Patents by Inventor Paolo PALUMBO
Paolo PALUMBO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230388328Abstract: Disclosed is a threat detection network for monitoring a security threat for a computer network, including a back end system and sensors coupled to the back end system, wherein each sensor: collects data describing respective predefined events in a respective node of the network, each event involving interaction of a subject entity operating in the respective node with an object entity associated with the node, applies predefined anomaly detection models to determine respective anomaly detection scores for interactions captured in the collected data, arranges the captured interactions into a local activity graph describing interactions of subject entities operating in the node with object entities associated with the node, and transmits portions of the local activity graph as status data to the back end system depending on the anomaly scores for the respective interactions captured in the local activity graph. The back end system derives security parameters describing security threats.Type: ApplicationFiled: May 30, 2023Publication date: November 30, 2023Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO, Matti AKSELA
-
Publication number: 20230370485Abstract: A network node of a threat detection network, a backend system of a threat detection network, a threat detection network and a threat detection method in a threat detection network. The threat detection network comprises interconnected network nodes and a backend system, wherein the backend system utilizes a backend threat detection model, and wherein at least part of the network nodes comprise security agent modules which collect data related to the respective network node, wherein the network nodes utilize a local threat detection model and a local consistency model. The local consistency model is configured to provide a confidence level information between the local threat detection model and the backend threat detection model.Type: ApplicationFiled: May 15, 2023Publication date: November 16, 2023Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO
-
Patent number: 11811803Abstract: There is provided a method comprising: detecting a new process start at a network node of a computer network; determining that said process requires external code modules; observing the times at which one or more external code modules required by the new process are loaded relative to the process starting time; determining that the usage of an external code module required by the new process is anomalous when the time elapsed between the start of the process and loading of said external code module lies outside predetermined expected boundaries; and taking further action to protect the network node and/or the computer network based on determining that the usage of the external code module required by the detected new process is anomalous.Type: GrantFiled: November 10, 2020Date of Patent: November 7, 2023Assignee: WITHSECURE CORPORATIONInventors: Paolo Palumbo, Dmitriy Komashinskiy
-
Patent number: 11647029Abstract: A method of probing and responding to a security breach in a computer network security system includes defining first and second rules and defining a model to output a probability that a security breach has occurred based on an input and to generate commands. Data is collected at first nodes according to the first rules and a first portion of the collected data is selected and sent from the first nodes to a second node. The selected first portion is input into the model to obtain an output probability that a security breach has occurred and the following steps are performed: determining signs of a security breach, generating a first command with the model to cause a second portion of the collected data to be selected, and generating a second command with the model to cause a change in settings at one or more of the first nodes.Type: GrantFiled: December 7, 2018Date of Patent: May 9, 2023Assignee: Withsecure CorporationInventors: Paolo Palumbo, Dmitry Komashinskiy, Szymon Grzybowski
-
Publication number: 20230097370Abstract: Disclosed is a system and a method of threat detection in a computer network, the method including detecting by a first node a security threat, e.g. relating to anomalous or malicious behavior, digital object and/or context, at the first node, collecting context information at the first node relating to the detected security threat, reporting at least one detected security threat and the collected context information to at least a second node, analyzing at the second node the received information relating to the security threat and collecting context information relating to the analysis at the second node, and sending the threat related information with added analysis and context information collected from the second node to at least one further node or backend.Type: ApplicationFiled: September 29, 2022Publication date: March 30, 2023Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO
-
Patent number: 11457020Abstract: There is provided a method comprising: generating and sharing an initial value of an integrity token between an endpoint node and a security backend computer, collecting data at the endpoint node, wherein dissimilar data types are aligned as input events, generating a new integrity token every time a new input event is written to a local repository of the endpoint node, wherein the new integrity token is generated based on the new input event and a prior integrity token that was generated prior to the new integrity token, removing the prior integrity token generated prior to the new integrity token from the endpoint node each time a new integrity token has been generated, and sending one or more input events with the new integrity token to the security backend computer for enabling the security backend computer checking integrity of the data received from the endpoint.Type: GrantFiled: May 19, 2020Date of Patent: September 27, 2022Assignee: WITHSECURE CORPORATIONInventors: Paolo Palumbo, Alexey Kirichenko, Valtteri Niemi, Sara Ramezanian, Tommi Meskanen
-
