of CanadaInventors: Nariman MAMMADLI, Dhanya JOTHIMANI, Ramanpreet SINGH, Cathal SMYTH, Felix KURMISH, Amit Kumar TIWARI
-
Patent number: 12126638Abstract: Systems and methods for adaptively identifying anomalous network communication traffic. The system includes a processor and a memory coupled to the processor. The memory includes processor-executable instructions that configure the processor to: obtain data associated with a sequence of network communication events; determine that the sequence of communication events is generated by a computing agent based on a symmetricity measure associated with the sequence of network communication events; generate a threat prediction value for the sequence of network communication events prior-generated by the computing agent based on a combination of the symmetricity measure and a randomness measure associated with the network communication events; and transmit a signal for communicating that the sequence of network communication events is a potential malicious sequence of network communication events based on the threat prediction value.Type: GrantFiled: July 27, 2021Date of Patent: October 22, 2024Assignee: ROYAL BANK OF CANADAInventors: Nariman Mammadli, Atanas Viyachki
-
Patent number: 12050686Abstract: Systems and methods for database access monitoring are provided. The system comprises at least one processor and a memory storing instructions which when executed by the at least one processor configure the at least one processor to perform the method. The method comprises receiving login event data, generating a vector representation of a subject entity and a vector representation of an object entity associated with a login event in the login event data, determining a distance between the subject entity and the object entity, and determining an anomaly score for the subject entity and the object entity. The anomaly score based at least in part on the distance between the subject entity and object entity.Type: GrantFiled: August 27, 2021Date of Patent: July 30, 2024Assignee: ROYAL BANK OF CANADAInventors: Nariman Mammadli, Hamidreza Sattari
-
Patent number: 12010134Abstract: Systems and methods for monitoring suspicious communication network traffic. The methods include obtaining data associated with a sequence of communication events transmitted via the communication network and determining an entropy approximation measure associated at least one event attribute for the sequence of communication events. The method includes generating a threat prediction value based on an anomaly classification model and the entropy approximation measure. The anomaly classification model is trained based on prior sequences of communication events to identify a non-outlier anomaly range associated with the at least one event attribute. The threat prediction value is generated based on classification of the entropy approximation measure relative to the non-outlier anomaly range associated with the at least one attribute for identifying a potential threat. The method includes transmitting a signal for communicating that the sequence is a potential threat within the communication network.Type: GrantFiled: March 17, 2023Date of Patent: June 11, 2024Assignee: ROYAL BANK OF CANADAInventors: Jamie Gamble, Nariman Mammadli
-
Patent number: 11989310Abstract: Methods, systems, and techniques for facilitating identification of electronic data exfiltration. A message transmission log and screenshot metadata are obtained. A screenshot corresponding to the screenshot metadata is matched to a sent electronic message, such as an email, having a file attachment represented in the message transmission log to generate an event. The screenshot metadata indicates that the screenshot was captured prior to when the message transmission log indicates the electronic message was sent. An anomaly score is determined for the sent electronic message is determined by applying unsupervised machine learning, such as by applying an isolation forest, to score the sent electronic message relative to a baseline. The anomaly score meeting or exceeding an anomaly threshold is treated as potentially being indicative of electronic data exfiltration.Type: GrantFiled: December 14, 2021Date of Patent: May 21, 2024Assignee: ROYAL BANK OF CANADAInventors: Nariman Mammadli, Dhanya Jothimani, Ramanpreet Singh, Cathal Smyth, Felix Kurmish, Amit Kumar Tiwari
-
Publication number: 20230231869Abstract: Systems and methods for monitoring suspicious communication network traffic. The methods include obtaining data associated with a sequence of communication events transmitted via the communication network and determining an entropy approximation measure associated at least one event attribute for the sequence of communication events. The method includes generating a threat prediction value based on an anomaly classification model and the entropy approximation measure. The anomaly classification model is trained based on prior sequences of communication events to identify a non-outlier anomaly range associated with the at least one event attribute. The threat prediction value is generated based on classification of the entropy approximation measure relative to the non-outlier anomaly range associated with the at least one attribute for identifying a potential threat. The method includes transmitting a signal for communicating that the sequence is a potential threat within the communication network.Type: ApplicationFiled: March 17, 2023Publication date: July 20, 2023Inventors: Jamie GAMBLE, Nariman MAMMADLI
