Patents by Inventor Nitzan Niv
Nitzan Niv has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250148014Abstract: Various embodiments include systems and methods to implement a security platform providing cyberattack detection. The security platform may, with respect to a cloud compute environment, use audit log data that is associated with a particular domain of operational activity within the cloud compute environment. Based on multiple baseline profiles associated with the operational activity, the security platform may use a probabilistic graph to determine a behavioral anomaly. The security platform may, based on the behavioral anomaly, identify a cyberattack.Type: ApplicationFiled: January 10, 2025Publication date: May 8, 2025Applicant: Rapid7 Israel Technologies Ltd.Inventors: Nitzan Niv, Gad Naor
-
Publication number: 20250150347Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: ApplicationFiled: January 10, 2025Publication date: May 8, 2025Applicant: Rapid7 Israel Technologies Ltd.Inventors: Nitzan Niv, Gad Naor
-
Patent number: 12237979Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: GrantFiled: April 8, 2024Date of Patent: February 25, 2025Assignee: Rapid7 Israel Technologies Ltd.Inventors: Nitzan Niv, Gad Naor
-
Patent number: 12235901Abstract: Various embodiments include systems and methods to implement a security platform providing cyberattack detection. The security platform may, with respect to a cloud compute environment, use audit log data that is associated with a particular domain of operational activity within the cloud compute environment. Based on multiple baseline profiles associated with the operational activity, the security platform may use a probabilistic graph to determine a behavioral anomaly. The security platform may, based on the behavioral anomaly, identify a cyberattack.Type: GrantFiled: April 29, 2024Date of Patent: February 25, 2025Assignee: Rapid7 Israel Technologies Ltd.Inventors: Nitzan Niv, Gad Naor
-
Publication number: 20240323202Abstract: Various embodiments include systems and methods to implement a security platform providing cyberattack detection. The security platform may, with respect to a cloud compute environment, use audit log data that is associated with a particular domain of operational activity within the cloud compute environment. Based on multiple baseline profiles associated with the operational activity, the security platform may use a probabilistic graph to determine a behavioral anomaly. The security platform may, based on the behavioral anomaly, identify a cyberattack.Type: ApplicationFiled: April 29, 2024Publication date: September 26, 2024Inventors: Nitzan Niv, Gad Naor
-
Publication number: 20240259271Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: ApplicationFiled: April 8, 2024Publication date: August 1, 2024Applicant: Rapid7 Israel Technologies Ltd.Inventors: Nitzan Niv, Gad Naor
-
Patent number: 12008222Abstract: Various embodiments include systems and methods to implement a security platform providing cyberattack detection. The security platform may, with respect to a cloud compute environment, use audit log data that is associated with a particular domain of operational activity within the cloud compute environment. Based on a domain specific graph representative of factor data and dependencies between factor data, the security platform may determine a behavioral anomaly that is associated with a cyberattack.Type: GrantFiled: November 2, 2022Date of Patent: June 11, 2024Inventors: Nitzan Niv, Gad Naor
-
Patent number: 12010127Abstract: Various embodiments include systems and methods to implement a security platform providing cyberattack detection. The security platform may, with respect to a cloud compute environment, use audit log data that is associated with a particular domain of operational activity within the cloud compute environment. Based on multiple baseline profiles associated with the operational activity, the security platform may use a probabilistic graph to determine a behavioral anomaly. The security platform may, based on the behavioral anomaly, identify a cyberattack.Type: GrantFiled: November 2, 2022Date of Patent: June 11, 2024Inventors: Nitzan Niv, Gad Naor
-
Patent number: 11985040Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: GrantFiled: August 8, 2023Date of Patent: May 14, 2024Assignee: Rapid7 Israel Technologies Ltd.Inventors: Nitzan Niv, Gad Naor
-
Publication number: 20230388195Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: ApplicationFiled: August 8, 2023Publication date: November 30, 2023Applicant: Rapid7 Israel Technologies Ltd.Inventors: Nitzan Niv, Gad Naor
-
Patent number: 11818014Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: GrantFiled: February 1, 2022Date of Patent: November 14, 2023Assignee: Rapid7 Israel Technologies Ltd.Inventors: Nitzan Niv, Gad Naor
-
Patent number: 11683294Abstract: A method by one or more network devices communicatively coupled to a web application layer proxy for profiling parameters of web application layer requests received by the web application layer proxy while preserving privacy. The method includes obtaining masked parameter values associated with a parameter in the web application layer requests, where the masked parameter values associated with the parameter are generated by the web application layer proxy based on masking parameter values associated with the parameter while preserving lengths of the parameter values associated with the parameter and character types of characters in the parameter values associated with the parameter, generating the profile of the parameter based on analyzing the masked parameter values associated with the parameter, and providing the profile of the parameter to the web application layer proxy.Type: GrantFiled: December 30, 2019Date of Patent: June 20, 2023Assignee: IMPERVA, INC.Inventors: Itsik Mantin, Shelly Hershkovitz, Amichai Shulman, Nitzan Niv