Patent number: 11372971Abstract: There is provided a threat control method on a computer system including: collecting one or more events from a first endpoint, each event identifying one or more attributes associated to the event; detecting a security threat related to one or more of the collected events; searching matching events from one or more further endpoints, wherein the matching event includes at least part of the same attributes than the one or more events related to the detected security threat; and in case a matching event with at least part of the same attributes is found, identifying the associated endpoint as being related to a security threat similar to what was earlier detected.Type: GrantFiled: May 28, 2019Date of Patent: June 28, 2022Assignee: F-Secure CorporationInventors: Henri Nurmi, Artturi Lehtio, Paolo Palumbo
-
Patent number: 11245666Abstract: A method including collecting and aligning raw data from a plurality of network nodes, wherein dissimilar data types are aligned as input events; filtering the input events by discarding events and/or parts of events that are detected to be equal or similar to previously observed events or events and/or parts of events found to be redundant by using predetermined criteria; separating processing of the input events into event aggregation and event enrichment processes, wherein the event aggregation process includes processing all the input events for generating aggregated events, and the event enrichment process includes processing only events passed by the filtering and the aggregated events from the event aggregation process; and analysing the data received from the event enrichment process for generating a security related decision.Type: GrantFiled: June 26, 2019Date of Patent: February 8, 2022Assignee: F-Secure CorporationInventors: Dmitriy Komashinskiy, Paolo Palumbo
-
Publication number: 20210409429Abstract: A system and a method for distributing components of a threat detection model for a threat control network, the threat control network comprising interconnected network nodes. The threat control network comprises security agent modules which collect data related to the respective network node of the security agent module, share information based on the collected data in the established internal network and use the collected data and information received from the internal network for generating and adapting threat detection models related to the respective network node. At least part of the nodes comprise at least the following components of the threat detection model: detection logic part comprising detection rules, detection logic parameter part comprising parameter values, core data primitive part comprising a set of key primitives. The method comprises distributing the said components of a threat detection model to a node independently from the other said components of the same node.Type: ApplicationFiled: June 25, 2021Publication date: December 30, 2021Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO, Johannes RAVE, Matti AKSELA
-
Publication number: 20210144165Abstract: There is provided a method comprising: detecting a new process start at a network node of a computer network; determining that said process requires external code modules; observing the times at which one or more external code modules required by the new process are loaded relative to the process starting time; determining that the usage of an external code module required by the new process is anomalous when the time elapsed between the start of the process and loading of said external code module lies outside predetermined expected boundaries; and taking further action to protect the network node and/or the computer network based on determining that the usage of the external code module required by the detected new process is anomalous.Type: ApplicationFiled: November 10, 2020Publication date: May 13, 2021Inventors: Paolo PALUMBO, Dmitriy KOMASHINSKIY
-
Patent number: 10972505Abstract: There are provided measures for improvement of distributed behavioral monitoring. Such measures exemplarily include receiving activity data indicative of a behavior of an entity to be monitored from at least one sensor sensing activity of the entity, wherein the at least one sensor is provided to an endpoint associated with said entity, assessing an activity represented by said activity data as malicious, validating a result of said assessing based on a categorization assigned to said entity in relation to said at least one sensor, and deciding, based on a result of said validating, on a response to said assessing.Type: GrantFiled: December 13, 2017Date of Patent: April 6, 2021Assignee: F-Secure CorporationInventors: Paolo Palumbo, Dmitriy Komashinskiy
-
Publication number: 20200374295Abstract: There is provided a method comprising: generating and sharing an initial value of an integrity token between an endpoint node and a security backend computer, collecting data at the endpoint node, wherein dissimilar data types are aligned as input events, generating a new integrity token every time a new input event is written to a local repository of the endpoint node, wherein the new integrity token is generated based on the new input event and a prior integrity token that was generated prior to the new integrity token, removing the prior integrity token generated prior to the new integrity token from the endpoint node each time a new integrity token has been generated, and sending one or more input events with the new integrity token to the security backend computer for enabling the security backend computer checking integrity of the data received from the endpoint.Type: ApplicationFiled: May 19, 2020Publication date: November 26, 2020Inventors: Paolo PALUMBO, Alexey KIRICHENKO, Valtteri NIEMI, Sara RAMEZANIAN, Tommi MESKANEN
-
Patent number: 10721247Abstract: There are provided measures for machine learning based malware detection systems. Such measures exemplarily include analyzing a set of training data, said set of training data comprising a plurality of training data elements, wherein each of said plurality of training data elements is associated with a respective one of at least two maliciousness related properties, learning a malicious object detection model on the basis of first feature combinations of said plurality of training data elements, said first feature combinations characterizing each of said at least two maliciousness related properties, learning an anomalous data detection model on the basis of second feature combinations of said plurality of training data elements, said second feature combinations characterizing said set of training data, said anomalous data detection model being associated with said malicious object detection model, and providing said malicious object detection model and said anomalous data detection model.Type: GrantFiled: November 28, 2017Date of Patent: July 21, 2020Assignee: F-Secure CorporationInventors: Dmitriy Komashinskiy, Paolo Palumbo
