Patents by Inventor Oskar Ibatullin
Oskar Ibatullin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9848016Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: GrantFiled: November 14, 2016Date of Patent: December 19, 2017Assignee: Juniper Networks, Inc.Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Patent number: 9838427Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.Type: GrantFiled: October 28, 2016Date of Patent: December 5, 2017Assignee: Juniper Networks, Inc.Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
-
Patent number: 9807110Abstract: A method and system for detecting algorithm-generated domains (AGDs) is disclosed wherein domain names requested by an internal host are categorized or classified using curated data sets, active services (e.g. Internet services), and certainty scores to match domain names to domain names or IP addresses used by command and control servers.Type: GrantFiled: March 10, 2015Date of Patent: October 31, 2017Assignee: Vectra Networks, Inc.Inventors: James Patrick Harlacher, Aditya Sood, Oskar Ibatullin
-
Publication number: 20170063922Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: ApplicationFiled: November 14, 2016Publication date: March 2, 2017Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Publication number: 20170048274Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.Type: ApplicationFiled: October 28, 2016Publication date: February 16, 2017Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
-
Patent number: 9565208Abstract: Approaches for detecting network intrusions, such as malware infection, Trojans, worms, or bot net mining activities includes: identifying one or more threat detections in session datasets, the session datasets corresponding to network traffic from a plurality of hosts; determining a layered detection score, the layered detection score corresponding to a certainty score and threat score; determining a layered host score, the layered host score corresponding to a certainty score and threat score; and generating alarm data comprising the layered detection score and the layered host score. In some embodiments, the network traffic may be received passively through a network switch; for example, by “tapping” the switch. Other additional objects, features, and advantages of the invention are described in the detailed description, figures and claims.Type: GrantFiled: March 10, 2015Date of Patent: February 7, 2017Assignee: Vectra Networks, Inc.Inventors: Oskar Ibatullin, Ryan James Prenger, Nicolas Beauchesne, Karl Matthew Lynn, Oliver Kourosh Tavakoli
-
Patent number: 9497163Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: GrantFiled: December 30, 2015Date of Patent: November 15, 2016Assignee: Juniper Networks, Inc.Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Patent number: 9485276Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.Type: GrantFiled: December 30, 2014Date of Patent: November 1, 2016Assignee: Juniper Networks, Inc.Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
-
Publication number: 20160119286Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: ApplicationFiled: December 30, 2015Publication date: April 28, 2016Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Patent number: 9258328Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: GrantFiled: April 17, 2015Date of Patent: February 9, 2016Assignee: Juniper Networks, Inc.Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Publication number: 20150264070Abstract: A method and system for detecting algorithm-generated domains (AGDs) is disclosed wherein domain names requested by an internal host are categorized or classified using curated data sets, active services (e.g. Internet services), and certainty scores to match domain names to domain names or IP addresses used by command and control servers.Type: ApplicationFiled: March 10, 2015Publication date: September 17, 2015Applicant: VECTRA NETWORKS, INC.Inventors: James Patrick HARLACHER, Aditya SOOD, Oskar IBATULLIN
-
Publication number: 20150264061Abstract: Approaches for detecting network intrusions, such as malware infection, Trojans, worms, or bot net mining activities includes: identifying one or more threat detections in session datasets, the session datasets corresponding to network traffic from a plurality of hosts; determining a layered detection score, the layered detection score corresponding to a certainty score and threat score; determining a layered host score, the layered host score corresponding to a certainty score and threat score; and generating alarm data comprising the layered detection score and the layered host score. In some embodiments, the network traffic may be received passively through a network switch; for example, by “tapping” the switch. Other additional objects, features, and advantages of the invention are described in the detailed description, figures and claims.Type: ApplicationFiled: March 10, 2015Publication date: September 17, 2015Applicant: VECTRA NETWORKS, INC.Inventors: Oskar IBATULLIN, Ryan James PRENGER, Nicolas BEAUCHESNE, Karl Matthew LYNN, Oliver Kourosh TAVAKOLI
-
Patent number: 9106693Abstract: This disclosure describes a global attacker database that utilizes device fingerprinting to uniquely identify devices. For example, a device includes one or more processors and network interface cards to receive network traffic directed to one or more computing devices protected by the device, send, to the remote device, a request for data points of the remote device, wherein the data points include characteristics associated with the remote device, and receive at least a portion of the requested data points. The device also includes a fingerprint module to compare the received portion of the data points to sets of data points associated with known attacker devices, and determine, based on the comparison, whether a first set of data points of a first known attacker device satisfies a similarity threshold. The device also includes an security module to selectively manage, based on the determination, additional network traffic directed to the computing devices.Type: GrantFiled: June 4, 2013Date of Patent: August 11, 2015Assignee: Juniper Networks, Inc.Inventors: Daniel J. Quinlan, Kyle Adams, Oskar Ibatullin, Yuly Tenorio Morales, Robert W. Cameron, Bryan Burns
-
Publication number: 20150222661Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: ApplicationFiled: April 17, 2015Publication date: August 6, 2015Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Publication number: 20150121529Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.Type: ApplicationFiled: December 30, 2014Publication date: April 30, 2015Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
-
Patent number: 9015839Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: GrantFiled: August 30, 2013Date of Patent: April 21, 2015Assignee: Juniper Networks, Inc.Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Publication number: 20150067866Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: ApplicationFiled: August 30, 2013Publication date: March 5, 2015Applicant: Juniper Networks, Inc.Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Publication number: 20140283061Abstract: This disclosure describes a global attacker database that utilizes device fingerprinting to uniquely identify devices. For example, a device includes one or more processors and network interface cards to receive network traffic directed to one or more computing devices protected by the device, send, to the remote device, a request for data points of the remote device, wherein the data points include characteristics associated with the remote device, and receive at least a portion of the requested data points. The device also includes a fingerprint module to compare the received portion of the data points to sets of data points associated with known attacker devices, and determine, based on the comparison, whether a first set of data points of a first known attacker device satisfies a similarity threshold. The device also includes an security module to selectively manage, based on the determination, additional network traffic directed to the computing devices.Type: ApplicationFiled: June 4, 2013Publication date: September 18, 2014Inventors: Daniel J. Quinlan, Kyle Adams, Oskar Ibatullin, Yuly Tenorio Morales, Robert W. Cameron, Bryan Burns
-
Publication number: 20140096229Abstract: A virtual honeypot is configured within a security appliance by configuring one or more network addresses associated with the virtual honeypot. The security appliance receives network traffic destined for the virtual honeypot sent to the one or more network addresses associated with the virtual honeypot, and forwards the traffic to a remote honeypot such that the remote honeypot appears to be connected to a network local to the security appliance.Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Applicant: JUNIPER NETWORKS, INC.Inventors: Bryan Burns, Oskar Ibatullin, Oliver Tavakoli, Robert W. Cameron, Daniel J. Quinlan