Patents by Inventor Orly STAN
Orly STAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250141901Abstract: Apparatus for filtering transactions transmitted from a source to a protected entity, comprising: a transaction filter enforcer which receives a layer 7 transaction destined for a protected application prior to the transaction possibly being supplied to the protected entity; and an evaluator receiving the transaction from the enforcer; the enforcer routing the transaction to the protected entity when the transaction does not receive a determination as being malicious from the evaluator; the evaluator including at least a model that determines a score indicative of the maliciousness of the transaction based on input from at least one trained model, the transaction being supplied to each of the at least one trained model, each of which is a model from a set of model types, the model types including an anomaly model and an attack model; the enforcer operating in real-time and the evaluator operating in at least near real-time.Type: ApplicationFiled: December 27, 2024Publication date: May 1, 2025Applicant: Radware Ltd.Inventors: Amnon LOTEM, David AVIV, Doron SHAVIT, Orly Stan BENCHETRIT
-
Patent number: 11909754Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result. The duplicated environment includes components which are duplicated by one of the duplication level.Type: GrantFiled: March 14, 2018Date of Patent: February 20, 2024Assignees: NEC CORPORATION, B.G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Masaki Inokuchi, Yoshinobu Ohta, Ron Bitton, Orly Stan, Asaf Shabtai, Yuval Elovici
-
Publication number: 20230396588Abstract: A device and method for configuring a web application firewall (WAF) based on characterization of web attacks are provided. The method includes receiving a plurality of hypertext transfer protocol transactions (HTTP) entities; tokenizing the received plurality of HTTP entities based on at least one delimiter; analyzing statistical distribution of each of the at least one delimiter in the tokenized HTTP entities; training a model based on an analysis of the tokenized HTTP entities, when a sufficient number of HTTP entities have been analyzed; and configuring, based on the trained model, the WAF with at least one detection rule to detect at least malicious HTTP transactions.Type: ApplicationFiled: June 3, 2022Publication date: December 7, 2023Applicant: RADWARE LTD.Inventors: Doron SHAVIT, Amnon LOTEM, Orly Stan BENCHETRIT
-
Patent number: 11783048Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user and effects associated with the physical components in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.Type: GrantFiled: March 14, 2018Date of Patent: October 10, 2023Assignees: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Masaki Inokuchi, Yoshinobu Ohta, Ron Bitton, Orly Stan, Tomer Gluck, Asaf Shabtai, Yuval Elovici
-
Publication number: 20210250370Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry, The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.Type: ApplicationFiled: March 14, 2018Publication date: August 12, 2021Applicants: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd.,at Ben-Gurion University.Inventors: Masaki INOKUCHI, Yoshinobu OHTA, Ron BITTON, Orly STAN, Asaf SHABTAI, Yuval ELOVICI
-
Publication number: 20210042423Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user and effects associated with the physical components in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.Type: ApplicationFiled: March 14, 2018Publication date: February 11, 2021Applicants: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Masaki INOKUCHI, Yoshinobu OHTA, Ron BITTON, Orly STAN, Tomer GLUCK, Asaf SHABTAI, Yuval ELOVICI