Patents by Inventor Paul A. Deardorff
Paul A. Deardorff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11750628Abstract: Methods and systems for monitoring activity on a network. The system may first classify network activity data as being generated by a human actor or an automated process. Then, the system may assign a first behavioral profile to the entity based on the network activity data and detect anomalous activity associated with the entity.Type: GrantFiled: December 17, 2018Date of Patent: September 5, 2023Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Jonathan Hart, Oriana Ott
-
Patent number: 11729189Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.Type: GrantFiled: October 29, 2020Date of Patent: August 15, 2023Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
-
Patent number: 11711383Abstract: Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing an attack tool to simulate malicious activity in the computing environment, and then gathering data regarding a second state of the computing environment. The methods described herein may then involve generating a signature based on changes between the first and second states, and then using the generated signature to detect malicious activity in a target network.Type: GrantFiled: July 23, 2021Date of Patent: July 25, 2023Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 11677776Abstract: Disclosed herein are methods, systems, and processes to facilitate and perform dynamic best path determination for penetration testing. An action path that includes a kill chain that involves performance of exploit actions for a phase of a penetration test is generated by identifying the exploit actions based on a penetration parameter, a detection parameter, and/or a time parameter associated with the exploit actions. Performance of the identified exploit actions permits successful completion of the phase of the penetration test and designates the action path for inclusion as part of a best path for the penetration test.Type: GrantFiled: July 6, 2022Date of Patent: June 13, 2023Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Publication number: 20230156021Abstract: Methods and systems for identifying a network threat are disclosed. The methods described herein may involve receiving at least one permutation of a domain name, wherein the at least one permutation is registered with a domain name registrar. The methods described herein may further involve executing a scanning function to identify an active service on the at least one permutation registered with the domain name registrar and implementing a threat prevention procedure upon identifying an active service on the at least one permutation.Type: ApplicationFiled: January 17, 2023Publication date: May 18, 2023Applicant: Rapid7, Inc.Inventors: Wah-Kwan Lin, Paul Deardorff
-
Patent number: 11588826Abstract: Methods and systems for identifying a network threat are disclosed. The methods described herein may involve receiving at least one permutation of a domain name, wherein the at least one permutation is registered with a domain name registrar. The methods described herein may further involve executing a scanning function to identify an active service on the at least one permutation registered with the domain name registrar and implementing a threat prevention procedure upon identifying an active service on the at least one permutation.Type: GrantFiled: December 20, 2019Date of Patent: February 21, 2023Assignee: Rapid7, Inc.Inventors: Wah-Kwan Lin, Paul Deardorff
-
Patent number: 11539734Abstract: Methods and systems for identifying a vulnerability on a network are disclosed. The methods described herein may involve executing a first scanning function to obtain a first view of a network and then filtering the first view of the network for at least one point of exposure of a first entity that originates from a second entity. The methods described herein may further involve executing a secondary scanning function to identify any vulnerabilities of the first entity based on the point of exposure of the first entity that originates from the second entity and implementing a threat prevention procedure upon identifying a vulnerability of the first entity based on the point of exposure of the first entity that originates from the second entity.Type: GrantFiled: December 20, 2019Date of Patent: December 27, 2022Assignee: Rapid7, Inc.Inventors: Wah-Kwan Lin, Paul Deardorff
-
Publication number: 20220360603Abstract: Disclosed herein are methods, systems, and processes to facilitate and perform dynamic best path determination for penetration testing. An action path that includes a kill chain that involves performance of exploit actions for a phase of a penetration test is generated by identifying the exploit actions based on a penetration parameter, a detection parameter, and/or a time parameter associated with the exploit actions. Performance of the identified exploit actions permits successful completion of the phase of the penetration test and designates the action path for inclusion as part of a best path for the penetration test.Type: ApplicationFiled: July 6, 2022Publication date: November 10, 2022Applicant: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 11418528Abstract: Disclosed herein are methods, systems, and processes to facilitate and perform dynamic best path determination for penetration testing. An action path that includes a kill chain that involves performance of exploit actions for a phase of a penetration test is generated by identifying the exploit actions