-
Publication number: 20200036681Abstract: A method including collecting and aligning raw data from a plurality of network nodes, wherein dissimilar data types are aligned as input events; filtering the input events by discarding events and/or parts of events that are detected to be equal or similar to previously observed events or events and/or parts of events found to be redundant by using predetermined criteria; separating processing of the input events into event aggregation and event enrichment processes, wherein the event aggregation process includes processing all the input events for generating aggregated events, and the event enrichment process includes processing only events passed by the filtering and the aggregated events from the event aggregation process; and analysing the data received from the event enrichment process for generating a security related decision.Type: ApplicationFiled: June 26, 2019Publication date: January 30, 2020Inventors: Dmitriy KOMASHINSKIY, Paolo PALUMBO
-
Publication number: 20190370462Abstract: There is provided a threat control method on a computer system including: collecting one or more events from a first endpoint, each event identifying one or more attributes associated to the event; detecting a security threat related to one or more of the collected events; searching matching events from one or more further endpoints, wherein the matching event includes at least part of the same attributes than the one or more events related to the detected security threat; and in case a matching event with at least part of the same attributes is found, identifying the associated endpoint as being related to a security threat similar to what was earlier detected.Type: ApplicationFiled: May 28, 2019Publication date: December 5, 2019Inventors: Henri Nurmi, Artturi Lehtio, Paolo Palumbo
-
Publication number: 20190182272Abstract: A method of probing and responding to a security breach in a computer network security system includes defining first and second rules and defining a model to output a probability that a security breach has occurred based on an input and to generate commands. Data is collected at first nodes according to the first rules and a first portion of the collected data is selected and sent from the first nodes to a second node. The selected first portion is input into the model to obtain an output probability that a security breach has occurred and the following steps are performed: determining signs of a security breach, generating a first command with the model to cause a second portion of the collected data to be selected, and generating a second command with the model to cause a change in settings at one or more of the first nodes.Type: ApplicationFiled: December 7, 2018Publication date: June 13, 2019Inventors: Paolo PALUMBO, Dmitry KOMASHINSKIY, Szymon GRZYBOWSKI
-
Patent number: 10127382Abstract: A method of detecting malware on a client computer, the method including generating a hash of an entity at the client computer, whereby the entity is suspected to be malware, sending the hash to a network server, considering the reputation of the hash at the network server by comparing the hash to a database of hashes of known reputation, returning the results of said considering to the client computer, and, if the reputation is not known at the server, sending instructions to the client computer for obtaining further information about the entity at the client computer, wherein said further information is obtained by executing code at the client computer sent by the server to the client computer after said considering the reputation if said code is not stored at the client computer before said generating a hash.Type: GrantFiled: October 19, 2015Date of Patent: November 13, 2018Assignee: F-Secure CorporationInventors: Paolo Palumbo, Dmitry Komashinskiy, Juha Ylipekkala, Jarno Niemela
-
Publication number: 20180176260Abstract: There are provided measures for improvement of distributed behavioral monitoring. Such measures exemplarily include receiving activity data indicative of a behavior of an entity to be monitored from at least one sensor sensing activity of the entity, wherein the at least one sensor is provided to an endpoint associated with said entity, assessing an activity represented by said activity data as malicious, validating a result of said assessing based on a categorization assigned to said entity in relation to said at least one sensor, and deciding, based on a result of said validating, on a response to said assessing.Type: ApplicationFiled: December 13, 2017Publication date: June 21, 2018Inventors: Paolo Palumbo, Dmitriy Komashinskiy
-
Publication number: 20180159871Abstract: There are provided measures for machine learning based malware detection systems. Such measures exemplarily include analyzing a set of training data, said set of training data comprising a plurality of training data elements, wherein each of said plurality of training data elements is associated with a respective one of at least two maliciousness related properties, learning a malicious object detection model on the basis of first feature combinations of said plurality of training data elements, said first feature combinations characterizing each of said at least two maliciousness related properties, learning an anomalous data detection model on the basis of second feature combinations of said plurality of training data elements, said second feature combinations characterizing said set of training data, said anomalous data detection model being associated with said malicious object detection model, and providing said malicious object detection model and said anomalous data detection model.Type: ApplicationFiled: November 28, 2017Publication date: June 7, 2018Inventors: Dmitriy Komashinskiy, Paolo Palumbo
-
Patent number: 9392014Abstract: This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a social media application is detected by the computer security routine. The user input indicates that a user wants to share content with at least one other user through the social media application. In response, the computer security routine suspends said sharing and performs, before determining whether or not to allow the sharing, a security check for suspiciousness of contents the user intends to share.Type: GrantFiled: September 10, 2013Date of Patent: July 12, 2016Assignee: F-Secure CorporationInventors: Paolo Palumbo, Andrew Patel