-
Publication number: 20230185926Abstract: Methods, systems, and techniques for facilitating identification of electronic data exfiltration. A message transmission log and screenshot metadata are obtained. A screenshot corresponding to the screenshot metadata is matched to a sent electronic message, such as an email, having a file attachment represented in the message transmission log to generate an event. The screenshot metadata indicates that the screenshot was captured prior to when the message transmission log indicates the electronic message was sent. An anomaly score is determined for the sent electronic message is determined by applying unsupervised machine learning, such as by applying an isolation forest, to score the sent electronic message relative to a baseline. The anomaly score meeting or exceeding an anomaly threshold is treated as potentially being indicative of electronic data exfiltration.Type: ApplicationFiled: December 14, 2021Publication date: June 15, 2023Inventors: Nariman Mammadli, Dhanya Jothimani, Ramanpreet Singh, Cathal Smyth, Felix Kurmish, Amitkumar Tiwari
-
Patent number: 11627153Abstract: Systems and methods for monitoring suspicious communication network traffic. The methods include obtaining data associated with a sequence of communication events transmitted via the communication network and determining an entropy approximation measure associated at least one event attribute for the sequence of communication events. The method includes generating a threat prediction value based on an anomaly classification model and the entropy approximation measure. The anomaly classification model is trained based on prior sequences of communication events to identify a non-outlier anomaly range associated with the at least one event attribute. The threat prediction value is generated based on classification of the entropy approximation measure relative to the non-outlier anomaly range associated with the at least one attribute for identifying a potential threat. The method includes transmitting a signal for communicating that the sequence is a potential threat within the communication network.Type: GrantFiled: September 25, 2020Date of Patent: April 11, 2023Assignee: ROYAL BANK OF CANADAInventors: Jamie Gamble, Nariman Mammadli
-
Publication number: 20220067160Abstract: Systems and methods for database access monitoring are provided. The system comprises at least one processor and a memory storing instructions which when executed by the at least one processor configure the at least one processor to perform the method. The method comprises receiving login event data, generating a vector representation of a subject entity and a vector representation of an object entity associated with a login event in the login event data, determining a distance between the subject entity and the object entity, and determining an anomaly score for the subject entity and the object entity. The anomaly score based at least in part on the distance between the subject entity and object entity.Type: ApplicationFiled: August 27, 2021Publication date: March 3, 2022Inventors: Nariman MAMMADLI, Hamidreza SATTARI
-
Publication number: 20210360015Abstract: Systems and methods for adaptively identifying anomalous network communication traffic. The system includes a processor and a memory coupled to the processor. The memory includes processor-executable instructions that configure the processor to: obtain data associated with a sequence of network communication events; determine that the sequence of communication events is generated by a computing agent based on a symmetricity measure associated with the sequence of network communication events; generate a threat prediction value for the sequence of network communication events prior-generated by the computing agent based on a combination of the symmetricity measure and a randomness measure associated with the network communication events; and transmit a signal for communicating that the sequence of network communication events is a potential malicious sequence of network communication events based on the threat prediction value.Type: ApplicationFiled: July 27, 2021Publication date: November 18, 2021Inventors: Nariman MAMMADLI, Atanas VIYACHKI
-
Publication number: 20210092141Abstract: Systems and methods for monitoring suspicious communication network traffic. The methods include obtaining data associated with a sequence of communication events transmitted via the communication network and determining an entropy approximation measure associated at least one event attribute for the sequence of communication events. The method includes generating a threat prediction value based on an anomaly classification model and the entropy approximation measure. The anomaly classification model is trained based on prior sequences of communication events to identify a non-outlier anomaly range associated with the at least one event attribute. The threat prediction value is generated based on classification of the entropy approximation measure relative to the non-outlier anomaly range associated with the at least one attribute for identifying a potential threat. The method includes transmitting a signal for communicating that the sequence is a potential threat within the communication network.Type: ApplicationFiled: September 25, 2020Publication date: March 25, 2021Inventors: Jamie GAMBLE, Nariman MAMMADLI