-
Patent number: 11425149Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: GrantFiled: January 31, 2019Date of Patent: August 23, 2022Assignee: Rapid7, Inc.Inventors: Nitzan Niv, Gad Naor
-
Publication number: 20220159025Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: ApplicationFiled: February 1, 2022Publication date: May 19, 2022Applicant: Rapid7 Israel Technologies LimitedInventors: Nitzan NIV, Gad NAOR
-
Patent number: 11063960Abstract: According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP client carrying a web application layer message that violates a condition of a security rule, the AD transmits an alert package to an automatic attribute value generation and rule feedback module (AVGRFM). The AVGRFM uses the alert package, and optionally other alert packages from the same AD or other ADs, to automatically generate a new set of attribute values for each of a set of attribute identifiers for use, by the AD or other ADs, in a different security rule than the violated security rule. The new set of attribute values may be used in an attack specific rule to detect a previously unknown web application layer attack.Type: GrantFiled: August 8, 2017Date of Patent: July 13, 2021Assignee: Imperva, Inc.Inventors: Tal Arieh Be'ery, Shelly Hershkovitz, Nitzan Niv, Amichai Shulman
-
Publication number: 20210203642Abstract: A method by one or more network devices communicatively coupled to a web application layer proxy for profiling parameters of web application layer requests received by the web application layer proxy while preserving privacy. The method includes obtaining masked parameter values associated with a parameter in the web application layer requests, where the masked parameter values associated with the parameter are generated by the web application layer proxy based on masking parameter values associated with the parameter while preserving lengths of the parameter values associated with the parameter and character types of characters in the parameter values associated with the parameter, generating the profile of the parameter based on analyzing the masked parameter values associated with the parameter, and providing the profile of the parameter to the web application layer proxy.Type: ApplicationFiled: December 30, 2019Publication date: July 1, 2021Applicant: Imperva, Inc.Inventors: Itsik MANTIN, Shelly HERSHKOVITZ, Amichai SHULMAN, Nitzan NIV
-
Publication number: 20210092142Abstract: A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module. Each set of botnet sources includes a plurality of source identifiers of end stations acting as part of a corresponding botnet. A traffic monitoring module receives the sets of botnet sources from the botnet identification module, and upon a receipt of traffic identified as malicious that was sent by a source identified within one of the sets of botnet sources, activates a protection mechanism with regard to all traffic from all of the sources identified by the one of the sets of botnet sources for an amount of time.Type: ApplicationFiled: December 8, 2020Publication date: March 25, 2021Applicant: Imperva, Inc.Inventors: Nitzan NIV, Amichai SHULMAN
-
Patent number: 10911472Abstract: A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module. Each set of botnet sources includes a plurality of source identifiers of end stations acting as part of a corresponding botnet. A traffic monitoring module receives the sets of botnet sources from the botnet identification module, and upon a receipt of traffic identified as malicious that was sent by a source identified within one of the sets of botnet sources, activates a protection mechanism with regard to all traffic from all of the sources identified by the one of the sets of botnet sources for an amount of time.Type: GrantFiled: February 24, 2017Date of Patent: February 2, 2021Assignee: Imperva, Inc.Inventors: Nitzan Niv, Amichai Shulman
-
Publication number: 20200252416Abstract: A method and system for detecting anomalous network activity in a cloud-based compute environment. The method comprises receiving configuration data and network activity observations for a set of virtual entities in the cloud-based compute environment; creating a profile for each virtual entity in the set of virtual entities, when the virtual entity does not already have an associated profile; dynamically updating the virtual entity of a profile with the respective network activity observations of the virtual entity; and determining whether anomalies have been detected.Type: ApplicationFiled: January 31, 2019Publication date: August 6, 2020Applicant: Alcide.IO, LTD.Inventors: Nitzan NIV, Gad NAOR
-
Patent number: 10673719Abstract: A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module. Each set of botnet sources includes a plurality of source identifiers of end stations acting as part of a corresponding botnet. A traffic monitoring module receives the sets of botnet sources from the botnet identification module, and upon a receipt of traffic identified as malicious that was sent by a source identified within one of the sets of botnet sources, activates a protection mechanism with regard to all traffic from all of the sources identified by the one of the sets of botnet sources for an amount of time.Type: GrantFiled: February 24, 2017Date of Patent: June 2, 2020Assignee: Imperva, Inc.Inventor: Nitzan Niv