based on a penetration parameter, a detection parameter, and/or a time parameter associated with the exploit actions. Performance of the identified exploit actions permits successful completion of the phase of the penetration test and designates the action path for inclusion as part of a best path for the penetration test.Type: GrantFiled: November 2, 2018Date of Patent: August 16, 2022Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Publication number: 20210352092Abstract: Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing an attack tool to simulate malicious activity in the computing environment, and then gathering data regarding a second state of the computing environment. The methods described herein may then involve generating a signature based on changes between the first and second states, and then using the generated signature to detect malicious activity in a target network.Type: ApplicationFiled: July 23, 2021Publication date: November 11, 2021Applicant: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 11108790Abstract: Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing an attack tool to simulate malicious activity in the computing environment, and then gathering data regarding a second state of the computing environment. The methods described herein may then involve generating a signature based on changes between the first and second states, and then using the generated signature to detect malicious activity in a target network.Type: GrantFiled: April 30, 2019Date of Patent: August 31, 2021Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 10992476Abstract: Methods and systems for verifying asset identity. The system includes a rules engine executing a corpus of rules to analyze received fingerprint data regarding one or more assets in a network. The rules engine may execute the rules to create a synthetic fingerprint to provide more accurate and helpful information regarding a network asset.Type: GrantFiled: July 15, 2019Date of Patent: April 27, 2021Assignee: Rapid7, Inc.Inventors: Jonathan Hart, Paul Deardorff
-
Patent number: 10848507Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.Type: GrantFiled: June 18, 2019Date of Patent: November 24, 2020Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
-
Publication number: 20200195670Abstract: Methods and systems for monitoring activity on a network. The system may first classify network activity data as being generated by a human actor or an automated process. Then, the system may assign a first behavioral profile to the entity based on the network activity data and detect anomalous activity associated with the entity.Type: ApplicationFiled: December 17, 2018Publication date: June 18, 2020Inventors: Paul Deardorff, Jonathan Hart, Oriana Ott
-
Publication number: 20200145446Abstract: Disclosed herein are methods, systems, and processes to facilitate and perform dynamic best path determination for penetration testing. An action path that includes a kill chain that involves performance of exploit actions for a phase of a penetration test is generated by identifying the exploit actions based on a penetration parameter, a detection parameter, and/or a time parameter associated with the exploit actions. Performance of the identified exploit actions permits successful completion of the phase of the penetration test and designates the action path for inclusion as part of a best path for the penetration test.Type: ApplicationFiled: November 2, 2018Publication date: May 7, 2020Applicant: Rapid7, Inc.Inventors: Paul Deardorff, Dustin Myers
-
Patent number: 10396990Abstract: Methods and systems for verifying asset identity. The system includes a rules engine executing a corpus of rules to analyze received fingerprint data regarding one or more assets in a network. The rules engine may execute the rules to create a synthetic fingerprint to provide more accurate and helpful information regarding a network asset.Type: GrantFiled: May 22, 2017Date of Patent: August 27, 2019Assignee: Rapid7, Inc.Inventors: Jonathan Hart, Paul Deardorff
-
Patent number: 10367832Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.Type: GrantFiled: January 27, 2017Date of Patent: July 30, 2019Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
-
Publication number: 20180337786Abstract: Methods and systems for verifying asset identity. The system includes a rules engine executing a corpus of rules to analyze received fingerprint data regarding one or more assets in a network. The rules engine may execute the rules to create a synthetic fingerprint to provide more accurate and helpful information regarding a network asset.Type: ApplicationFiled: May 22, 2017Publication date: November 22, 2018Inventors: Jonathan Hart, Paul Deardorff
-
Publication number: 20180219880Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.Type: ApplicationFiled: January 27, 2017Publication date: August 2, 2018Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
-
Patent number: 4297303Abstract: Waste materials from the conversion of iron ore to pig iron or steel combine with a reducing metal, such as aluminum or magnesium, and a small portion of a mineral acid to form a reaction mixture which gives a heat output superior to many conventional fuels. The materials are processed in several steps to produce either a shaped or loose composition, a portion of which is then heated to a reaction temperature. Retardants for the reaction may be added.Type: GrantFiled: January 14, 1980Date of Patent: October 27, 1981Inventors: Paul A. Deardorff, Robert C. Wood, Sante M. Cundari